A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2023-52356 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2251344 | Issue Tracking Third Party Advisory |
| https://gitlab.com/libtiff/libtiff/-/issues/622 | Issue Tracking Patch |
| https://gitlab.com/libtiff/libtiff/-/merge_requests/546 | Issue Tracking Patch |
| https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html |
Configurations
History
11 Mar 2024, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
31 Jan 2024, 17:41
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://access.redhat.com/security/cve/CVE-2023-52356 - Third Party Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2251344 - Issue Tracking, Third Party Advisory | |
| References | () https://gitlab.com/libtiff/libtiff/-/issues/622 - Issue Tracking, Patch | |
| References | () https://gitlab.com/libtiff/libtiff/-/merge_requests/546 - Issue Tracking, Patch | |
| First Time |
Redhat enterprise Linux
Redhat Libtiff libtiff Libtiff |
|
| CWE | CWE-787 | |
| Summary |
|
|
| CPE | cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:a:libtiff:libtiff:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* |
25 Jan 2024, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-01-25 20:15
Updated : 2024-03-11 13:15
NVD link : CVE-2023-52356
Mitre link : CVE-2023-52356
CVE.ORG link : CVE-2023-52356
JSON object : View
Products Affected
libtiff
- libtiff
redhat
- enterprise_linux
