Description
LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the tools/tiffcp resulting in DoS or code execution via a crafted BitsPerSample value.
References (7)
Core 7
Core References
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2017/dsa-3844
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/201709-27
Exploit, Issue Tracking x_refsource_confirm
http://bugzilla.maptools.org/show_bug.cgi?id=2656
Exploit, Issue Tracking x_refsource_confirm
http://bugzilla.maptools.org/show_bug.cgi?id=2657
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1037911
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/95413
Patch x_refsource_confirm
https://github.com/vadz/libtiff/commit/5c080298d59efa53264d7248bbe3a04660db6ef7
Scores
CVSS v3
8.8
EPSS
0.0093
EPSS Percentile
76.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-122
CWE-119
Status
published
Products (1)
libtiff/libtiff
4.0.7
Published
Jan 12, 2017
Tracked Since
Feb 18, 2026