Vulnerability Description
An exploitable remote code execution vulnerability exists in the handling of TIFF images in LibTIFF version 4.0.6. A crafted TIFF document can lead to a type confusion vulnerability resulting in remote code execution. This vulnerability can be triggered via a TIFF file delivered to the application using LibTIFF's tag extension functionality.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libtiff | Libtiff | 4.0.6 |
References
- http://www.securityfocus.com/bid/93898Third Party AdvisoryVDB Entry
- http://www.talosintelligence.com/reports/TALOS-2016-0190/ExploitTechnical DescriptionThird Party Advisory
- https://security.gentoo.org/glsa/201701-16
- http://www.securityfocus.com/bid/93898Third Party AdvisoryVDB Entry
- http://www.talosintelligence.com/reports/TALOS-2016-0190/ExploitTechnical DescriptionThird Party Advisory
- https://security.gentoo.org/glsa/201701-16
FAQ
What is CVE-2016-8331?
CVE-2016-8331 is a vulnerability with a CVSS score of 8.1 (HIGH). An exploitable remote code execution vulnerability exists in the handling of TIFF images in LibTIFF version 4.0.6. A crafted TIFF document can lead to a type confusion vulnerability resulting in remot...
How severe is CVE-2016-8331?
CVE-2016-8331 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-8331?
Check the references section above for vendor advisories and patch information. Affected products include: Libtiff Libtiff.