Bug 1326257 (CVE-2016-3658) - CVE-2016-3658 libtiff: out-of-bounds read in the TIFFWriteDirectoryTagLongLong8Array function
Summary: CVE-2016-3658 libtiff: out-of-bounds read in the TIFFWriteDirectoryTagLongLon...
Keywords:
Status: CLOSED DUPLICATE of bug 1185805
Alias: CVE-2016-3658
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1316881
TreeView+ depends on / blocked
 
Reported: 2016-04-12 09:25 UTC by Andrej Nemec
Modified: 2021-02-17 04:04 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2017-05-11 10:47:46 UTC
Embargoed:


Attachments (Terms of Use)

Description Andrej Nemec 2016-04-12 09:25:41 UTC
A vulnerability was found in the libtiff library. Using a tiffset command on a maliciously crafted image could result in a denial-of-service.

Vulnerable code:

/libtiff/tif_dirwrite.c: 1625
1623    for (q=p, ma=value, mb=0; mb<count; ma++, mb++, q++)
1624    {
1625        if (*ma>0xFFFFFFFF)
1626        {
1627            TIFFErrorExt(tif->tif_clientdata,module,
1628                         "Attempt to write value larger than 0xFFFFFFFF in Classic TIFF file.");
1629            _TIFFfree(p);
1630            return(0);
1631        }
1632        *q= (uint32)(*ma);
1633       }

References:

http://www.openwall.com/lists/oss-security/2016/04/08/12

Comment 2 Stefan Cornelius 2017-05-11 10:47:05 UTC
External References:

http://bugzilla.maptools.org/show_bug.cgi?id=2546

Comment 3 Stefan Cornelius 2017-05-11 10:47:46 UTC

*** This bug has been marked as a duplicate of bug 1185805 ***

Comment 4 Doran Moppert 2020-02-10 04:31:39 UTC
Statement:

This flaw was found to be a duplicate of CVE-2014-8127. Please see https://access.redhat.com/security/cve/CVE-2014-8127 for information about affected products and security errata.


Note You need to log in before you can comment on or make changes to this bug.