CVE Vulnerabilities

CVE-2023-0799

Use After Free

Published: Feb 13, 2023 | Modified: Mar 21, 2025
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
5.5 MODERATE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM

LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3701, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.

Weakness

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory “belongs” to the code that operates on the new pointer.

Affected Software

Name Vendor Start Version End Version
Libtiff Libtiff * 4.4.0 (including)
Red Hat Enterprise Linux 9 RedHat libtiff-0:4.4.0-8.el9_2 *
Tiff Ubuntu bionic *
Tiff Ubuntu esm-infra-legacy/trusty *
Tiff Ubuntu esm-infra/bionic *
Tiff Ubuntu esm-infra/focal *
Tiff Ubuntu esm-infra/xenial *
Tiff Ubuntu focal *
Tiff Ubuntu jammy *
Tiff Ubuntu kinetic *
Tiff Ubuntu trusty *
Tiff Ubuntu trusty/esm *
Tiff Ubuntu xenial *

Potential Mitigations

References