We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Assigner | mitre |
Reserved | 2017-01-01 |
Published | 2017-03-01 |
Updated | 2024-08-06 |
Integer overflow in tools/tiffcp.c in LibTIFF 4.0.7, 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5 and 4.0.6 allows remote attackers to have unspecified impact via a crafted image, which triggers a heap-based buffer overflow.
https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/
http://bugzilla.maptools.org/show_bug.cgi?id=2610
http://www.openwall.com/lists/oss-security/2017/01/01/12 ([oss-security] 20170101 Re: Re: libtiff: multiple heap-based buffer overflow)
https://github.com/vadz/libtiff/commit/787c0ee906430b772f33ca50b97b8b5ca070faec
http://www.securityfocus.com/bid/95215 (95215)
http://www.openwall.com/lists/oss-security/2017/01/01/10 ([oss-security] 20170101 Re: libtiff: multiple heap-based buffer overflow)
http://www.debian.org/security/2017/dsa-3762 (DSA-3762)
https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2016-10093