PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-9297 Libtiff CVE debrief

CVE-2016-9297 is a denial-of-service vulnerability in LibTiff 4.0.6’s TIFFFetchNormalTag handling. Crafted TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII tag values can trigger an out-of-bounds read, making this a parsing risk for software that processes untrusted TIFF files. NVD assigns CVSS 3.0 7.5 (High), and the mapped weakness is CWE-125.

Vendor
Libtiff
Product
CVE-2016-9297
CVSS
HIGH 7.5
CISA KEV
Not listed in stored evidence
Original CVE published
2017-01-18
Original CVE updated
2026-05-13
Advisory published
2017-01-18
Advisory updated
2026-05-13

Who should care

Teams that ship, package, or operate software using LibTiff 4.0.6—especially image viewers, conversion pipelines, document processing services, and distro maintainers that parse untrusted TIFF input.

Technical summary

The issue is in TIFFFetchNormalTag, where LibTiff 4.0.6 can read beyond valid bounds when handling specific ASCII-oriented tag encodings (TIFF_SETGET_C16ASCII and TIFF_SETGET_C32_ASCII). NVD classifies the weakness as CWE-125 and rates impact as availability-only with network attack vector, no privileges, and no user interaction.

Defensive priority

High for any environment that parses untrusted TIFF files; prioritize if the library is exposed through internet-facing or automated file-processing workflows.

Recommended defensive actions

  • Upgrade LibTiff from 4.0.6 to a patched release or vendor-fixed package.
  • Apply downstream distribution updates referenced in vendor and distro advisories.
  • Reduce exposure by rejecting or sandboxing untrusted TIFF uploads and conversion jobs.
  • Rebuild dependent applications against the fixed LibTiff package.
  • Monitor for crashes or abnormal termination in TIFF-processing services while patching is rolled out.

Evidence notes

Primary evidence comes from the NVD/CVE record and the linked vendor/distribution references. The CVE description states the out-of-bounds read in TIFFFetchNormalTag and ties it to crafted TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII tag values. The record maps the affected version to LibTiff 4.0.6 and the weakness to CWE-125. Supporting references include a Bugzilla issue marked as a patch, Debian DSA-3762, Gentoo GLSA-201701-16, and two oss-security mailing list advisories. The CVE was published on 2017-01-18; the later modified timestamp reflects record maintenance, not the original issue date.

Official resources

The CVE record was published on 2017-01-18. The supplied references show discussion and advisory activity before publication in November 2016, followed by vendor and distribution guidance in 2017. The current NVD record was later modified,但