Bug 1344069 (CVE-2016-5319) - CVE-2016-5319 libtiff: Heap-based buffer overflow in bmp2tiff
Summary: CVE-2016-5319 libtiff: Heap-based buffer overflow in bmp2tiff
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2016-5319
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1344070 1344071 1344072
Blocks: 1344073
TreeView+ depends on / blocked
 
Reported: 2016-06-08 16:32 UTC by Adam Mariš
Modified: 2019-09-29 13:50 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2017-01-16 06:27:56 UTC
Embargoed:


Attachments (Terms of Use)

Description Adam Mariš 2016-06-08 16:32:27 UTC
Heap-based buffer overflow vulnerability was found in tif_packbits.c in PackBitsEncode function. Memory corruption can be triggered when bmp2tiff is handling maliciously crafted bmp file causing application to crash.

CVE assignment:

http://seclists.org/oss-sec/2016/q2/486

Comment 1 Adam Mariš 2016-06-08 16:33:45 UTC
Created libtiff tracking bugs for this issue:

Affects: fedora-all [bug 1344070]

Comment 2 Adam Mariš 2016-06-08 16:33:49 UTC
Created mingw-libtiff tracking bugs for this issue:

Affects: fedora-all [bug 1344071]
Affects: epel-7 [bug 1344072]

Comment 3 Huzaifa S. Sidhpurwala 2017-01-16 06:27:56 UTC
https://github.com/vadz/libtiff/ -> the forked version of libtiff, reacted to this flaw by removing the bmp2tiff utility from the package.


Note You need to log in before you can comment on or make changes to this bug.