
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-26966 affects libtiff version 4.5.0, specifically involving a buffer overflow vulnerability in the uv_encode() function. The vulnerability occurs when libtiff reads a corrupted little-endian TIFF file and specifies the output to be big-endian (NVD, Ubuntu Security).
The vulnerability has been assigned a CVSS v3.1 base score of 5.5 (Medium) with the vector string CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H. The issue specifically occurs in the uvencode() function within the tifluv.c file at line 961, where a buffer overflow can be triggered when processing certain malformed TIFF files (NVD, GitLab Issue).
When exploited, this vulnerability can lead to a denial of service condition or potentially allow arbitrary code execution. The impact is primarily focused on availability, with no direct impact on confidentiality or integrity of the system (Ubuntu Security).
The vulnerability has been fixed in subsequent releases and patches have been provided for affected versions. Various Linux distributions have released security updates to address this issue. Ubuntu has released fixes for multiple versions: Ubuntu 23.04 (4.5.0-5ubuntu1.1), Ubuntu 22.04 (4.3.0-6ubuntu0.5), Ubuntu 20.04 (4.1.0+git191117-2ubuntu0.20.04.9), and others (Ubuntu Security, Debian LTS).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."