Integer Overflow or Wraparound Affecting libtiff5-32bit package, versions <4.0.9-45.5.1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-SLES150-LIBTIFF532BIT-2644479
- published 14 Apr 2022
- disclosed 17 Feb 2022
Introduced: 17 Feb 2022
CVE-2020-35523 Open this link in a new tabHow to fix?
Upgrade SLES:15.0 libtiff5-32bit to version 4.0.9-45.5.1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff5-32bit package and not the libtiff5-32bit package as distributed by SLES.
See How to fix? for SLES:15.0 relevant fixed versions and status.
An integer overflow flaw was found in libtiff that exists in the tif_getimage.c file. This flaw allows an attacker to inject and execute arbitrary code when a user opens a crafted TIFF file. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
References
- https://www.suse.com/security/cve/CVE-2020-35523.html
- https://bugzilla.suse.com/1182811
- https://bugzilla.suse.com/1200195
- https://gitlab.com/libtiff/libtiff/-/merge_requests/160
- https://gitlab.com/libtiff/libtiff/-/commit/c8d613ef497058fe653c467fc84c70a62a4a71b2
- https://bugzilla.redhat.com/show_bug.cgi?id=1932040
- https://www.debian.org/security/2021/dsa-4869
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
- https://security.gentoo.org/glsa/202104-06
- https://security.netapp.com/advisory/ntap-20210521-0009/
- https://lists.debian.org/debian-lts-announce/2021/06/msg00023.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/