libtiff vulnerabilities

  • licenses detected

    • [4.3.0]; [4.4.0]; [4.5.0]; [4.5.1]; [4.6.0]; [4.7.0]
    • [4.0.8]; [4.0.9]; [4.1.0]; [4.2.0]
  • Direct Vulnerabilities

    Known vulnerabilities in the libtiff package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Free of Memory not on the Heap

    [0,)
    • L
    NULL Pointer Dereference

    [0,)
    • M
    Buffer Overflow

    [0,)
    • M
    Use After Free

    [0,)
    • M
    Improper Check for Unusual or Exceptional Conditions

    [,4.7.0)
    • H
    Denial of Service (DoS)

    [,4.7.0)
    • H
    Heap-based Buffer Overflow

    [,4.7.0)
    • M
    Uncontrolled Resource Consumption

    [,4.7.0)
    • H
    Denial of Service (DoS)

    [,4.7.0)
    • M
    Improper Restriction of Operations within the Bounds of a Memory Buffer

    [,4.5.1)
    • H
    Denial of Service (DoS)

    [,4.5.1)
    • H
    Denial of Service (DoS)

    [,4.5.0)
    • M
    Integer Overflow or Wraparound

    [,4.6.0)
    • M
    Integer Overflow or Wraparound

    [,4.6.0)
    • H
    Denial of Service (DoS)

    [,4.5.1)
    • M
    NULL Pointer Dereference

    [,4.5.1)
    • H
    Buffer Overflow

    [,4.5.1)
    • H
    Buffer Overflow

    [,4.5.1)
    • H
    Buffer Overflow

    [,4.5.1)
    • M
    Denial of Service (DoS)

    [4.0.8,4.5.1)
    • H
    Buffer Overflow

    [,4.5.1)
    • H
    Use After Free

    [,4.5.1)
    • M
    Buffer Overflow

    [,4.7.0)
    • M
    NULL Pointer Dereference

    [,4.5.1)
    • M
    Heap-based Buffer Overflow

    [,4.4.0)
    • M
    Buffer Overflow

    [,4.5.0)
    • M
    Heap-based Buffer Overflow

    [,4.5.0)
    • M
    Out-of-bounds Read

    [,4.7.0)
    • H
    Out-of-bounds Read

    [,4.5.0)
    • H
    Denial of Service (DoS)

    [,4.5.1)
    • H
    Denial of Service (DoS)

    [,4.5.1)
    • H
    Out-of-bounds Write

    [,4.5.1)
    • H
    Out-of-bounds Read

    [,4.5.1)
    • H
    Out-of-bounds Read

    [,4.5.1)
    • H
    Out-of-bounds Read

    [,4.5.1)
    • H
    Denial of Service (DoS)

    [,4.5.1)
    • H
    Denial of Service (DoS)

    [,4.5.1)
    • H
    Denial of Service (DoS)

    [,4.5.1)
    • H
    Heap-based Buffer Overflow

    [,4.5.0)
    • H
    Heap-based Buffer Overflow

    [,4.5.1)
    • H
    Integer Overflow or Wraparound

    [,4.5.0)
    • H
    Out-of-bounds Read

    [,4.5.0)
    • H
    Out-of-bounds Write

    [,4.5.0)
    • H
    Out-of-bounds Write

    [,4.5.0)
    • H
    Out-of-bounds Write

    [,4.5.0)
    • H
    Out-of-bounds Read

    [,4.5.0)
    • H
    Heap-based Buffer Overflow

    [,4.5.0)
    • C
    Double Free

    [,4.5.0)
    • H
    Release of Invalid Pointer or Reference

    [,4.5.0)
    • H
    Incorrect Calculation of Buffer Size

    [,4.5.0)
    • H
    Denial of Service (DoS)

    [,4.5.0)
    • H
    Integer Underflow

    [,4.4.0)
    • H
    Out-of-Bounds

    [,4.4.0)
    • H
    Improper Input Validation

    [,4.4.0)
    • H
    Buffer Overflow

    [,4.5.0)
    • M
    Division by zero

    [,4.5.0)
    • M
    Out-of-bounds Read

    [,4.4.0)
    • H
    Heap-based Buffer Overflow

    [,4.4.0)
    • H
    Buffer Overflow

    [,4.4.0)
    • H
    Denial of Service (DoS)

    [,4.4.0)
    • H
    Heap-based Buffer Overflow

    [,4.4.0)
    • H
    Reachable Assertion

    [,4.4.0)
    • H
    Heap-based Buffer Overflow

    [,4.4.0)
    • H
    Division by zero

    [,4.4.0)
    • H
    NULL Pointer Dereference

    [,4.4.0)
    • H
    NULL Pointer Dereference

    [,4.4.0)
    • M
    Denial of Service (DoS)

    [,4.4.0)
    • M
    Denial of Service (DoS)

    [,4.4.0)
    • H
    Improper Input Validation

    [,4.0.9)
    • M
    Out-of-Bounds

    [,4.0.9)
    • C
    Denial of Service

    [,4.0.9)
    • C
    Out-of-bounds Read

    [0,)
    • M
    Improper Input Validation

    [,4.1.0)
    • M
    Denial of Service (DoS)

    [,4.0.9)
    • M
    Denial of Service (DoS)

    [,4.0.9)
    • H
    Denial of Service (DoS)

    [,4.1.0)
    • H
    Out-of-bounds Write

    [,4.0.9)
    • H
    Arbitrary Code Execution

    [0,)
    • M
    Memory Leak

    [,4.0.9)
    • M
    Out-of-bounds Read

    [,4.0.9)
    • H
    Out-of-bounds Write

    [,4.1.0)
    • M
    Out-of-Bounds

    [,4.0.9)
    • H
    Integer Overflow or Wraparound

    [,4.2.0)
    • M
    NULL Pointer Dereference

    [4.0.8,4.0.9)
    • M
    Denial of Service (DoS)

    [4.0.8,4.1.0)
    • M
    Improper Input Validation

    [4.0.8,4.0.9)
    • M
    Out-of-Bounds

    [,4.2.0)
    • H
    Integer Overflow or Wraparound

    [,4.1.0)
    • H
    Out-of-bounds Write

    [,4.1.0)
    • M
    Denial of Service (DoS)

    [,4.1.0)
    • M
    Out-of-Bounds

    [,4.2.0)
    • H
    Out-of-bounds Write

    [,4.1.0)
    • H
    Out-of-bounds Write

    [,4.1.0)
    • H
    Out-of-bounds Write

    [,4.1.0)
    • M
    NULL Pointer Dereference

    [,4.1.0)
    • M
    NULL Pointer Dereference

    [,4.1.0)
    • H
    Out-of-bounds Write

    [,4.2.0)
    • H
    Memory Leak

    [,4.1.0)
    • H
    Out-of-Bounds

    [,4.1.0)
    • H
    Out-of-bounds Read

    [4.0.8,4.1.0)
    • M
    Denial of Service (DoS)

    [,4.1.0)
    • M
    Out-of-bounds Read

    [,4.1.0)
    • M
    Out-of-Bounds

    [0,)
    • H
    Out-of-bounds Write

    [,4.1.0)
    • M
    Integer Overflow or Wraparound

    [,4.1.0)
    • H
    Out-of-bounds Write

    [,4.1.0)
    • H
    Out-of-bounds Write

    [,4.1.0)
    • M
    NULL Pointer Dereference

    [,4.1.0)
    • M
    NULL Pointer Dereference

    [,4.1.0)