{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/17660?format=json","vulnerability_id":"VCID-7kmu-5yen-hfd1","summary":"NULL Pointer Dereference\nA NULL pointer dereference flaw was found in Libtiff's LZWDecode() function in the libtiff/tif_lzw.c file. This flaw allows a local attacker to craft specific input data that can cause the program to dereference a NULL pointer when decompressing a TIFF format file, resulting in a program crash or denial of service.","aliases":[{"alias":"CVE-2023-2731"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941072?format=json","purl":"pkg:deb/debian/tiff@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941049?format=json","purl":"pkg:deb/debian/tiff@4.2.0-1%2Bdeb11u5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1hfc-b4qr-jqgk"},{"vulnerability":"VCID-38sj-85gt-sfhe"},{"vulnerability":"VCID-4mhv-7vrm-v7hv"},{"vulnerability":"VCID-7zdy-fxq2-p7gf"},{"vulnerability":"VCID-9grz-pkwb-3kc5"},{"vulnerability":"VCID-a8jf-xmj8-cuh6"},{"vulnerability":"VCID-d8kh-h6vs-gqd4"},{"vulnerability":"VCID-dg96-zmw1-8kcp"},{"vulnerability":"VCID-h9ap-xxmw-j7dr"},{"vulnerability":"VCID-ndc5-qn5u-3qbq"},{"vulnerability":"VCID-r186-xqyn-ffey"},{"vulnerability":"VCID-rp7t-x7gz-9udg"},{"vulnerability":"VCID-sqxq-hg7v-d7gv"},{"vulnerability":"VCID-ttb7-w41r-4kfn"},{"vulnerability":"VCID-ukgj-45m7-6uba"},{"vulnerability":"VCID-vju4-pghv-47bx"},{"vulnerability":"VCID-vrtj-45t6-cqec"},{"vulnerability":"VCID-yfxw-tmnn-byc6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.2.0-1%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941136?format=json","purl":"pkg:deb/debian/tiff@4.5.0-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941047?format=json","purl":"pkg:deb/debian/tiff@4.5.0-6%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38sj-85gt-sfhe"},{"vulnerability":"VCID-4mhv-7vrm-v7hv"},{"vulnerability":"VCID-7zdy-fxq2-p7gf"},{"vulnerability":"VCID-9grz-pkwb-3kc5"},{"vulnerability":"VCID-a8jf-xmj8-cuh6"},{"vulnerability":"VCID-b4hb-cxzy-suck"},{"vulnerability":"VCID-d8kh-h6vs-gqd4"},{"vulnerability":"VCID-dg96-zmw1-8kcp"},{"vulnerability":"VCID-ndc5-qn5u-3qbq"},{"vulnerability":"VCID-r186-xqyn-ffey"},{"vulnerability":"VCID-rp7t-x7gz-9udg"},{"vulnerability":"VCID-sqxq-hg7v-d7gv"},{"vulnerability":"VCID-ttb7-w41r-4kfn"},{"vulnerability":"VCID-ukgj-45m7-6uba"},{"vulnerability":"VCID-vju4-pghv-47bx"},{"vulnerability":"VCID-yfxw-tmnn-byc6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.5.0-6%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941051?format=json","purl":"pkg:deb/debian/tiff@4.7.0-3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-7zdy-fxq2-p7gf"},{"vulnerability":"VCID-9grz-pkwb-3kc5"},{"vulnerability":"VCID-dg96-zmw1-8kcp"},{"vulnerability":"VCID-r186-xqyn-ffey"},{"vulnerability":"VCID-sqxq-hg7v-d7gv"},{"vulnerability":"VCID-ttb7-w41r-4kfn"},{"vulnerability":"VCID-vju4-pghv-47bx"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.0-3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941050?format=json","purl":"pkg:deb/debian/tiff@4.7.1-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ttb7-w41r-4kfn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1000494?format=json","purl":"pkg:deb/debian/tiff@4.7.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiff@4.7.1-2%3Fdistro=trixie"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/95896?format=json","purl":"pkg:rpm/redhat/libtiff@4.4.0-10?arch=el9","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2ds7-xq64-9ue2"},{"vulnerability":"VCID-6dt6-ppka-b3ct"},{"vulnerability":"VCID-7kmu-5yen-hfd1"},{"vulnerability":"VCID-ndwc-beev-43ck"},{"vulnerability":"VCID-pkdx-ktz1-mbbg"},{"vulnerability":"VCID-x7w1-k9zt-qkab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libtiff@4.4.0-10%3Farch=el9"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2731.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2731.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2731","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01206","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01143","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01144","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01146","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01136","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01217","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01221","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01228","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01215","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01212","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01209","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01148","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01158","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01164","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01165","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01151","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2731"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2207635","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T18:21:11Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2207635"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/libsdl-org/libtiff/commit/9be22b639ea69e102d3847dca4c53ef025e9527b","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T18:21:11Z/"}],"url":"https://github.com/libsdl-org/libtiff/commit/9be22b639ea69e102d3847dca4c53ef025e9527b"},{"reference_url":"https://gitlab.com/libtiff/libtiff/-/issues/548","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T18:21:11Z/"}],"url":"https://gitlab.com/libtiff/libtiff/-/issues/548"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036282","reference_id":"1036282","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036282"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-2731","reference_id":"CVE-2023-2731","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T18:21:11Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-2731"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2731","reference_id":"CVE-2023-2731","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2731"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230703-0009/","reference_id":"ntap-20230703-0009","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T18:21:11Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230703-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6575","reference_id":"RHSA-2023:6575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6575"},{"reference_url":"https://usn.ubuntu.com/6290-1/","reference_id":"USN-6290-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6290-1/"}],"weaknesses":[{"cwe_id":1035,"name":"OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities","description":"Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017."},{"cwe_id":476,"name":"NULL Pointer Dereference","description":"A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit."},{"cwe_id":937,"name":"OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities","description":"Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013."}],"exploits":[],"severity_range_score":"5.5 - 5.5","exploitability":"0.5","weighted_severity":"5.0","risk_score":2.5,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7kmu-5yen-hfd1"}