CVE-2020-35523

Name
CVE-2020-35523
Description
An integer overflow flaw was found in libtiff that exists in the tif_getimage.c file. This flaw allows an attacker to inject and execute arbitrary code when a user opens a crafted TIFF file. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Patch https://gitlab.com/libtiff/libtiff/-/merge_requests/160
Patch https://gitlab.com/libtiff/libtiff/-/commit/c8d613ef497058fe653c467fc84c70a62a4a71b2
Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=1932040
Third Party Advisory https://www.debian.org/security/2021/dsa-4869
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
GENTOO https://security.gentoo.org/glsa/202104-06
CONFIRM https://security.netapp.com/advisory/ntap-20210521-0009/
MLIST https://lists.debian.org/debian-lts-announce/2021/06/msg00023.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:* libtiff >= None < 4.2.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status