Vulnerability Details : CVE-2016-9534
tif_write.c in libtiff 4.0.6 has an issue in the error code path of TIFFFlushData1() that didn't reset the tif_rawcc and tif_rawcp members. Reported as MSVR 35095, aka "TIFFFlushData1 heap-buffer-overflow."
Vulnerability category: Overflow
Products affected by CVE-2016-9534
- cpe:2.3:a:libtiff:libtiff:4.0.6:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-9534
1.68%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 87 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-9534
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2016-9534
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-9534
-
http://www.securityfocus.com/bid/94484
RETIRED: LibTIFF Multiple Security VulnerabilitesThird Party Advisory;VDB Entry
-
http://rhn.redhat.com/errata/RHSA-2017-0225.html
RHSA-2017:0225 - Security Advisory - Red Hat Customer Portal
-
https://github.com/vadz/libtiff/commit/83a4b92815ea04969d494416eaae3d4c6b338e4a#diff-5be5ce02d0dea67050d5b2a10102d1ba
* tools/tiffcrop.c: fix various out-of-bounds write vulnerabilities · vadz/libtiff@83a4b92 · GitHubExploit;Patch;Third Party Advisory
-
http://www.securityfocus.com/bid/94743
LibTIFF CVE-2016-9534 Heap Buffer Overflow Vulnerability
-
http://www.debian.org/security/2017/dsa-3762
Debian -- Security Information -- DSA-3762-1 tiff
Jump to