We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2016-10095



Assignermitre
Reserved2017-01-01
Published2017-03-01
Updated2024-08-06

Description

Stack-based buffer overflow in the _TIFFVGetField function in tif_dir.c in LibTIFF 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7 and 4.0.8 allows remote attackers to cause a denial of service (crash) via a crafted TIFF file.

References

http://www.securityfocus.com/bid/95178 (95178) vdb-entry

http://bugzilla.maptools.org/show_bug.cgi?id=2625

http://www.openwall.com/lists/oss-security/2017/01/01/7 ([oss-security] 20170101 libtiff: stack-based buffer overflow in _TIFFVGetField (tif_dir.c)) mailing-list

https://blogs.gentoo.org/ago/2017/01/01/libtiff-stack-based-buffer-overflow-in-_tiffvgetfield-tif_dir-c/

http://www.openwall.com/lists/oss-security/2017/01/01/11 ([oss-security] 20170101 Re: libtiff: stack-based buffer overflow in _TIFFVGetField (tif_dir.c)) mailing-list

http://www.debian.org/security/2017/dsa-3903 (DSA-3903) vendor-advisory

cve.org CVE-2016-10095

nvd.nist.gov CVE-2016-10095

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2016-10095
Support options

Helpdesk Telegram

Subscribe to our newsletter to learn more about our work.