{
  "threat_severity" : "Moderate",
  "public_date" : "2024-07-19T00:00:00Z",
  "bugzilla" : {
    "description" : "libtiff: NULL pointer dereference in tif_dirinfo.c",
    "id" : "2302996",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2302996"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-476",
  "details" : [ "A null pointer dereference flaw was found in Libtiff via `tif_dirinfo.c`. This issue may allow an attacker to trigger memory allocation failures through certain means, such as restricting the heap space size or injecting faults, causing a segmentation fault. This can cause an application crash, eventually leading to a denial of service.", "A null pointer dereference flaw was found in Libtiff via `tif_dirinfo.c`. This issue may allow an attacker to trigger memory allocation failures through certain means, such as restricting the heap space size or injecting faults, causing a segmentation fault. This can cause an application crash, eventually leading to a denial of service." ],
  "statement" : "The null pointer dereference flaw in Libtiff via tif_dirinfo.c is classified as a moderate severity issue rather than a higher severity one because, while it can cause an application crash leading to denial of service, it does not directly compromise the confidentiality, integrity, or availability of data beyond causing downtime. The impact is localized to application stability rather than enabling remote code execution, privilege escalation, or unauthorized data access. Furthermore, exploiting this flaw requires conditions such as inducing memory allocation failures or manipulating the heap, which limits the attack surface and reduces the likelihood of successful exploitation in typical deployment environments.",
  "acknowledgement" : "Red Hat would like to thank Xu Chang (N/A) for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2024-11-05T00:00:00Z",
    "advisory" : "RHSA-2024:8833",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "libtiff-0:4.0.9-33.el8_10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-11-05T00:00:00Z",
    "advisory" : "RHSA-2024:8914",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "libtiff-0:4.4.0-12.el9_4.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.2 Extended Update Support",
    "release_date" : "2024-09-04T00:00:00Z",
    "advisory" : "RHSA-2024:6360",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.2",
    "package" : "libtiff-0:4.4.0-8.el9_2.1"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "libtiff",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "libtiff",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "libtiff",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2024-7006\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-7006" ],
  "name" : "CVE-2024-7006",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}