A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service.
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Name | Vendor | Start Version | End Version |
---|---|---|---|
Libtiff | Libtiff | - (including) | - (including) |
Red Hat Enterprise Linux 8 | RedHat | libtiff-0:4.0.9-32.el8_10 | * |
Gdal | Ubuntu | trusty | * |
Gdal | Ubuntu | trusty/esm | * |
Gdal | Ubuntu | xenial | * |
Qtwebengine-opensource-src | Ubuntu | bionic | * |
Qtwebengine-opensource-src | Ubuntu | focal | * |
Qtwebengine-opensource-src | Ubuntu | mantic | * |
Qtwebengine-opensource-src | Ubuntu | oracular | * |
Texmaker | Ubuntu | bionic | * |
Texmaker | Ubuntu | focal | * |
Texmaker | Ubuntu | mantic | * |
Texmaker | Ubuntu | oracular | * |
Tiff | Ubuntu | bionic | * |
Tiff | Ubuntu | devel | * |
Tiff | Ubuntu | esm-infra-legacy/trusty | * |
Tiff | Ubuntu | esm-infra/bionic | * |
Tiff | Ubuntu | esm-infra/focal | * |
Tiff | Ubuntu | esm-infra/xenial | * |
Tiff | Ubuntu | focal | * |
Tiff | Ubuntu | jammy | * |
Tiff | Ubuntu | mantic | * |
Tiff | Ubuntu | noble | * |
Tiff | Ubuntu | oracular | * |
Tiff | Ubuntu | plucky | * |
Tiff | Ubuntu | trusty | * |
Tiff | Ubuntu | trusty/esm | * |
Tiff | Ubuntu | xenial | * |