libtiff.so is vulnerable to buffer overflows. A malicious user can pass a image to the readContigStripsIntoBuffer
function in tif_unix.c
to cause a buffer overflow that can crash the system or overwrite memory from another application.
CPE | Name | Operator | Version |
---|---|---|---|
libtiff.so | le | 5.7.0 | |
libtiff | le | 4.0.6.2 |
bugzilla.maptools.org/show_bug.cgi?id=2620
bugzilla.maptools.org/show_bug.cgi?id=2622
www.debian.org/security/2017/dsa-3762
www.openwall.com/lists/oss-security/2017/01/01/10
www.openwall.com/lists/oss-security/2017/01/01/12
www.securityfocus.com/bid/95218
blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/
bugzilla.suse.com/show_bug.cgi?id=1017693
github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2016-10092
github.com/vadz/libtiff/commit/9657bbe3cdce4aaa90e07d50c1c70ae52da0ba6a