[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2014-365 ---- libtiff

ID: oval:org.secpod.oval:def:1600122Date: (C)2016-01-07   (M)2023-12-07
Class: PATCHFamily: unix




Use-after-free vulnerability in the t2p_readwrite_pdf_image function in tools/tiff2pdf.c in libtiff 4.0.3 allows remote attackers to cause a denial of service or possible execute arbitrary code via a crafted TIFF image. The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service or possibly execute arbitrary code via a crafted GIF image. Heap-based buffer overflow in the readgifimage function in the gif2tiff tool in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted height and width values in a GIF image. Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service via a crafted extension block in a GIF image or GIF raster image to tools/gif2tiff.c or a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size.

Platform:
Amazon Linux AMI
Product:
libtiff
Reference:
ALAS-2014-365
CVE-2013-4232
CVE-2013-4244
CVE-2013-4243
CVE-2013-4231
CVE    4
CVE-2013-4231
CVE-2013-4232
CVE-2013-4243
CVE-2013-4244
...
CPE    61
cpe:/o:amazon:linux
cpe:/a:libtiff:libtiff:3.9.2-5.2.1
cpe:/a:libtiff:libtiff:4.0.3
cpe:/a:libtiff:libtiff:4.0.2
...

© SecPod Technologies