← Volver a CVEs
CVE-2015-7554
N/ADescripcion
The _TIFFVGetField function in tif_dir.c in libtiff 4.0.6 allows attackers to cause a denial of service (invalid memory write and crash) or possibly have unspecified other impact via crafted field data in an extension tag in a TIFF image.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado1/8/2016
Ultima modificacion4/12/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
libtiff:libtiff
Debilidades (CWE)
CWE-254
Referencias
http://lists.opensuse.org/opensuse-updates/2016-01/msg00078.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-updates/2016-01/msg00081.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-updates/2016-01/msg00100.html(secalert@redhat.com)
http://packetstormsecurity.com/files/135078/libtiff-4.0.6-Invalid-Write.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2016-1546.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2016-1547.html(secalert@redhat.com)
http://seclists.org/fulldisclosure/2015/Dec/119(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2015/12/26/7(secalert@redhat.com)
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html(secalert@redhat.com)
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html(secalert@redhat.com)
http://www.securityfocus.com/archive/1/537205/100/0/threaded(secalert@redhat.com)
http://www.securityfocus.com/bid/79699(secalert@redhat.com)
https://security.gentoo.org/glsa/201701-16(secalert@redhat.com)
http://lists.opensuse.org/opensuse-updates/2016-01/msg00078.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-updates/2016-01/msg00081.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-updates/2016-01/msg00100.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/135078/libtiff-4.0.6-Invalid-Write.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-1546.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-1547.html(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2015/Dec/119(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2015/12/26/7(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/537205/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/79699(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201701-16(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.