[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2012-106 --- libtiff

ID: oval:org.secpod.oval:def:1601364Date: (C)2020-11-27   (M)2024-02-19
Class: PATCHFamily: unix




libtiff did not properly convert between signed and unsigned integer values, leading to a buffer overflow. An attacker could use this flaw to create a specially-crafted TIFF file that, when opened, would cause an application linked against libtiff to crash or, possibly, execute arbitrary code. Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in the tiff2pdf tool. An attacker could use these flaws to create a specially-crafted TIFF file that would cause tiff2pdf to crash or, possibly, execute arbitrary code

Platform:
Amazon Linux AMI
Product:
libtiff
Reference:
ALAS-2012-106
CVE-2012-2088
CVE-2012-2113
CVE    2
CVE-2012-2088
CVE-2012-2113
CPE    58
cpe:/o:amazon:linux
cpe:/a:libtiff:libtiff:3.9.2-5.2.1
cpe:/a:libtiff:libtiff:4.0.1
cpe:/a:libtiff:libtiff:4.0:alpha
...

© SecPod Technologies