Integer Overflow or Wraparound Affecting libtiff-tools package, versions <0:4.0.3-27.el7_3
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL7-LIBTIFFTOOLS-1458617
- published 26 Jul 2021
- disclosed 28 Jan 2015
Introduced: 28 Jan 2015
CVE-2015-8870 Open this link in a new tabHow to fix?
Upgrade RHEL:7
libtiff-tools
to version 0:4.0.3-27.el7_3 or higher.
This issue was patched in RHSA-2017:0225
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff-tools
package and not the libtiff-tools
package as distributed by RHEL
.
See How to fix?
for RHEL:7
relevant fixed versions and status.
Integer overflow in tools/bmp2tiff.c in LibTIFF before 4.0.4 allows remote attackers to cause a denial of service (heap-based buffer over-read), or possibly obtain sensitive information from process memory, via crafted width and length values in RLE4 or RLE8 data in a BMP file.