CVE-2016-5321 log
Source |
|
Severity | Medium |
Remote | Yes |
Type | Denial of service |
Description | An out-of-bounds read vulnerability was found in the DumpModeDecode() function in libtiff. A maliciously crafted TIFF file could cause the application to crash when using tiffcrop command. |
Group | Package | Affected | Fixed | Severity | Status | Ticket |
---|---|---|---|---|---|---|
AVG-86 | lib32-libtiff | 4.0.6-2 | 4.0.7-1 | Critical | Fixed | |
AVG-85 | libtiff | 4.0.6-2 | 4.0.7-1 | Critical | Fixed |
Date | Advisory | Group | Package | Severity | Type |
---|---|---|---|---|---|
25 Nov 2016 | ASA-201611-27 | AVG-86 | lib32-libtiff | Critical | multiple issues |
25 Nov 2016 | ASA-201611-26 | AVG-85 | libtiff | Critical | multiple issues |
References |
---|
http://www.openwall.com/lists/oss-security/2016/06/15/7 http://bugzilla.maptools.org/show_bug.cgi?id=2558#c2 |
Notes |
---|
FIXED: 2016-07-11 Even Rouault <even.rouault at spatialys.com> tools/tiffcrop.c: Avoid access outside of stack allocated array on a tiled separate TIFF with more than 8 samples per pixel. Reported by Kaixiang Zhang of the Cloud Security Team, Qihoo 360 (CVE-2016-5321 / CVE-2016-5323 , bugzilla #2558 / #2559) |