ALAS-2014-365 ---- libtiffID: oval:org.secpod.oval:def:1600122 | Date: (C)2016-01-07 (M)2023-12-07 |
Class: PATCH | Family: unix |
Use-after-free vulnerability in the t2p_readwrite_pdf_image function in tools/tiff2pdf.c in libtiff 4.0.3 allows remote attackers to cause a denial of service or possible execute arbitrary code via a crafted TIFF image. The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service or possibly execute arbitrary code via a crafted GIF image. Heap-based buffer overflow in the readgifimage function in the gif2tiff tool in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted height and width values in a GIF image. Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service via a crafted extension block in a GIF image or GIF raster image to tools/gif2tiff.c or a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size.
Platform: |
Amazon Linux AMI |