An issue was discovered in LibTIFF 4.0.9. A buffer overflow vulnerability can occur via an invalid or empty tif argument to TIFFRGBAImageOK in tif_getimage.c, and it can be exploited (at a minimum) via the following high-level library API functions: TIFFReadRGBAImage, TIFFRGBAImageOK, and TIFFRGBAImageBegin. References: http://bugzilla.maptools.org/show_bug.cgi?id=2803
Created libtiff tracking bugs for this issue: Affects: fedora-all [bug 1609414] Created mingw-libtiff tracking bugs for this issue: Affects: epel-7 [bug 1609413] Affects: fedora-all [bug 1609412]
CVE rejected.
Statement: Red Hat Product Security determined that this flaw was not a security vulnerability. See the Bugzilla link for more details.