PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-9273 Libtiff CVE debrief

CVE-2016-9273 is a denial-of-service issue in libtiff’s tiffsplit utility. A crafted TIFF file can trigger an out-of-bounds read when TIFF_STRIPCHOP mode changes td_nstrips, potentially crashing the process or otherwise disrupting service. The record was publicly published on 2017-01-18 and is rated CVSS 5.5 (Medium).

Vendor
Libtiff
Product
CVE-2016-9273
CVSS
MEDIUM 5.5
CISA KEV
Not listed in stored evidence
Original CVE published
2017-01-18
Original CVE updated
2026-05-13
Advisory published
2017-01-18
Advisory updated
2026-05-13

Who should care

Organizations that process untrusted TIFF files with libtiff, especially workflows that invoke tiffsplit or related image-processing utilities. This matters most for desktop users, file-conversion services, document pipelines, and any application that accepts attacker-controlled TIFF content.

Technical summary

The official record maps the issue to CWE-125 (out-of-bounds read) and identifies libtiff 4.0.6 as vulnerable. The CVSS vector (AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) indicates a user must interact with a crafted file and that the primary impact is availability. The reported condition involves td_nstrips being changed in TIFF_STRIPCHOP mode, which can cause tiffsplit to read beyond valid bounds.

Defensive priority

Medium. The main impact is availability, but the issue can still be relevant in any environment that routinely opens untrusted TIFF files. Prioritize if libtiff is part of a high-volume file ingestion or conversion path.

Recommended defensive actions

  • Inventory systems that ship or depend on libtiff, including any use of tiffsplit.
  • Limit or sandbox processing of untrusted TIFF files where practical.
  • Apply vendor or distribution updates referenced for this CVE when available.
  • Monitor crash reports and abnormal exits in TIFF-processing workflows.
  • Treat TIFF files from untrusted sources as potentially malicious input and validate them before processing.

Evidence notes

The description and CVSS data come from the official CVE/NVD record. NVD lists libtiff 4.0.6 as vulnerable, assigns CWE-125, and gives the vector CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H. MITRE/NVD references include an issue tracker entry, Debian security advisory, OSS security mailing list notices, SecurityFocus, and Gentoo GLSA, all consistent with a publicly disclosed TIFF parsing flaw causing denial of service.

Official resources

Publicly disclosed on 2017-01-18, based on the CVE published date provided in the source record.