Vulnerability Details : CVE-2023-3316
A NULL pointer dereference in TIFFClose() is caused by a failure to open an output file (non-existent path or a path that requires permissions like /dev/null) while specifying zones.
Vulnerability category: Memory Corruption
Products affected by CVE-2023-3316
- cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-3316
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 40 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-3316
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST | |
5.9
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.2
|
3.6
|
JFrog |
CWE ids for CVE-2023-3316
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by:
- nvd@nist.gov (Secondary)
- reefs@jfrog.com (Primary)
References for CVE-2023-3316
-
https://gitlab.com/libtiff/libtiff/-/issues/515
Null Pointer Dereference in TIFFClose() (#515) · Issues · libtiff / libtiff · GitLabExploit;Patch;Third Party Advisory
-
https://gitlab.com/libtiff/libtiff/-/merge_requests/468
TIFFClose() avoid NULL pointer dereferencing. fix#515 (!468) · Merge requests · libtiff / libtiff · GitLabPatch;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
[SECURITY] [DLA 3513-1] tiff security update
-
https://research.jfrog.com/vulnerabilities/libtiff-nullderef-dos-xray-522144/
libtiff NULL dereference DoS | XRAY-522144 - JFrog Security ResearchExploit;Third Party Advisory
Jump to