Risk | High |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2023-25435 CVE-2023-52356 |
CWE-ID | CWE-120 CWE-787 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
SUSE Package Hub 15 Operating systems & Components / Operating system Basesystem Module Operating systems & Components / Operating system SUSE Linux Enterprise Real Time 15 Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system SUSE Linux Enterprise Desktop 15 Operating systems & Components / Operating system libtiff-devel-64bit Operating systems & Components / Operating system package or component libtiff6-64bit Operating systems & Components / Operating system package or component libtiff6-64bit-debuginfo Operating systems & Components / Operating system package or component libtiff6-32bit Operating systems & Components / Operating system package or component libtiff-devel-32bit Operating systems & Components / Operating system package or component libtiff6-32bit-debuginfo Operating systems & Components / Operating system package or component libtiff-devel-docs Operating systems & Components / Operating system package or component tiff-docs Operating systems & Components / Operating system package or component libtiff-devel Operating systems & Components / Operating system package or component libtiff6-debuginfo Operating systems & Components / Operating system package or component libtiff6 Operating systems & Components / Operating system package or component tiff-debuginfo Operating systems & Components / Operating system package or component tiff Operating systems & Components / Operating system package or component tiff-debugsource Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU79329
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-25435
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to perform a denial of service attack.
The vulnerability exists due to buffer overflow in the extractContigSamplesShifted8bits() at /libtiff/tools/tiffcrop.c:3753. A local unauthenticated attacker can trick the victim into opening a specially crafted file and perform a denial of service attack.
MitigationUpdate the affected package tiff to the latest version.
Vulnerable software versionsSUSE Package Hub 15: 15-SP6
Basesystem Module: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
SUSE Linux Enterprise Desktop 15: SP6
libtiff-devel-64bit: before 4.7.0-150600.3.8.1
libtiff6-64bit: before 4.7.0-150600.3.8.1
libtiff6-64bit-debuginfo: before 4.7.0-150600.3.8.1
libtiff6-32bit: before 4.7.0-150600.3.8.1
libtiff-devel-32bit: before 4.7.0-150600.3.8.1
libtiff6-32bit-debuginfo: before 4.7.0-150600.3.8.1
libtiff-devel-docs: before 4.7.0-150600.3.8.1
tiff-docs: before 4.7.0-150600.3.8.1
libtiff-devel: before 4.7.0-150600.3.8.1
libtiff6-debuginfo: before 4.7.0-150600.3.8.1
libtiff6: before 4.7.0-150600.3.8.1
tiff-debuginfo: before 4.7.0-150600.3.8.1
tiff: before 4.7.0-150600.3.8.1
tiff-debugsource: before 4.7.0-150600.3.8.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250753-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU86755
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2023-52356
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input within the TIFFReadRGBATileExt() API. A remote attacker can pass a specially crafted TIFF file to the application, trigger an out-of-bounds write and execute arbitrary code on the target system.
MitigationUpdate the affected package tiff to the latest version.
Vulnerable software versionsSUSE Package Hub 15: 15-SP6
Basesystem Module: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
SUSE Linux Enterprise Desktop 15: SP6
libtiff-devel-64bit: before 4.7.0-150600.3.8.1
libtiff6-64bit: before 4.7.0-150600.3.8.1
libtiff6-64bit-debuginfo: before 4.7.0-150600.3.8.1
libtiff6-32bit: before 4.7.0-150600.3.8.1
libtiff-devel-32bit: before 4.7.0-150600.3.8.1
libtiff6-32bit-debuginfo: before 4.7.0-150600.3.8.1
libtiff-devel-docs: before 4.7.0-150600.3.8.1
tiff-docs: before 4.7.0-150600.3.8.1
libtiff-devel: before 4.7.0-150600.3.8.1
libtiff6-debuginfo: before 4.7.0-150600.3.8.1
libtiff6: before 4.7.0-150600.3.8.1
tiff-debuginfo: before 4.7.0-150600.3.8.1
tiff: before 4.7.0-150600.3.8.1
tiff-debugsource: before 4.7.0-150600.3.8.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250753-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.