A vulnerability was found in LibTIFF up to 4.7.0. It has been declared as critical. This vulnerability affects the function get_histogram of the file tools/tiffmedian.c. The manipulation leads to use after free. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as fe10872e53efba9cc36c66ac4ab3b41a839d5172. It is recommended to apply a patch to fix this issue.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
https://vuldb.com/?id.317590 | technical description vdb entry |
https://vuldb.com/?ctiid.317590 | signature permissions required |
https://vuldb.com/?submit.621796 | third party advisory |
https://gitlab.com/libtiff/libtiff/-/issues/707 | exploit issue tracking |
https://gitlab.com/libtiff/libtiff/-/merge_requests/727 | patch |
https://gitlab.com/libtiff/libtiff/-/commit/fe10872e53efba9cc36c66ac4ab3b41a839d5172 | patch |
http://www.libtiff.org/ | product |