libtiff 4.5.0 is vulnerable to Buffer Overflow in uv_encode() when libtiff reads a corrupted little-endian TIFF file and specifies the output to be big-endian.
References
| Link | Resource |
|---|---|
| https://gitlab.com/libtiff/libtiff/-/issues/530 | Exploit Issue Tracking Patch |
| https://gitlab.com/libtiff/libtiff/-/merge_requests/473 | Patch |
| https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html |
Configurations
Information
Published : 2023-06-29 20:15
Updated : 2023-08-01 02:15
NVD link : CVE-2023-26966
Mitre link : CVE-2023-26966
JSON object : View
Products Affected
libtiff
- libtiff
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
