We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Integer overflow in tools/tiffcp.c in LibTIFF 4.0.7, 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5 and 4.0.6 allows remote attackers to have unspecified impact via a crafted image, which triggers a heap-based buffer overflow.
Reserved 2017-01-01 | Published 2017-03-01 | Updated 2024-08-06 | Assigner mitreblogs.gentoo.org/...iff-multiple-heap-based-buffer-overflow/
bugzilla.maptools.org/show_bug.cgi?id=2610
www.openwall.com/lists/oss-security/2017/01/01/12 ([oss-security] 20170101 Re: Re: libtiff: multiple heap-based buffer overflow)
github.com/...ommit/787c0ee906430b772f33ca50b97b8b5ca070faec
www.securityfocus.com/bid/95215 (95215)
www.openwall.com/lists/oss-security/2017/01/01/10 ([oss-security] 20170101 Re: libtiff: multiple heap-based buffer overflow)
www.debian.org/security/2017/dsa-3762 (DSA-3762)
github.com/...cs_for_Multi_Versions/tree/main/CVE-2016-10093
Support options