A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service.

Subscriptions

Vendors Products
Libtiff Subscribe
Libtiff Subscribe
Ai Inference Server Subscribe
Discovery Subscribe
Enterprise Linux Subscribe

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3758-1 tiff security update
Debian DLA Debian DLA DLA-4026-1 tiff security update
EUVD EUVD EUVD-2023-57012 A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service.
Ubuntu USN Ubuntu USN USN-6644-1 LibTIFF vulnerabilities
Ubuntu USN Ubuntu USN USN-6644-2 LibTIFF vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://seclists.org/fulldisclosure/2024/Jul/16 cve-icon
http://seclists.org/fulldisclosure/2024/Jul/17 cve-icon
http://seclists.org/fulldisclosure/2024/Jul/18 cve-icon
http://seclists.org/fulldisclosure/2024/Jul/19 cve-icon
http://seclists.org/fulldisclosure/2024/Jul/20 cve-icon
http://seclists.org/fulldisclosure/2024/Jul/21 cve-icon
http://seclists.org/fulldisclosure/2024/Jul/22 cve-icon
http://seclists.org/fulldisclosure/2024/Jul/23 cve-icon
https://access.redhat.com/errata/RHSA-2024:5079 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:20801 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:21994 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:23078 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:23079 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:23080 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2026:3461 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2026:3462 cve-icon cve-icon
https://access.redhat.com/security/cve/CVE-2023-52356 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=2251344 cve-icon cve-icon
https://gitlab.com/libtiff/libtiff/-/issues/622 cve-icon cve-icon cve-icon
https://gitlab.com/libtiff/libtiff/-/merge_requests/546 cve-icon cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html cve-icon
https://lists.debian.org/debian-lts-announce/2025/01/msg00019.html cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2023-52356 cve-icon
https://support.apple.com/kb/HT214116 cve-icon
https://support.apple.com/kb/HT214117 cve-icon
https://support.apple.com/kb/HT214118 cve-icon
https://support.apple.com/kb/HT214119 cve-icon
https://support.apple.com/kb/HT214120 cve-icon
https://support.apple.com/kb/HT214122 cve-icon
https://support.apple.com/kb/HT214123 cve-icon
https://support.apple.com/kb/HT214124 cve-icon
https://www.cve.org/CVERecord?id=CVE-2023-52356 cve-icon
History

Fri, 27 Feb 2026 16:45:00 +0000


Tue, 10 Feb 2026 17:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:10

Wed, 10 Dec 2025 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat ai Inference Server
CPEs cpe:/a:redhat:ai_inference_server:3.2::el9
Vendors & Products Redhat ai Inference Server
References

Mon, 24 Nov 2025 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat discovery
CPEs cpe:/a:redhat:discovery:2::el9
Vendors & Products Redhat discovery
References

Tue, 11 Nov 2025 16:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:9 cpe:/a:redhat:enterprise_linux:9::appstream
cpe:/a:redhat:enterprise_linux:9::crb
References

Mon, 03 Nov 2025 21:30:00 +0000

Type Values Removed Values Added
References

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00263}

epss

{'score': 0.0027}


Tue, 17 Jun 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 22 Nov 2024 12:00:00 +0000


Mon, 16 Sep 2024 20:45:00 +0000


Wed, 07 Aug 2024 22:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:enterprise_linux:8

Wed, 07 Aug 2024 16:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:enterprise_linux:8::appstream
cpe:/a:redhat:enterprise_linux:8::crb
References

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-02-27T17:05:04.387Z

Reserved: 2024-01-24T14:08:49.010Z

Link: CVE-2023-52356

cve-icon Vulnrichment

Updated: 2025-11-03T20:36:13.850Z

cve-icon NVD

Status : Modified

Published: 2024-01-25T20:15:39.063

Modified: 2026-02-27T17:16:21.270

Link: CVE-2023-52356

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-11-03T00:00:00Z

Links: CVE-2023-52356 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses