LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3488, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://gitlab.com/libtiff/libtiff/-/issues/493 | patch exploit vendor advisory issue tracking |
https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68 | patch |
https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0795.json | vdb entry |
https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html | mailing list |
https://www.debian.org/security/2023/dsa-5361 | vendor advisory |
https://security.netapp.com/advisory/ntap-20230316-0003/ | |
https://security.gentoo.org/glsa/202305-31 | vendor advisory |