10
CVSSv2

CVE-2004-1308

Published: 10/01/2005 Updated: 11/10/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Integer overflow in (1) tif_dirread.c and (2) tif_fax3.c for libtiff 3.5.7 and 3.7.0 allows remote malicious users to execute arbitrary code via a TIFF file containing a TIFF_ASCII or TIFF_UNDEFINED directory entry with a -1 entry count, which leads to a heap-based buffer overflow.

Vulnerable Product Search on Vulmon Subscribe to Product

libtiff libtiff 3.4

libtiff libtiff 3.6.0

libtiff libtiff 3.6.1

libtiff libtiff 3.7.0

libtiff libtiff 3.5.3

libtiff libtiff 3.5.4

libtiff libtiff 3.5.5

libtiff libtiff 3.5.7

libtiff libtiff 3.5.1

libtiff libtiff 3.5.2

Vendor Advisories

A buffer overflow was discovered in the TIFF library A TIFF file includes a value indicating the number of “directory entry” header fields contained in the file If this value is -1, an invalid memory allocation was performed A malicious image could be constructed which, when decoded, would have resulted in execution of arbitrary code with th ...
Synopsis kdegraphics security update Type/Severity Security Advisory: Moderate Topic Updated kdegraphics packages that resolve multiple security issues in kfaxare now availableThis update has been rated as having moderate security impact by the RedHat Security Response Team Description The ...
Synopsis libtiff security update Type/Severity Security Advisory: Important Topic Updated libtiff packages that fix various integer overflows are now available Description The libtiff package contains a library of functions for manipulating TIFF(Tagged Image File Format) image format files ...
Synopsis libtiff security update Type/Severity Security Advisory: Important Topic Updated libtiff packages that fix various integer overflows are nowavailable for Red Hat Enterprise Linux 4This update has been rated as having important security impact by the Red HatSecurity Response Team Descripti ...
"infamous41md" discovered a problem in libtiff, the Tag Image File Format library for processing TIFF graphics files Upon reading a TIFF file it is possible to allocate a zero sized buffer and write to it which would lead to the execution of arbitrary code For the stable distribution (woody) this problem has been fixed in version 355-6woody3 ...