libtiff's tiffcrop utility has a improper input validation flaw that can lead to out of bounds read and ultimately cause a crash if an attacker is able to supply a crafted file to tiffcrop.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
The product receives input that is expected to specify a quantity (such as size or length), but it does not validate or incorrectly validates that the quantity has the required properties.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2118863 | patch third party advisory issue tracking |
https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html | third party advisory mailing list |
https://www.debian.org/security/2023/dsa-5333 | third party advisory vendor advisory |