Impact
A flaw in the libtiff function putcontig8bitYCbCr44tile permits a signed integer overflow when parsing a specially crafted TIFF file. The overflow corrupts memory pointer arithmetic, leading to an out‑of‑bounds heap write that can either crash the application or, in the most severe case, allow an attacker to execute arbitrary code on the affected system.
Affected Systems
Systems that ship with the libtiff library from Red Hat Enterprise Linux version 10, 6, 7, 8, 9, Red Hat Hardened Images, and the Red Hat Hummingbird derivative are all affected, as these releases include the vulnerable libtiff 4.x packages.
Risk and Exploitability
The CVSS score of 7.8 indicates high severity, while an EPSS score below 1 % suggests that exploitation in the wild is currently uncommon. The vulnerability is not listed in CISA’s KEV catalog. An attacker only needs to supply a malicious TIFF file to a vulnerable application; no special privileges are required. Services that accept or process TIFF uploads, or any application linked against libtiff, could be exposed to denial of service or remote code execution if the flaw remains unmitigated.
OpenCVE Enrichment
Debian DLA
Debian DSA