Vulnerability Details : CVE-2020-35523
An integer overflow flaw was found in libtiff that exists in the tif_getimage.c file. This flaw allows an attacker to inject and execute arbitrary code when a user opens a crafted TIFF file. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Vulnerability category: OverflowExecute code
Products affected by CVE-2020-35523
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-35523
0.22%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 44 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-35523
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2020-35523
-
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.Assigned by: secalert@redhat.com (Primary)
References for CVE-2020-35523
-
https://gitlab.com/libtiff/libtiff/-/merge_requests/160
check for tile width overflow (!160) · Merge Requests · libtiff / libtiff · GitLabPatch;Third Party Advisory
-
https://www.debian.org/security/2021/dsa-4869
Debian -- Security Information -- DSA-4869-1 tiffThird Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1932040
1932040 – (CVE-2020-35523) CVE-2020-35523 libtiff: Integer overflow in tif_getimage.cIssue Tracking;Patch;Third Party Advisory
-
https://security.netapp.com/advisory/ntap-20210521-0009/
March 2021 LibTIFF Vulnerabilities in NetApp Products | NetApp Product SecurityThird Party Advisory
-
https://security.gentoo.org/glsa/202104-06
libTIFF: Multiple vulnerabilities (GLSA 202104-06) — Gentoo securityThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
[SECURITY] Fedora 33 Update: libtiff-4.1.0-8.fc33 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2021/06/msg00023.html
[SECURITY] [DLA 2694-1] tiff security updateMailing List;Third Party Advisory
-
https://gitlab.com/libtiff/libtiff/-/commit/c8d613ef497058fe653c467fc84c70a62a4a71b2
gtTileContig(): check Tile width for overflow (c8d613ef) · Commits · libtiff / libtiff · GitLabPatch;Third Party Advisory
Jump to