We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Stack-based buffer overflow in the _TIFFVGetField function in tif_dir.c in LibTIFF 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7 and 4.0.8 allows remote attackers to cause a denial of service (crash) via a crafted TIFF file.
Reserved 2017-01-01 | Published 2017-03-01 | Updated 2024-08-06 | Assigner mitrewww.securityfocus.com/bid/95178 (95178)
bugzilla.maptools.org/show_bug.cgi?id=2625
www.openwall.com/lists/oss-security/2017/01/01/7 ([oss-security] 20170101 libtiff: stack-based buffer overflow in _TIFFVGetField (tif_dir.c))
blogs.gentoo.org/...er-overflow-in-_tiffvgetfield-tif_dir-c/
www.openwall.com/lists/oss-security/2017/01/01/11 ([oss-security] 20170101 Re: libtiff: stack-based buffer overflow in _TIFFVGetField (tif_dir.c))
www.debian.org/security/2017/dsa-3903 (DSA-3903)
Support options