๐Ÿ” CVE Alert

CVE-2023-52356

HIGH 7.5

Libtiff: segment fault in libtiff in tiffreadrgbatileext() leading to denial of service

CVSS Score
7.5
EPSS Score
0.7%
EPSS Percentile
73th

A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service.

CWE CWE-122
Published Jan 25, 2024
Last Updated Apr 9, 2026
Stay Ahead of the Next One

Get instant alerts for

Be the first to know when new high vulnerabilities are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Affected Versions

Red Hat / Red Hat Enterprise Linux 10
All versions affected
Red Hat / Red Hat Enterprise Linux 10.0 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9.6 Extended Update Support
All versions affected
Red Hat / Red Hat AI Inference Server 3.2
All versions affected
Red Hat / Red Hat AI Inference Server 3.2
All versions affected
Red Hat / Red Hat AI Inference Server 3.2
All versions affected
Red Hat / Red Hat AI Inference Server 3.2
All versions affected
Red Hat / Red Hat AI Inference Server 3.2
All versions affected
Red Hat / Red Hat AI Inference Server 3.2
All versions affected
Red Hat / Red Hat Discovery 2
All versions affected
Red Hat / Red Hat Enterprise Linux 6
All versions affected
Red Hat / Red Hat Enterprise Linux 7
All versions affected
Red Hat / Red Hat Enterprise Linux 7
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/errata/RHSA-2024:5079 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:20801 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:21994 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:23078 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:23079 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:23080 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:3461 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:3462 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:5958 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:7081 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:7304 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:7335 access.redhat.com: https://access.redhat.com/security/cve/CVE-2023-52356 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2251344 gitlab.com: https://gitlab.com/libtiff/libtiff/-/issues/622 gitlab.com: https://gitlab.com/libtiff/libtiff/-/merge_requests/546 lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html support.apple.com: https://support.apple.com/kb/HT214119 support.apple.com: https://support.apple.com/kb/HT214123 support.apple.com: https://support.apple.com/kb/HT214122 support.apple.com: https://support.apple.com/kb/HT214117 support.apple.com: https://support.apple.com/kb/HT214118 support.apple.com: https://support.apple.com/kb/HT214116 support.apple.com: https://support.apple.com/kb/HT214120 support.apple.com: https://support.apple.com/kb/HT214124 seclists.org: http://seclists.org/fulldisclosure/2024/Jul/16 seclists.org: http://seclists.org/fulldisclosure/2024/Jul/23 seclists.org: http://seclists.org/fulldisclosure/2024/Jul/21 seclists.org: http://seclists.org/fulldisclosure/2024/Jul/20 seclists.org: http://seclists.org/fulldisclosure/2024/Jul/17 seclists.org: http://seclists.org/fulldisclosure/2024/Jul/22 seclists.org: http://seclists.org/fulldisclosure/2024/Jul/18 seclists.org: http://seclists.org/fulldisclosure/2024/Jul/19 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00019.html