We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2016-10093



Assignermitre
Reserved2017-01-01
Published2017-03-01
Updated2024-08-06

Description

Integer overflow in tools/tiffcp.c in LibTIFF 4.0.7, 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5 and 4.0.6 allows remote attackers to have unspecified impact via a crafted image, which triggers a heap-based buffer overflow.

References

https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/

http://bugzilla.maptools.org/show_bug.cgi?id=2610

http://www.openwall.com/lists/oss-security/2017/01/01/12 ([oss-security] 20170101 Re: Re: libtiff: multiple heap-based buffer overflow) mailing-list

https://github.com/vadz/libtiff/commit/787c0ee906430b772f33ca50b97b8b5ca070faec

http://www.securityfocus.com/bid/95215 (95215) vdb-entry

http://www.openwall.com/lists/oss-security/2017/01/01/10 ([oss-security] 20170101 Re: libtiff: multiple heap-based buffer overflow) mailing-list

http://www.debian.org/security/2017/dsa-3762 (DSA-3762) vendor-advisory

https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2016-10093

cve.org CVE-2016-10093

nvd.nist.gov CVE-2016-10093

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2016-10093
Support options

Helpdesk Telegram

Subscribe to our newsletter to learn more about our work.