CVE-2023-41175

MEDIUM

libtiff - DoS/Arbitrary Code Execution

Title source: llm
STIX 2.1

Description

A vulnerability was found in libtiff due to multiple potential integer overflows in raw2tiff.c. This flaw allows remote attackers to cause a denial of service or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.

References (3)

Core 3
Core References
Vendor Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2024:2289
Third Party Advisory vdb-entry x_refsource_redhat
https://access.redhat.com/security/cve/CVE-2023-41175
Issue Tracking, Third Party Advisory issue-tracking x_refsource_redhat
https://bugzilla.redhat.com/show_bug.cgi?id=2235264

Scores

CVSS v3 6.5
EPSS 0.0028
EPSS Percentile 51.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-190
Status published
Products (4)
fedoraproject/fedora
libtiff/libtiff < 4.6.0
redhat/enterprise_linux 8.0
redhat/enterprise_linux 9.0
Published Oct 05, 2023
Tracked Since Feb 18, 2026