Description
processCropSelections in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based buffer overflow (e.g., "WRITE of size 307203") via a crafted TIFF image.
References (6)
Core 6
Core References
Patch, Third Party Advisory
https://gitlab.com/libtiff/libtiff/-/commit/d1b6b9c1b3cae2d9e37754506c1ad8f4f7b646b5
Exploit, Issue Tracking, Patch, Third Party Advisory
https://gitlab.com/libtiff/libtiff/-/issues/488
Vendor Advisory
https://security.netapp.com/advisory/ntap-20230302-0004/
Third Party Advisory vendor-advisory
https://www.debian.org/security/2023/dsa-5333
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2023/01/msg00037.html
Third Party Advisory vendor-advisory
https://security.gentoo.org/glsa/202305-31
Scores
CVSS v3
5.5
EPSS
0.0001
EPSS Percentile
1.2%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-787
Status
published
Products (3)
debian/debian_linux
10.0
debian/debian_linux
11.0
libtiff/libtiff
< 4.5.0
Published
Jan 23, 2023
Tracked Since
Feb 18, 2026