Out-of-Bounds Affecting libtiff package, versions [,4.0.4)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
4.29% (93rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-LIBTIFF-2317862
  • published14 Dec 2021
  • disclosed19 Jan 2014
  • creditUnknown

Introduced: 19 Jan 2014

CVE-2013-4231  (opens in a new tab)
CWE-119  (opens in a new tab)

How to fix?

Upgrade libtiff to version 4.0.4 or higher.

Overview

Affected versions of this package are vulnerable to Out-of-Bounds. Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size.

References

CVSS Scores

version 3.1