Page 2 of 120 results (0.010 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

An issue was discovered in function TIFFReadDirectory libtiff before 4.4.0 allows attackers to cause a denial of service via crafted TIFF file. Se ha descubierto un problema en la función TIFFReadDirectory de libtiff anterior a 4.4.0 que permite a los atacantes provocar una denegación de servicio a través de un archivo TIFF manipulado. A flaw was found in the libtiff library. This issue allows an attacker who can submit a specially crafted file to an application linked with libtiff to cause an infinite loop, resulting in a denial of service. • https://gitlab.com/libtiff/libtiff/-/issues/455 https://gitlab.com/libtiff/libtiff/-/merge_requests/386 https://access.redhat.com/security/cve/CVE-2022-40090 https://bugzilla.redhat.com/show_bug.cgi?id=2234970 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 0

A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to a buffer overflow in the Fax3Encode function in libtiff/tif_fax3.c, resulting in a denial of service. • https://access.redhat.com/security/cve/CVE-2023-3618 https://bugzilla.redhat.com/show_bug.cgi?id=2215865 https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html https://security.netapp.com/advisory/ntap-20230824-0012 https://support.apple.com/kb/HT214036 https://support.apple.com/kb/HT214037 https://support.apple.com/kb/HT214038 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

A null pointer dereference issue was found in Libtiff's tif_dir.c file. This issue may allow an attacker to pass a crafted TIFF image file to the tiffcp utility which triggers a runtime error that causes undefined behavior. This will result in an application crash, eventually leading to a denial of service. • https://access.redhat.com/security/cve/CVE-2023-2908 https://bugzilla.redhat.com/show_bug.cgi?id=2218830 https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f https://gitlab.com/libtiff/libtiff/-/merge_requests/479 https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html https://security.netapp.com/advisory/ntap-20230731-0004 • CWE-476: NULL Pointer Dereference •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

loadImage() in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based use after free via a crafted TIFF image. A heap use-after-free vulnerability was found in LibTIFF's tiffcrop utility in the loadImage() function. This flaw allows an attacker to pass a crafted TIFF image file to the tiffcrop utility, which causes an out-of-bounds write access, resulting in an application crash, eventually leading to a denial of service. • https://gitlab.com/libtiff/libtiff/-/merge_requests/472 https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html https://security.netapp.com/advisory/ntap-20230706-0009 https://access.redhat.com/security/cve/CVE-2023-26965 https://bugzilla.redhat.com/show_bug.cgi?id=2215206 • CWE-416: Use After Free CWE-787: Out-of-bounds Write •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 1

A NULL pointer dereference flaw was found in Libtiff's LZWDecode() function in the libtiff/tif_lzw.c file. This flaw allows a local attacker to craft specific input data that can cause the program to dereference a NULL pointer when decompressing a TIFF format file, resulting in a program crash or denial of service. • https://access.redhat.com/security/cve/CVE-2023-2731 https://bugzilla.redhat.com/show_bug.cgi?id=2207635 https://github.com/libsdl-org/libtiff/commit/9be22b639ea69e102d3847dca4c53ef025e9527b https://gitlab.com/libtiff/libtiff/-/issues/548 https://security.netapp.com/advisory/ntap-20230703-0009 • CWE-476: NULL Pointer Dereference •