ID CVE-2016-3625
Summary tif_read.c in the tiff2bw tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TIFF image.
References
Vulnerable Configurations
  • LibTIFF 4.0.6
    cpe:2.3:a:libtiff:libtiff:4.0.6
CVSS
Base: 4.3 (as of 03-10-2016 - 13:17)
Impact:
Exploitability:
CWE CWE-125
CAPEC
  • Overread Buffers
    An adversary attacks a target by providing input that causes an application to read beyond the boundary of a defined buffer. This typically occurs when a value influencing where to start or stop reading is set to reflect positions outside of the valid memory location of the buffer. This type of attack may result in exposure of sensitive information, a system crash, or arbitrary code execution.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
nessus via4
NASL family Gentoo Local Security Checks
NASL id GENTOO_GLSA-201701-16.NASL
description The remote host is affected by the vulnerability described in GLSA-201701-16 (libTIFF: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in libTIFF. Please review the CVE identifier and bug reports referenced for details. Impact : A remote attacker could entice a user to process a specially crafted image file, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition. Workaround : There is no known workaround at this time.
last seen 2019-02-21
modified 2017-01-10
plugin id 96373
published 2017-01-10
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=96373
title GLSA-201701-16 : libTIFF: Multiple vulnerabilities
refmap via4
gentoo GLSA-201701-16
misc http://bugzilla.maptools.org/show_bug.cgi?id=2566
mlist [oss-security] 20160408 CVE-2016-3625 libtiff: Out-of-bounds Read in the tiff2bw tool
Last major update 03-10-2016 - 14:10
Published 03-10-2016 - 12:09
Last modified 30-10-2018 - 12:27
Back to Top