An exploitable heap-based buffer overflow exists in the handling of TIFF images in LibTIFF's TIFF2PDF tool. A crafted TIFF document can lead to a heap-based buffer overflow resulting in remote code execution. Vulnerability can be triggered via a saved TIFF file delivered by other means.
References
Link | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2017-0225.html | |
http://www.debian.org/security/2017/dsa-3762 | |
http://www.securityfocus.com/bid/93902 | |
http://www.talosintelligence.com/reports/TALOS-2016-0187/ | Exploit Technical Description Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201701-16 |
Configurations
History
No history.
Information
Published : 2017-01-06 21:59
Updated : 2024-02-04 19:11
NVD link : CVE-2016-5652
Mitre link : CVE-2016-5652
CVE.ORG link : CVE-2016-5652
JSON object : View
Products Affected
libtiff
- libtiff
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer