CVE-2016-3631

Published on: 10/03/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:03 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Certain versions of Libtiff from Libtiff contain the following vulnerability:

The (1) cpStrips and (2) cpTiles functions in the thumbnail tool in LibTIFF 4.0.6 and earlier allow remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the bytecounts[] array variable.

  • CVE-2016-3631 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.5 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE NONE HIGH

CVSS2 Score: 5 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE PARTIAL

CVE References

Description Tags Link
libTIFF: Multiple vulnerabilities (GLSA 201701-16) — Gentoo Security security.gentoo.org
text/html
URL Logo GENTOO GLSA-201701-16
oss-security - CVE-2016-3631 - libtiff 4.0.6 illegel read Mailing List
Third Party Advisory
www.openwall.com
text/html
URL Logo MLIST [oss-security] 20160408 CVE-2016-3631 - libtiff 4.0.6 illegel read
LibTIFF Divide-by-Zero Error and Multiple Read Errors Let Remote Users Cause the Target Application to Crash - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1035508

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationLibtiffLibtiffAllAllAllAll
  • cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*: