4.3
CVSSv2

CVE-2010-2630

Published: 06/07/2010 Updated: 15/05/2013
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

The TIFFReadDirectory function in LibTIFF 3.9.0 does not properly validate the data types of codec-specific tags that have an out-of-order position in a TIFF file, which allows remote malicious users to cause a denial of service (application crash) via a crafted file, a different vulnerability than CVE-2010-2481.

Vulnerable Product Search on Vulmon Subscribe to Product

libtiff libtiff 3.9.0

Vendor Advisories

Debian Bug report logs - #678140 Two tiff issues: CVE-2012-2113 / CVE-2012-2088 Package: tiff; Maintainer for tiff is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Reported by: Moritz Muehlenhoff <muehlenhoff@univentionde> Date: Tue, 19 Jun 2012 14:09:03 UTC Severity: grave Tags: security Found in version 394-5+sque ...
Several vulnerabilities were discovered in TIFF, a library set and tools to support the Tag Image File Format (TIFF), allowing denial of service and potential privilege escalation These vulnerabilities can be exploited via a specially crafted TIFF image CVE-2012-2113 The tiff2pdf utility has an integer overflow error when parsing images CVE-2 ...
Certain applications could be made to run programs as your login if they opened a specially crafted TIFF file ...
Fix regression in CCITTFAX4 processing ...

Exploits

source: wwwsecurityfocuscom/bid/41475/info LibTIFF is prone to a denial-of-service vulnerability because it fails to properly validate user-supplied input An attacker can exploit this issue to crash an application that uses the vulnerable library, denying service to legitimate users githubcom/offensive-security/exploitdb-bin ...