ALAS-2012-106 --- libtiffID: oval:org.secpod.oval:def:1601364 | Date: (C)2020-11-27 (M)2024-02-19 |
Class: PATCH | Family: unix |
libtiff did not properly convert between signed and unsigned integer values, leading to a buffer overflow. An attacker could use this flaw to create a specially-crafted TIFF file that, when opened, would cause an application linked against libtiff to crash or, possibly, execute arbitrary code. Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in the tiff2pdf tool. An attacker could use these flaws to create a specially-crafted TIFF file that would cause tiff2pdf to crash or, possibly, execute arbitrary code
Platform: |
Amazon Linux AMI |