Vulnerability Description
loadImage() in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based use after free via a crafted TIFF image.
CVSS Score
5.5
MEDIUM
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libtiff | Libtiff | <= 4.5.0 |
Related Weaknesses (CWE)
References
- https://gitlab.com/libtiff/libtiff/-/merge_requests/472ExploitIssue TrackingPatch
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://security.netapp.com/advisory/ntap-20230706-0009/
- https://gitlab.com/libtiff/libtiff/-/merge_requests/472ExploitIssue TrackingPatch
- https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
- https://lists.debian.org/debian-lts-announce/2025/01/msg00019.html
- https://security.netapp.com/advisory/ntap-20230706-0009/
FAQ
What is CVE-2023-26965?
CVE-2023-26965 is a vulnerability with a CVSS score of 5.5 (MEDIUM). loadImage() in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based use after free via a crafted TIFF image.
How severe is CVE-2023-26965?
CVE-2023-26965 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-26965?
Check the references section above for vendor advisories and patch information. Affected products include: Libtiff Libtiff.