Untriaged
Permalink
CVE-2023-41175
6.5 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
Libtiff: potential integer overflow in raw2tiff.c
A vulnerability was found in libtiff due to multiple potential integer overflows in raw2tiff.c. This flaw allows remote attackers to cause a denial of service or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
References
Affected products
libtiff
- <4.6.0
- *
- ==4.6.0
mingw-libtiff
compact-libtiff
compat-libtiff3
Package maintainers
-
@willcohen Will Cohen
-
@nialov Nikolas Ovaskainen <nikolasovaskainen@gmail.com>
-
@l0b0 Victor Engmark <victor@engmark.name>
-
@nh2 Niklas Hambüchen <mail@nh2.me>
-
@sikmir Nikolay Korotkiy <sikmir@disroot.org>
-
@autra Augustin Trancart <augustin.trancart@gmail.com>
-
@imincik Ivan Mincik <ivan.mincik@gmail.com>