Libtiff: segment fault in libtiff in tiffreadrgbatileext() leading to denial of service
Summary
| CVE | CVE-2023-52356 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2024-01-25 20:15:39 UTC |
| Updated | 2026-04-17 14:16:32 UTC |
| Description | A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service. |
Risk And Classification
Primary CVSS: v3.1 7.5 HIGH from [email protected]
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS: 0.008490000 probability, percentile 0.748960000 (date 2026-04-21)
Problem Types: CWE-122 | CWE-787 | CWE-122 Heap-based Buffer Overflow
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 7.5 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
| 3.1 | [email protected] | Secondary | 7.5 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
| 3.1 | CNA | CVSS | 7.5 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
NoneIntegrity
NoneAvailability
HighCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Libtiff | Libtiff | - | All | All | All |
| Operating System | Redhat | Enterprise Linux | 8.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux | 9.0 | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Red Hat | Red Hat Enterprise Linux 10 | unaffected 0:4.6.0-6.el10_1.2 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 10.0 Extended Update Support | unaffected 0:4.6.0-6.el10_0.2 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 8 | unaffected 0:4.0.9-32.el8_10 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 9 | unaffected 0:4.4.0-15.el9 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 9.6 Extended Update Support | unaffected 0:4.4.0-13.el9_6.3 * rpm | Not specified |
| CNA | Red Hat | Red Hat AI Inference Server 3.2 | unaffected sha256:bddcf7ab6d576572b6d60822c313ffebcd9869e4fde93e32ac327821f93cf32b * rpm | Not specified |
| CNA | Red Hat | Red Hat AI Inference Server 3.2 | unaffected sha256:7856bdb7ae0d643a7b9362c164d4d4fe3c0c7186f5fff73a7ae9835b3df52e57 * rpm | Not specified |
| CNA | Red Hat | Red Hat AI Inference Server 3.2 | unaffected sha256:14e32e88f1b89f59ed34a6d712746b82a6a54c6ed4727784f18aeff853abbdc7 * rpm | Not specified |
| CNA | Red Hat | Red Hat AI Inference Server 3.2 | unaffected sha256:dcb9d1cd005c40b6db6f893e56419e383b9dcc0d38315605cb1457e2af5354f7 * rpm | Not specified |
| CNA | Red Hat | Red Hat AI Inference Server 3.2 | unaffected sha256:53007894763e03f609c35c727cb738db3c2130b19fa0e1069c24240e0870fb7a * rpm | Not specified |
| CNA | Red Hat | Red Hat AI Inference Server 3.2 | unaffected sha256:54616c9f3e4d27120504b0b2020432ef3ff85286a50de7be842f05df0cfcd69e * rpm | Not specified |
| CNA | Red Hat | Red Hat AI Inference Server 3.3 | unaffected sha256:0ec114881d9dcd28a5dbbb2ec0ea1301ad87d5ae133121ce8167ef29d19802cc * rpm | Not specified |
| CNA | Red Hat | Red Hat AI Inference Server 3.3 | unaffected sha256:813ba7ccd1696b44deb90d9e6cd8af114bdb47781eae7f27246a81fba062a892 * rpm | Not specified |
| CNA | Red Hat | Red Hat AI Inference Server 3.3 | unaffected sha256:be6d568f28044533e4ad80f0856407c359e2eaf31a6b89cada433e6575d2300e * rpm | Not specified |
| CNA | Red Hat | Red Hat Discovery 2 | unaffected sha256:310df392f638ef6eca1a26db024ae2cb617db5932f886d2acddc92fb7289e740 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 6 | Not specified | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 7 | Not specified | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 7 | Not specified | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 8 | Not specified | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| support.apple.com/kb/HT214124 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | |
| seclists.org/fulldisclosure/2024/Jul/23 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | |
| access.redhat.com/errata/RHSA-2024:5079 | [email protected] | access.redhat.com | |
| seclists.org/fulldisclosure/2024/Jul/16 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | |
| access.redhat.com/errata/RHSA-2026:7081 | [email protected] | access.redhat.com | |
| support.apple.com/kb/HT214120 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | |
| access.redhat.com/errata/RHSA-2026:8747 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:23080 | [email protected] | access.redhat.com | |
| seclists.org/fulldisclosure/2024/Jul/17 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | |
| support.apple.com/kb/HT214118 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | |
| seclists.org/fulldisclosure/2024/Jul/22 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | |
| access.redhat.com/errata/RHSA-2025:23079 | [email protected] | access.redhat.com | |
| cve-details | af854a3a-2127-422b-91ae-364da2661108 | access.redhat.com | Third Party Advisory |
| access.redhat.com/errata/RHSA-2025:21994 | [email protected] | access.redhat.com | |
| support.apple.com/kb/HT214122 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | |
| support.apple.com/kb/HT214117 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | |
| access.redhat.com/errata/RHSA-2025:23078 | [email protected] | access.redhat.com | |
| 2251344 – (CVE-2023-52356) CVE-2023-52356 libtiff: Segment fault in libtiff in TIFFReadRGBATileExt() leading to denial of service | af854a3a-2127-422b-91ae-364da2661108 | bugzilla.redhat.com | Issue Tracking, Third Party Advisory |
| TIFFReadRGBAStrip/TIFFReadRGBATile: add more validation of col/row (fixes #622) (!546) · Merge requests · libtiff / libtiff · GitLab | af854a3a-2127-422b-91ae-364da2661108 | gitlab.com | Issue Tracking, Patch |
| access.redhat.com/errata/RHSA-2025:20801 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2026:8748 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2026:3461 | [email protected] | access.redhat.com | |
| support.apple.com/kb/HT214116 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | |
| support.apple.com/kb/HT214123 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | |
| seclists.org/fulldisclosure/2024/Jul/20 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | |
| access.redhat.com/errata/RHSA-2026:7304 | [email protected] | access.redhat.com | |
| seclists.org/fulldisclosure/2024/Jul/18 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | |
| support.apple.com/kb/HT214119 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | |
| access.redhat.com/errata/RHSA-2026:3462 | [email protected] | access.redhat.com | |
| lists.debian.org/debian-lts-announce/2025/01/msg00019.html | af854a3a-2127-422b-91ae-364da2661108 | lists.debian.org | |
| access.redhat.com/errata/RHSA-2026:7335 | [email protected] | access.redhat.com | |
| seclists.org/fulldisclosure/2024/Jul/19 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | |
| seclists.org/fulldisclosure/2024/Jul/21 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | |
| lists.debian.org/debian-lts-announce/2024/03/msg00011.html | af854a3a-2127-422b-91ae-364da2661108 | lists.debian.org | |
| access.redhat.com/errata/RHSA-2026:5958 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2026:8746 | [email protected] | access.redhat.com | |
| A SEGV found in TIFFReadRGBATileExt (#622) · Issues · libtiff / libtiff · GitLab | af854a3a-2127-422b-91ae-364da2661108 | gitlab.com | Issue Tracking, Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Additional Advisory Data
| Source | Time | Event |
|---|---|---|
| CNA | 2023-11-24T00:00:00.000Z | Reported to Red Hat. |
| CNA | 2023-11-03T00:00:00.000Z | Made public. |
Legacy QID Mappings
- 200123 Ubuntu Security Notification for LibTIFF Vulnerabilities (USN-6644-1)
- 200148 Ubuntu Security Notification for LibTIFF Vulnerabilities (USN-6644-2)
- 357235 Amazon Linux Security Advisory for libtiff : ALAS2023-2024-525
- 6000519 Debian Security Update for tiff (DLA 3758-1)
- 755820 SUSE Enterprise Linux Security Update for tiff (SUSE-SU-2024:0594-1)
- 755821 SUSE Enterprise Linux Security Update for tiff (SUSE-SU-2024:0593-1)
- 908006 Common Base Linux Mariner (CBL-Mariner) Security Update for libtiff (34077)
- 908081 Common Base Linux Mariner (CBL-Mariner) Security Update for libtiff (34077-1)