An out-of-memory flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFRasterScanlineSize64() API. This flaw allows a remote attacker to cause a denial of service via a crafted input with a size smaller than 379 KB.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://access.redhat.com/security/cve/CVE-2023-52355 | third party advisory vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2251326 | patch third party advisory issue tracking |
https://gitlab.com/libtiff/libtiff/-/issues/621 | issue tracking exploit |