An out-of-memory flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFRasterScanlineSize64() API. This flaw allows a remote attacker to cause a denial of service via a crafted input with a size smaller than 379 KB.
References
Link Resource
https://access.redhat.com/security/cve/CVE-2023-52355 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2251326 Issue Tracking Patch Third Party Advisory
https://gitlab.com/libtiff/libtiff/-/issues/621 Exploit Issue Tracking
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2024-01-25T20:03:35.031Z

Updated: 2024-04-25T15:16:31.162Z

Reserved: 2024-01-24T14:08:49.010Z


Link: CVE-2023-52355

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2024-01-25T20:15:38.353

Modified: 2024-05-17T17:37:57.793


Link: CVE-2023-52355

JSON object: View

cve-icon Redhat Information

No data.

CWE