A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to a buffer overflow in the Fax3Encode function in libtiff/tif_fax3.c, resulting in a denial of service.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2023-3618 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2215865 | Issue Tracking Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html | Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20230824-0012/ | |
https://support.apple.com/kb/HT214036 | |
https://support.apple.com/kb/HT214037 | |
https://support.apple.com/kb/HT214038 |
Configurations
History
23 Mar 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Aug 2023, 17:02
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html - Mailing List, Third Party Advisory | |
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:* |
01 Aug 2023, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
20 Jul 2023, 17:16
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-120 | |
References | (MISC) https://access.redhat.com/security/cve/CVE-2023-3618 - Third Party Advisory | |
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2215865 - Issue Tracking, Third Party Advisory | |
CPE | cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:a:libtiff:libtiff:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
12 Jul 2023, 15:17
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-12 15:15
Updated : 2024-03-23 11:15
NVD link : CVE-2023-3618
Mitre link : CVE-2023-3618
CVE.ORG link : CVE-2023-3618
JSON object : View
Products Affected
debian
- debian_linux
libtiff
- libtiff
redhat
- enterprise_linux
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')