libtiff 4.5.0 is vulnerable to Buffer Overflow in uv_encode() when libtiff reads a corrupted little-endian TIFF file and specifies the output to be big-endian.
References
Link | Resource |
---|---|
https://gitlab.com/libtiff/libtiff/-/issues/530 | Exploit Issue Tracking Patch |
https://gitlab.com/libtiff/libtiff/-/merge_requests/473 | Patch |
https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html |
Configurations
History
No history.
Information
Published : 2023-06-29 20:15
Updated : 2023-08-01 02:15
NVD link : CVE-2023-26966
Mitre link : CVE-2023-26966
CVE.ORG link : CVE-2023-26966
JSON object : View
Products Affected
libtiff
- libtiff
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')