PatchSiren cyber security CVE debrief
CVE-2016-10095 Libtiff CVE debrief
CVE-2016-10095 is a stack-based buffer overflow in LibTIFF's _TIFFVGetField function in tif_dir.c. NVD describes the impact as a denial of service/crash when processing a crafted TIFF file, and maps the issue to CWE-119. The CVE was published by NVD on 2017-03-01. NVD's CVSS v3.0 vector is AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H, so the scoring reflects a user-interaction-dependent, local attack path even though the narrative description emphasizes attacker-supplied TIFF input.
- Vendor
- Libtiff
- Product
- CVE-2016-10095
- CVSS
- MEDIUM 5.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-03-01
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-03-01
- Advisory updated
- 2026-05-13
Who should care
Security and platform teams that deploy LibTIFF directly or indirectly, especially in image viewers, document ingestion pipelines, thumbnailing/conversion services, scanners, and any application that parses untrusted TIFF files.
Technical summary
The flaw is a stack-based buffer overflow in _TIFFVGetField within tif_dir.c. According to NVD, a crafted TIFF file can trigger the overflow and crash the affected process, resulting in availability impact only. The record classifies the weakness as CWE-119. The published CVSS vector indicates no confidentiality or integrity impact, but high availability impact, with user interaction required.
Defensive priority
Medium. Raise to high if LibTIFF is used in automated or internet-facing workflows that process untrusted TIFF content.
Recommended defensive actions
- Inventory systems and applications that depend on LibTIFF, including indirect dependencies in image-processing stacks.
- Apply the vendor's patched LibTIFF release or downstream security update once confirmed by your distribution or vendor advisory.
- Restrict TIFF parsing to trusted inputs where possible, and sandbox or isolate conversion services that must handle external files.
- Add file-type validation and input handling controls so malformed or unexpected TIFFs are rejected before reaching LibTIFF.
- Monitor crash reports and security advisories related to LibTIFF, especially Debian, Gentoo, OSS-security, and NVD references linked to this CVE.
Evidence notes
All claims are drawn from the supplied NVD record and the listed references. The vulnerability description and CWE come from the NVD metadata. The publication date is taken from the CVE record, and the reference set includes the MapTools issue tracker entry, Debian DSA-3903, two oss-security posts, SecurityFocus BID 95178, and a Gentoo advisory. No fixed-version claim is made here because the supplied corpus does not confirm one.
Official resources
-
CVE-2016-10095 CVE record
CVE.org
-
CVE-2016-10095 NVD detail
NVD
-
Source item URL
nvd_modified
-
Source reference
[email protected] - Exploit, Issue Tracking
- Source reference
-
Mitigation or vendor reference
[email protected] - Mailing List, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Mailing List, Third Party Advisory
- Source reference
-
Mitigation or vendor reference
[email protected] - Exploit, Third Party Advisory
NVD published CVE-2016-10095 on 2017-03-01 and last modified the record on 2026-05-13. The NVD reference list includes issue-tracker and third-party advisories dated 2017-01-01.