
Cloud Vulnerability DB
A community-led vulnerabilities database
A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service (NVD, Red Hat).
The vulnerability exists in the TIFFReadRGBATileExt() function where a memmove() operation is called based on offsets provided by read_ysize and read_xsize parameters. These parameters are derived from img.height and img.width values read directly from the input file. When crafted values are provided (img.height=0x21 and img.width=0x07ff), read_ysize is calculated as 0x0 and read_xsize as 0x1, resulting in an invalid memory address calculation that can lead to a segment fault or potential heap-buffer overflow (GitLab Issue).
The vulnerability can lead to denial of service through application crashes and potentially allow heap-buffer overflow conditions when exploited with specially crafted TIFF files (NVD).
The issue has been fixed in updated versions of libtiff through improved input validation. Red Hat has released security updates for affected versions through RHSA-2024:5079 (Red Hat Advisory). Apple has also included fixes in various OS updates including iOS 16.7.9, macOS Ventura 13.6.8, and other system versions (Apple Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."