An issue was discovered in LibTIFF 4.0.9. A buffer overflow can occur via an empty fmt argument to unixErrorHandler in tif_unix.c, and it can be exploited (at a minimum) via the following high-level library API functions: TIFFClientOpen, TIFFFdOpen, TIFFRawStripSize, TIFFCheckTile, TIFFComputeStrip, TIFFReadRawTile, TIFFUnRegisterCODEC, and TIFFWriteEncodedTile. References: http://bugzilla.maptools.org/show_bug.cgi?id=2802
Created libtiff tracking bugs for this issue: Affects: fedora-all [bug 1609408] Created mingw-libtiff tracking bugs for this issue: Affects: epel-7 [bug 1609409] Affects: fedora-all [bug 1609407]
CVE rejected.
Statement: Red Hat Product Security determined that this flaw was not a security vulnerability. See the Bugzilla link for more details.