CVE-2016-10092
Heap-based buffer overflow in the readContigStripsIntoBuffer function in tif_unix.c in LibTIFF 4.0.7, 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5 and 4.0.6 allows remote attackers to have unspecified impact via a crafted image.
Published
2017-03-01T15:59:00.150
Last Modified
2025-04-20T01:37:25.860
Status
Deferred
Source
[email protected]
Severity
CVSSv3.0: 7.8 (HIGH)
CVSSv2 Vector
AV:N/AC:M/Au:N/C:P/I:P/A:P
- Access Vector: NETWORK
- Access Complexity: MEDIUM
- Authentication: NONE
- Confidentiality Impact: PARTIAL
- Integrity Impact: PARTIAL
- Availability Impact: PARTIAL
Exploitability Score
8.6
Impact Score
6.4
Weaknesses
Affected Vendors & Products
Type |
Vendor |
Product |
Version/Range |
Vulnerable? |
Application |
libtiff
|
libtiff
|
4.0.7 |
Yes
|
References
-
http://bugzilla.maptools.org/show_bug.cgi?id=2620
Exploit, Issue Tracking
([email protected])
-
http://bugzilla.maptools.org/show_bug.cgi?id=2622
Exploit, Issue Tracking
([email protected])
-
http://www.debian.org/security/2017/dsa-3762
([email protected])
-
http://www.openwall.com/lists/oss-security/2017/01/01/10
Mailing List, Third Party Advisory
([email protected])
-
http://www.openwall.com/lists/oss-security/2017/01/01/12
Mailing List, Third Party Advisory
([email protected])
-
http://www.securityfocus.com/bid/95218
([email protected])
-
https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/
Patch, Third Party Advisory
([email protected])
-
https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2016-10092
([email protected])
-
https://github.com/vadz/libtiff/commit/9657bbe3cdce4aaa90e07d50c1c70ae52da0ba6a
Patch
([email protected])
-
http://bugzilla.maptools.org/show_bug.cgi?id=2620
Exploit, Issue Tracking
(af854a3a-2127-422b-91ae-364da2661108)
-
http://bugzilla.maptools.org/show_bug.cgi?id=2622
Exploit, Issue Tracking
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.debian.org/security/2017/dsa-3762
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.openwall.com/lists/oss-security/2017/01/01/10
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.openwall.com/lists/oss-security/2017/01/01/12
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/95218
(af854a3a-2127-422b-91ae-364da2661108)
-
https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2016-10092
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/vadz/libtiff/commit/9657bbe3cdce4aaa90e07d50c1c70ae52da0ba6a
Patch
(af854a3a-2127-422b-91ae-364da2661108)