CVE-2023-52355Out-of-bounds Write in Libtiff

Severity
7.5HIGHNVD
EPSS
1.3%
top 20.16%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 25

Description

An out-of-memory flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFRasterScanlineSize64() API. This flaw allows a remote attacker to cause a denial of service via a crafted input with a size smaller than 379 KB.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages1 packages

NVDlibtiff/libtiff< 4.6.0

Also affects: Enterprise Linux 8.0, 9.0

Patches

🔴Vulnerability Details

3
CVEList
Libtiff: tiffrasterscanlinesize64 produce too-big size and could cause oom2024-01-25
OSV
CVE-2023-52355: An out-of-memory flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFRasterScanlineSize64() API2024-01-25
GHSA
GHSA-fh6j-mgh8-7prh: An out-of-memory flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFRasterScanlineSize64() API2024-01-25

📋Vendor Advisories

2
Red Hat
libtiff: TIFFRasterScanlineSize64 produce too-big size and could cause OOM2023-11-03
Debian
CVE-2023-52355: tiff - An out-of-memory flaw was found in libtiff that could be triggered by passing a ...2023
CVE-2023-52355 — Out-of-bounds Write in Libtiff | cvebase