{"id":"UBUNTU-CVE-2016-10269","details":"LibTIFF 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6 and 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to \"READ of size 512\" and libtiff/tif_unix.c:340:2.","modified":"2026-01-30T02:11:58.590966Z","published":"2017-03-24T00:00:00Z","related":["USN-3602-1"],"upstream":["CVE-2016-10269"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-10269"},{"type":"REPORT","url":"https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3602-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2016-10269"}],"affected":[{"package":{"name":"tiff","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/tiff@4.0.3-7ubuntu0.8?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.0.3-7ubuntu0.8"}]}],"versions":["4.0.2-4ubuntu3","4.0.3-5ubuntu1","4.0.3-6","4.0.3-6ubuntu1","4.0.3-7","4.0.3-7ubuntu0.1","4.0.3-7ubuntu0.2","4.0.3-7ubuntu0.3","4.0.3-7ubuntu0.4","4.0.3-7ubuntu0.6","4.0.3-7ubuntu0.7"],"ecosystem_specific":{"binaries":[{"binary_name":"libtiff-opengl","binary_version":"4.0.3-7ubuntu0.8"},{"binary_name":"libtiff-tools","binary_version":"4.0.3-7ubuntu0.8"},{"binary_name":"libtiff4-dev","binary_version":"4.0.3-7ubuntu0.8"},{"binary_name":"libtiff5","binary_version":"4.0.3-7ubuntu0.8"},{"binary_name":"libtiff5-alt-dev","binary_version":"4.0.3-7ubuntu0.8"},{"binary_name":"libtiff5-dev","binary_version":"4.0.3-7ubuntu0.8"},{"binary_name":"libtiffxx5","binary_version":"4.0.3-7ubuntu0.8"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-10269.json"}},{"package":{"name":"tiff","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/tiff@4.0.6-1ubuntu0.3?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.0.6-1ubuntu0.3"}]}],"versions":["4.0.3-12.3ubuntu2","4.0.5-1","4.0.6-1","4.0.6-1ubuntu0.1","4.0.6-1ubuntu0.2"],"ecosystem_specific":{"binaries":[{"binary_name":"libtiff-opengl","binary_version":"4.0.6-1ubuntu0.3"},{"binary_name":"libtiff-tools","binary_version":"4.0.6-1ubuntu0.3"},{"binary_name":"libtiff5","binary_version":"4.0.6-1ubuntu0.3"},{"binary_name":"libtiff5-dev","binary_version":"4.0.6-1ubuntu0.3"},{"binary_name":"libtiffxx5","binary_version":"4.0.6-1ubuntu0.3"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-10269.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"negligible"}]}