QID 356375

Date Published: 2023-10-18

QID 356375: Amazon Linux Security Advisory for libtiff : ALAS2023-2023-364

Libtiff 4.4.0 has an out-of-bounds write in extractcontigsamplesshifted24bits in tools/tiffcrop.c:3604, allowing attackers to cause a denial-of-service via a crafted tiff file.
For users that compile libtiff from sources, the fix is available with commit cfbb883b. (
( CVE-2022-3598) processcropselections in tools/tiffcrop.c in libtiff through 4.5.0 has a heap-based buffer overflow (e.g., "write of size 307203") via a crafted tiff image. (
( CVE-2022-48281) a vulnerability was found in libtiff library.
This security flaw causes a heap buffer overflow in extractcontigsamples32bits, tiffcrop.c (cve-2023-30775) multiple potential integer overflow in tiffcp.c in libtiff <= 4.5.1 can allow remote attackers to cause a denial of service (application crash) or possibly execute an arbitrary code via a crafted tiff image which triggers a heap-based buffer overflow. (
( CVE-2023-40745) multiple potential integer overflow in raw2tiff.c in libtiff <= 4.5.1 can allow remote attackers to cause a denial of service (application crash) or possibly execute an arbitrary code via a crafted tiff image which triggers a heap-based buffer overflow. (
( CVE-2023-41175)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 6.5 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2023-2023-364 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS2023-2023-364 amazon linux 2023 URL Logo alas.aws.amazon.com/AL2023/ALAS-2023-364.html