PatchSiren cyber security CVE debrief
CVE-2016-9297 Libtiff CVE debrief
CVE-2016-9297 is a denial-of-service vulnerability in LibTiff 4.0.6’s TIFFFetchNormalTag handling. Crafted TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII tag values can trigger an out-of-bounds read, making this a parsing risk for software that processes untrusted TIFF files. NVD assigns CVSS 3.0 7.5 (High), and the mapped weakness is CWE-125.
- Vendor
- Libtiff
- Product
- CVE-2016-9297
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-18
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-18
- Advisory updated
- 2026-05-13
Who should care
Teams that ship, package, or operate software using LibTiff 4.0.6—especially image viewers, conversion pipelines, document processing services, and distro maintainers that parse untrusted TIFF input.
Technical summary
The issue is in TIFFFetchNormalTag, where LibTiff 4.0.6 can read beyond valid bounds when handling specific ASCII-oriented tag encodings (TIFF_SETGET_C16ASCII and TIFF_SETGET_C32_ASCII). NVD classifies the weakness as CWE-125 and rates impact as availability-only with network attack vector, no privileges, and no user interaction.
Defensive priority
High for any environment that parses untrusted TIFF files; prioritize if the library is exposed through internet-facing or automated file-processing workflows.
Recommended defensive actions
- Upgrade LibTiff from 4.0.6 to a patched release or vendor-fixed package.
- Apply downstream distribution updates referenced in vendor and distro advisories.
- Reduce exposure by rejecting or sandboxing untrusted TIFF uploads and conversion jobs.
- Rebuild dependent applications against the fixed LibTiff package.
- Monitor for crashes or abnormal termination in TIFF-processing services while patching is rolled out.
Evidence notes
Primary evidence comes from the NVD/CVE record and the linked vendor/distribution references. The CVE description states the out-of-bounds read in TIFFFetchNormalTag and ties it to crafted TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII tag values. The record maps the affected version to LibTiff 4.0.6 and the weakness to CWE-125. Supporting references include a Bugzilla issue marked as a patch, Debian DSA-3762, Gentoo GLSA-201701-16, and two oss-security mailing list advisories. The CVE was published on 2017-01-18; the later modified timestamp reflects record maintenance, not the original issue date.
Official resources
-
CVE-2016-9297 CVE record
CVE.org
-
CVE-2016-9297 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Patch
- Source reference
-
Mitigation or vendor reference
[email protected] - Mailing List, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Mailing List, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
- Source reference
The CVE record was published on 2017-01-18. The supplied references show discussion and advisory activity before publication in November 2016, followed by vendor and distribution guidance in 2017. The current NVD record was later modified,但