6.5
CVSSv3

CVE-2016-5318

Published: 20/01/2017 Updated: 28/03/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

Stack-based buffer overflow in the _TIFFVGetField function in libtiff 4.0.6 and previous versions allows remote malicious users to crash the application via a crafted tiff.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

libtiff libtiff

Vendor Advisories

Debian Bug report logs - #809066 tiff: CVE-2015-7554 Package: src:tiff; Maintainer for src:tiff is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 26 Dec 2015 21:24:02 UTC Severity: important Tags: patch, security, upstream Merged with 842043 Found in versi ...
LibTIFF could be made to crash or run programs as your login if it opened a specially crafted file ...
Stack-based buffer overflow in the _TIFFVGetField function in libtiff 406 and earlier allows remote attackers to crash the application via a crafted tiff ...
A stack-based buffer overflow vulnerability was reported in thumbnail's _TIFFVGetField() function Memory corruption can be triggered when handling maliciously crafted tiff file causing application to crash or possibly execute arbitrary code ...