Lucene search

K
cveRedhatCVE-2023-3618
HistoryJul 12, 2023 - 3:15 p.m.

CVE-2023-3618

2023-07-1215:15:09
CWE-120
redhat
web.nvd.nist.gov
65
libtiff
cve-2023-3618
buffer overflow
denial of service
nvd

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

AI Score

6.5

Confidence

High

EPSS

0.002

Percentile

62.3%

A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to a buffer overflow in the Fax3Encode function in libtiff/tif_fax3.c, resulting in a denial of service.

Affected configurations

Nvd
Node
libtifflibtiffRange<4.5.1
Node
debiandebian_linuxMatch10.0
OR
redhatenterprise_linuxMatch8.0
OR
redhatenterprise_linuxMatch9.0
VendorProductVersionCPE
libtifflibtiff*cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*
debiandebian_linux10.0cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
redhatenterprise_linux8.0cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
redhatenterprise_linux9.0cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "affected",
    "product": "libtiff",
    "vendor": "n/a"
  },
  {
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "cpes": [
      "cpe:/o:redhat:enterprise_linux:6"
    ],
    "defaultStatus": "unknown",
    "packageName": "libtiff",
    "product": "Red Hat Enterprise Linux 6",
    "vendor": "Red Hat"
  },
  {
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "cpes": [
      "cpe:/o:redhat:enterprise_linux:7"
    ],
    "defaultStatus": "unknown",
    "packageName": "compat-libtiff3",
    "product": "Red Hat Enterprise Linux 7",
    "vendor": "Red Hat"
  },
  {
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "cpes": [
      "cpe:/o:redhat:enterprise_linux:7"
    ],
    "defaultStatus": "unknown",
    "packageName": "libtiff",
    "product": "Red Hat Enterprise Linux 7",
    "vendor": "Red Hat"
  },
  {
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "cpes": [
      "cpe:/o:redhat:enterprise_linux:8"
    ],
    "defaultStatus": "affected",
    "packageName": "compat-libtiff3",
    "product": "Red Hat Enterprise Linux 8",
    "vendor": "Red Hat"
  },
  {
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "cpes": [
      "cpe:/o:redhat:enterprise_linux:8"
    ],
    "defaultStatus": "affected",
    "packageName": "libtiff",
    "product": "Red Hat Enterprise Linux 8",
    "vendor": "Red Hat"
  },
  {
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "cpes": [
      "cpe:/o:redhat:enterprise_linux:9"
    ],
    "defaultStatus": "affected",
    "packageName": "libtiff",
    "product": "Red Hat Enterprise Linux 9",
    "vendor": "Red Hat"
  },
  {
    "collectionURL": "https://packages.fedoraproject.org/",
    "defaultStatus": "affected",
    "packageName": "iv",
    "product": "Fedora",
    "vendor": "Fedora"
  },
  {
    "collectionURL": "https://packages.fedoraproject.org/",
    "defaultStatus": "affected",
    "packageName": "libtiff",
    "product": "Fedora",
    "vendor": "Fedora"
  },
  {
    "collectionURL": "https://packages.fedoraproject.org/",
    "defaultStatus": "affected",
    "packageName": "mingw-libtiff",
    "product": "Fedora",
    "vendor": "Fedora"
  },
  {
    "collectionURL": "https://packages.fedoraproject.org/",
    "defaultStatus": "unaffected",
    "packageName": "tkimg",
    "product": "Fedora",
    "vendor": "Fedora"
  }
]

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

AI Score

6.5

Confidence

High

EPSS

0.002

Percentile

62.3%