libtiff 4.5.0 is vulnerable to Buffer Overflow in uv_encode() when libtiff reads a corrupted little-endian TIFF file and specifies the output to be big-endian.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://gitlab.com/libtiff/libtiff/-/issues/530 | patch issue tracking exploit |
https://gitlab.com/libtiff/libtiff/-/merge_requests/473 | patch |
https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html | mailing list |