{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-1560","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-03-22T10:05:28.529Z","datePublished":"2023-03-22T11:31:04.983Z","dateUpdated":"2024-11-22T17:51:20.095Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-21T10:39:23.307Z"},"title":"TinyTIFF File tinytiffreader.c buffer overflow","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-120","lang":"en","description":"CWE-120 Buffer Overflow"}]}],"affected":[{"vendor":"n/a","product":"TinyTIFF","versions":[{"version":"3.0.0.0","status":"affected"}],"modules":["File Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as problematic, has been found in TinyTIFF 3.0.0.0. This issue affects some unknown processing of the file tinytiffreader.c of the component File Handler. The manipulation leads to buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier VDB-223553 was assigned to this vulnerability."},{"lang":"de","value":"Eine Schwachstelle wurde in TinyTIFF 3.0.0.0 entdeckt. Sie wurde als problematisch eingestuft. Betroffen davon ist ein unbekannter Prozess der Datei tinytiffreader.c der Komponente File Handler. Dank der Manipulation mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden. Umgesetzt werden muss der Angriff lokal. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":2.8,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":2.8,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":1.7,"vectorString":"AV:L/AC:L/Au:S/C:N/I:N/A:P"}}],"timeline":[{"time":"2023-03-22T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-03-22T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-03-22T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-04-12T18:20:19.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"10cksYiqiyinHangzhouTechnology (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.223553","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.223553","tags":["signature","permissions-required"]},{"url":"https://github.com/10cksYiqiyinHangzhouTechnology/Security-Issue-Report-of-TinyTIFF","tags":["related"]},{"url":"https://github.com/10cksYiqiyinHangzhouTechnology/Security-Issue-Report-of-TinyTIFF/blob/main/id8","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T05:49:11.687Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.223553","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.223553","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/10cksYiqiyinHangzhouTechnology/Security-Issue-Report-of-TinyTIFF","tags":["related","x_transferred"]},{"url":"https://github.com/10cksYiqiyinHangzhouTechnology/Security-Issue-Report-of-TinyTIFF/blob/main/id8","tags":["exploit","x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-22T17:09:06.469759Z","id":"CVE-2023-1560","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-22T17:51:20.095Z"}}]}}