CVE-2016-3634

Published on: 10/03/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:02 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Certain versions of Libtiff from Libtiff contain the following vulnerability:

The tagCompare function in tif_dirinfo.c in the thumbnail tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to field_tag matching.

  • CVE-2016-3634 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.5 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE NONE HIGH

CVSS2 Score: 5 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE PARTIAL

CVE References

Description Tags Link
LibTIFF 'tif_dirinfo.c' Out of Bounds Read Denial of Service Vulnerability cve.report (archive)
text/html
URL Logo BID 93335
oss-security - CVE-2016-3634 - libtiff illegel read Mailing List
Third Party Advisory
www.openwall.com
text/html
URL Logo MLIST [oss-security] 20160408 CVE-2016-3634 - libtiff illegel read
libTIFF: Multiple vulnerabilities (GLSA 201701-16) — Gentoo Security security.gentoo.org
text/html
URL Logo GENTOO GLSA-201701-16
Bug 2547 – CVE-2016-3634: illegal read in tif_dirinfo.c when using thumbnail command Issue Tracking
bugzilla.maptools.org
text/html
URL Logo MISC bugzilla.maptools.org/show_bug.cgi?id=2547

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationLibtiffLibtiffAllAllAllAll
  • cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*: