{"dataType":"CVE_RECORD","cveMetadata":{"cveId":"CVE-2023-52356","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","state":"PUBLISHED","assignerShortName":"redhat","dateReserved":"2024-01-24T14:08:49.010Z","datePublished":"2024-01-25T20:03:40.971Z","dateUpdated":"2026-05-12T08:27:15.314Z"},"containers":{"cna":{"title":"Libtiff: segment fault in libtiff  in tiffreadrgbatileext() leading to denial of service","metrics":[{"other":{"content":{"value":"Moderate","namespace":"https://access.redhat.com/security/updates/classification/"},"type":"Red Hat severity rating"}},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS"}],"descriptions":[{"lang":"en","value":"A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service."}],"affected":[{"versions":[{"status":"affected","version":"0","lessThan":"4.6.0","versionType":"semver"}],"packageName":"libtiff","collectionURL":"https://gitlab.com/libtiff/libtiff","defaultStatus":"unaffected"},{"vendor":"Red Hat","product":"Red Hat Enterprise Linux 10","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"libtiff","defaultStatus":"affected","versions":[{"version":"0:4.6.0-6.el10_1.2","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/o:redhat:enterprise_linux:10.1"]},{"vendor":"Red Hat","product":"Red Hat Enterprise Linux 10.0 Extended Update Support","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"libtiff","defaultStatus":"affected","versions":[{"version":"0:4.6.0-6.el10_0.2","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/o:redhat:enterprise_linux_eus:10.0"]},{"vendor":"Red Hat","product":"Red Hat Enterprise Linux 8","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"libtiff","defaultStatus":"affected","versions":[{"version":"0:4.0.9-32.el8_10","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:enterprise_linux:8::appstream","cpe:/a:redhat:enterprise_linux:8::crb"]},{"vendor":"Red Hat","product":"Red Hat Enterprise Linux 9","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"libtiff","defaultStatus":"affected","versions":[{"version":"0:4.4.0-15.el9","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:enterprise_linux:9::appstream","cpe:/a:redhat:enterprise_linux:9::crb"]},{"vendor":"Red Hat","product":"Red Hat Enterprise Linux 9.6 Extended Update Support","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"libtiff","defaultStatus":"affected","versions":[{"version":"0:4.4.0-13.el9_6.3","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:rhel_eus:9.6::appstream","cpe:/a:redhat:rhel_eus:9.6::crb"]},{"vendor":"Red Hat","product":"Red Hat AI Inference Server 3.2","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"rhaiis/vllm-cuda-rhel9","defaultStatus":"affected","versions":[{"version":"3.2.2-1765379088","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:ai_inference_server:3.2::el9"]},{"vendor":"Red Hat","product":"Red Hat AI Inference Server 3.2","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"rhaiis/vllm-rocm-rhel9","defaultStatus":"affected","versions":[{"version":"3.2.2-1765379049","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:ai_inference_server:3.2::el9"]},{"vendor":"Red Hat","product":"Red Hat AI Inference Server 3.2","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"rhaiis/model-opt-cuda-rhel9","defaultStatus":"affected","versions":[{"version":"3.2.2-1764871796","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:ai_inference_server:3.2::el9"]},{"vendor":"Red Hat","product":"Red Hat AI Inference Server 3.2","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"rhaiis/vllm-cuda-rhel9","defaultStatus":"affected","versions":[{"version":"1772160593","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:ai_inference_server:3.2::el9"]},{"vendor":"Red Hat","product":"Red Hat AI Inference Server 3.2","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"rhaiis/vllm-rocm-rhel9","defaultStatus":"affected","versions":[{"version":"1772160625","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:ai_inference_server:3.2::el9"]},{"vendor":"Red Hat","product":"Red Hat AI Inference Server 3.2","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"rhaiis/vllm-cuda-rhel9","defaultStatus":"affected","versions":[{"version":"1775740563","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:ai_inference_server:3.2::el9"]},{"vendor":"Red Hat","product":"Red Hat AI Inference Server 3.3","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"rhaiis/vllm-spyre-rhel9","defaultStatus":"affected","versions":[{"version":"1778244546","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:ai_inference_server:3.3::el9"]},{"vendor":"Red Hat","product":"Red Hat AI Inference Server 3.3","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"rhaiis/vllm-cuda-rhel9","defaultStatus":"affected","versions":[{"version":"1775680192","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:ai_inference_server:3.3::el9"]},{"vendor":"Red Hat","product":"Red Hat AI Inference Server 3.3","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"rhaiis/vllm-rocm-rhel9","defaultStatus":"affected","versions":[{"version":"1775680262","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:ai_inference_server:3.3::el9"]},{"vendor":"Red Hat","product":"Red Hat AI Inference Server 3.3","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"rhaiis/model-opt-cuda-rhel9","defaultStatus":"affected","versions":[{"version":"1775749857","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:ai_inference_server:3.3::el9"]},{"vendor":"Red Hat","product":"Red Hat Discovery 2","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"discovery/discovery-ui-rhel9","defaultStatus":"affected","versions":[{"version":"2.4.0-1763656152","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:discovery:2::el9"]},{"vendor":"Red Hat","product":"Red Hat Enterprise Linux 6","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"libtiff","defaultStatus":"unknown","cpes":["cpe:/o:redhat:enterprise_linux:6"]},{"vendor":"Red Hat","product":"Red Hat Enterprise Linux 7","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"compat-libtiff3","defaultStatus":"unknown","cpes":["cpe:/o:redhat:enterprise_linux:7"]},{"vendor":"Red Hat","product":"Red Hat Enterprise Linux 7","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"libtiff","defaultStatus":"unknown","cpes":["cpe:/o:redhat:enterprise_linux:7"]},{"vendor":"Red Hat","product":"Red Hat Enterprise Linux 8","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"compat-libtiff3","defaultStatus":"affected","cpes":["cpe:/o:redhat:enterprise_linux:8"]}],"references":[{"url":"https://access.redhat.com/errata/RHSA-2024:5079","name":"RHSA-2024:5079","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2025:20801","name":"RHSA-2025:20801","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2025:21994","name":"RHSA-2025:21994","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2025:23078","name":"RHSA-2025:23078","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2025:23079","name":"RHSA-2025:23079","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2025:23080","name":"RHSA-2025:23080","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2026:16174","name":"RHSA-2026:16174","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2026:3461","name":"RHSA-2026:3461","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2026:3462","name":"RHSA-2026:3462","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2026:5958","name":"RHSA-2026:5958","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2026:7081","name":"RHSA-2026:7081","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2026:7304","name":"RHSA-2026:7304","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2026:7335","name":"RHSA-2026:7335","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2026:8746","name":"RHSA-2026:8746","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2026:8747","name":"RHSA-2026:8747","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2026:8748","name":"RHSA-2026:8748","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/security/cve/CVE-2023-52356","tags":["vdb-entry","x_refsource_REDHAT"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2251344","name":"RHBZ#2251344","tags":["issue-tracking","x_refsource_REDHAT"]},{"url":"https://gitlab.com/libtiff/libtiff/-/issues/622"},{"url":"https://gitlab.com/libtiff/libtiff/-/merge_requests/546"}],"datePublic":"2023-11-03T00:00:00.000Z","problemTypes":[{"descriptions":[{"cweId":"CWE-122","description":"Heap-based Buffer Overflow","lang":"en","type":"CWE"}]}],"x_redhatCweChain":"CWE-122: Heap-based Buffer Overflow","timeline":[{"lang":"en","time":"2023-11-24T00:00:00.000Z","value":"Reported to Red Hat."},{"lang":"en","time":"2023-11-03T00:00:00.000Z","value":"Made public."}],"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2026-05-12T08:27:15.314Z"},"x_generator":{"engine":"cvelib 1.8.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://access.redhat.com/security/cve/CVE-2023-52356","tags":["vdb-entry","x_refsource_REDHAT","x_transferred"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2251344","name":"RHBZ#2251344","tags":["issue-tracking","x_refsource_REDHAT","x_transferred"]},{"url":"https://gitlab.com/libtiff/libtiff/-/issues/622","tags":["x_transferred"]},{"url":"https://gitlab.com/libtiff/libtiff/-/merge_requests/546","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html","tags":["x_transferred"]},{"url":"https://support.apple.com/kb/HT214119","tags":["x_transferred"]},{"url":"https://support.apple.com/kb/HT214123","tags":["x_transferred"]},{"url":"https://support.apple.com/kb/HT214122","tags":["x_transferred"]},{"url":"https://support.apple.com/kb/HT214117","tags":["x_transferred"]},{"url":"https://support.apple.com/kb/HT214118","tags":["x_transferred"]},{"url":"https://support.apple.com/kb/HT214116","tags":["x_transferred"]},{"url":"https://support.apple.com/kb/HT214120","tags":["x_transferred"]},{"url":"https://support.apple.com/kb/HT214124","tags":["x_transferred"]},{"url":"http://seclists.org/fulldisclosure/2024/Jul/16","tags":["x_transferred"]},{"url":"http://seclists.org/fulldisclosure/2024/Jul/23","tags":["x_transferred"]},{"url":"http://seclists.org/fulldisclosure/2024/Jul/21","tags":["x_transferred"]},{"url":"http://seclists.org/fulldisclosure/2024/Jul/20","tags":["x_transferred"]},{"url":"http://seclists.org/fulldisclosure/2024/Jul/17","tags":["x_transferred"]},{"url":"http://seclists.org/fulldisclosure/2024/Jul/22","tags":["x_transferred"]},{"url":"http://seclists.org/fulldisclosure/2024/Jul/18","tags":["x_transferred"]},{"url":"http://seclists.org/fulldisclosure/2024/Jul/19","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00019.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T20:36:13.850Z"}},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2023-52356","role":"CISA Coordinator","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-01-28T01:27:48.546657Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-17T21:19:29.445Z"}}]},"dataVersion":"5.2"}