7.5
CVSSv2

CVE-2005-1544

Published: 14/05/2005 Updated: 11/07/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in libTIFF prior to 3.7.2 allows remote malicious users to execute arbitrary code via a TIFF file with a malformed BitsPerSample tag.

Vulnerable Product Search on Vulmon Subscribe to Product

libtiff libtiff 3.5.4

libtiff libtiff 3.5.5

libtiff libtiff 3.4

libtiff libtiff 3.5.1

libtiff libtiff 3.6.0

libtiff libtiff 3.6.1

libtiff libtiff 3.5.2

libtiff libtiff 3.5.3

libtiff libtiff 3.7.0

libtiff libtiff 3.7.1

libtiff libtiff 3.5.6

libtiff libtiff 3.5.7

Vendor Advisories

Tavis Ormandy discovered a buffer overflow in the TIFF library A malicious image with an invalid “bits per sample” number could be constructed which, when decoded, would have resulted in execution of arbitrary code with the privileges of the process using the library ...
Frank Warmerdam discovered a stack-based buffer overflow in libtiff, the Tag Image File Format library for processing TIFF graphics files that can lead to the execution of arbitrary code via malformed TIFF files For the old stable distribution (woody) this problem has been fixed in version 355-7 For the stable distribution (sarge) this problem ...

Exploits

/* LibTIFF exploit Tested on LibTIFF 371 Coded by Agustin Gianni (agustingianni at gmailcom) and Samelat Blog: grubablogspotcom In other versions and/or Linux distributions you might need to adjust some offsets gr00vy@kenny:/home/gr00vy/EXPLOIT$ make libtiff_exploit cc libtiff_exploitc -o libtiff_exploit gr00vy@kenny:/ho ...