{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-3618","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","state":"PUBLISHED","assignerShortName":"redhat","dateReserved":"2023-07-11T14:46:05.545Z","datePublished":"2023-07-12T14:06:04.572Z","dateUpdated":"2025-11-03T20:35:36.763Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","product":"libtiff","vendor":"n/a"},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/o:redhat:enterprise_linux:6"],"defaultStatus":"unknown","packageName":"libtiff","product":"Red Hat Enterprise Linux 6","vendor":"Red Hat"},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/o:redhat:enterprise_linux:7"],"defaultStatus":"unknown","packageName":"compat-libtiff3","product":"Red Hat Enterprise Linux 7","vendor":"Red Hat"},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/o:redhat:enterprise_linux:7"],"defaultStatus":"unknown","packageName":"libtiff","product":"Red Hat Enterprise Linux 7","vendor":"Red Hat"},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/o:redhat:enterprise_linux:8"],"defaultStatus":"affected","packageName":"compat-libtiff3","product":"Red Hat Enterprise Linux 8","vendor":"Red Hat"},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/o:redhat:enterprise_linux:8"],"defaultStatus":"affected","packageName":"libtiff","product":"Red Hat Enterprise Linux 8","vendor":"Red Hat"},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/o:redhat:enterprise_linux:9"],"defaultStatus":"affected","packageName":"libtiff","product":"Red Hat Enterprise Linux 9","vendor":"Red Hat"},{"collectionURL":"https://packages.fedoraproject.org/","defaultStatus":"affected","packageName":"iv","product":"Fedora","vendor":"Fedora"},{"collectionURL":"https://packages.fedoraproject.org/","defaultStatus":"affected","packageName":"libtiff","product":"Fedora","vendor":"Fedora"},{"collectionURL":"https://packages.fedoraproject.org/","defaultStatus":"affected","packageName":"mingw-libtiff","product":"Fedora","vendor":"Fedora"},{"collectionURL":"https://packages.fedoraproject.org/","defaultStatus":"unaffected","packageName":"tkimg","product":"Fedora","vendor":"Fedora"}],"datePublic":"2023-02-13T00:00:00.000Z","descriptions":[{"lang":"en","value":"A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to a buffer overflow in the Fax3Encode function in libtiff/tif_fax3.c, resulting in a denial of service."}],"metrics":[{"other":{"content":{"namespace":"https://access.redhat.com/security/updates/classification/","value":"Moderate"},"type":"Red Hat severity rating"}},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-120","description":"Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2024-07-15T00:27:54.327Z"},"references":[{"tags":["vdb-entry","x_refsource_REDHAT"],"url":"https://access.redhat.com/security/cve/CVE-2023-3618"},{"name":"RHBZ#2215865","tags":["issue-tracking","x_refsource_REDHAT"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215865"},{"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html"},{"url":"https://security.netapp.com/advisory/ntap-20230824-0012/"},{"url":"https://support.apple.com/kb/HT214038"},{"url":"https://support.apple.com/kb/HT214036"},{"url":"https://support.apple.com/kb/HT214037"}],"timeline":[{"lang":"en","time":"2023-06-19T00:00:00.000Z","value":"Reported to Red Hat."},{"lang":"en","time":"2023-02-13T00:00:00.000Z","value":"Made public."}],"title":"Segmentation fault in fax3encode in libtiff/tif_fax3.c","x_redhatCweChain":"CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')"},"adp":[{"title":"CVE Program Container","references":[{"tags":["vdb-entry","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/security/cve/CVE-2023-3618"},{"name":"RHBZ#2215865","tags":["issue-tracking","x_refsource_REDHAT","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215865"},{"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20230824-0012/","tags":["x_transferred"]},{"url":"https://support.apple.com/kb/HT214038","tags":["x_transferred"]},{"url":"https://support.apple.com/kb/HT214036","tags":["x_transferred"]},{"url":"https://support.apple.com/kb/HT214037","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00019.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T20:35:36.763Z"}},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-26T19:26:00.978317Z","id":"CVE-2023-3618","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-26T19:26:31.776Z"}}]}}