-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerable functions were identified primarily from the stack trace provided in the Bugzilla report (http://bugzilla.maptools.org/show_bug.cgi?id=2664), which pinpoints the exact location of the crash (LZWEncode) and the preceding calls (TIFFWriteScanline, main() in bmp2tiff.c). The patch diff for bmp2tiff.c confirms that its 'main' function lacked necessary input validation, making it a key component in triggering the vulnerability. LZWEncode is where the over-read occurs, main() (in bmp2tiff) is the entry point for malicious input and where validation was missing, and TIFFWriteScanline is the intermediary. All three would appear in a runtime profile during exploitation of the unpatched version.
Ongoing coverage of React2Shell