Heap-based Buffer Overflow Affecting libtiff-devel package, versions <0:4.0.3-27.el7_3
Snyk CVSS
Attack Complexity
High
User Interaction
Required
Confidentiality
High
Integrity
High
Availability
High
Threat Intelligence
EPSS
2.16% (90th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL7-LIBTIFFDEVEL-1460200
- published 26 Jul 2021
- disclosed 24 Sep 2016
Introduced: 24 Sep 2016
CVE-2016-9534 Open this link in a new tabHow to fix?
Upgrade RHEL:7
libtiff-devel
to version 0:4.0.3-27.el7_3 or higher.
This issue was patched in RHSA-2017:0225
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff-devel
package and not the libtiff-devel
package as distributed by RHEL
.
See How to fix?
for RHEL:7
relevant fixed versions and status.
tif_write.c in libtiff 4.0.6 has an issue in the error code path of TIFFFlushData1() that didn't reset the tif_rawcc and tif_rawcp members. Reported as MSVR 35095, aka "TIFFFlushData1 heap-buffer-overflow."
References
- http://www.securityfocus.com/bid/94484
- http://www.securityfocus.com/bid/94743
- https://github.com/vadz/libtiff/commit/83a4b92815ea04969d494416eaae3d4c6b338e4a#diff-5be5ce02d0dea67050d5b2a10102d1ba
- https://access.redhat.com/security/cve/CVE-2016-9534
- http://www.debian.org/security/2017/dsa-3762
- http://rhn.redhat.com/errata/RHSA-2017-0225.html
- https://access.redhat.com/errata/RHSA-2017:0225