The exifprocessTIFFinJPEG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not validate TIFF start data, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data.
{
"versions": [
{
"introduced": "5.5.0"
},
{
"fixed": "5.5.35"
},
{
"introduced": "5.6.0"
},
{
"fixed": "5.6.21"
},
{
"introduced": "7.0.0"
},
{
"fixed": "7.0.6"
},
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
}[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "42.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "13.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "24"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-4544.json"