libtiff 4.5.0 is vulnerable to Buffer Overflow via /libtiff/tools/tiffcrop.c:8499. Incorrect updating of buffer size after rotateImage() in tiffcrop cause heap-buffer-overflow and SEGV.
References
Link | Resource |
---|---|
https://gitlab.com/libtiff/libtiff/-/issues/520 | Exploit Issue Tracking Patch |
https://gitlab.com/libtiff/libtiff/-/merge_requests/467 | Patch |
https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html | |
https://gitlab.com/libtiff/libtiff/-/issues/520 | Exploit Issue Tracking Patch |
https://gitlab.com/libtiff/libtiff/-/merge_requests/467 | Patch |
https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html |
Configurations
History
21 Nov 2024, 07:49
Type | Values Removed | Values Added |
---|---|---|
References | () https://gitlab.com/libtiff/libtiff/-/issues/520 - Exploit, Issue Tracking, Patch | |
References | () https://gitlab.com/libtiff/libtiff/-/merge_requests/467 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html - |
Information
Published : 2023-06-29 20:15
Updated : 2024-11-21 07:49
NVD link : CVE-2023-25433
Mitre link : CVE-2023-25433
CVE.ORG link : CVE-2023-25433
JSON object : View
Products Affected
libtiff
- libtiff
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')