We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Assigner | mitre |
Reserved | 2017-01-01 |
Published | 2017-03-01 |
Updated | 2024-08-06 |
Stack-based buffer overflow in the _TIFFVGetField function in tif_dir.c in LibTIFF 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7 and 4.0.8 allows remote attackers to cause a denial of service (crash) via a crafted TIFF file.
http://www.securityfocus.com/bid/95178 (95178)
http://bugzilla.maptools.org/show_bug.cgi?id=2625
http://www.openwall.com/lists/oss-security/2017/01/01/7 ([oss-security] 20170101 libtiff: stack-based buffer overflow in _TIFFVGetField (tif_dir.c))
http://www.openwall.com/lists/oss-security/2017/01/01/11 ([oss-security] 20170101 Re: libtiff: stack-based buffer overflow in _TIFFVGetField (tif_dir.c))
http://www.debian.org/security/2017/dsa-3903 (DSA-3903)