[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2012-147 --- libtiff

ID: oval:org.secpod.oval:def:1601296Date: (C)2020-11-27   (M)2023-02-20
Class: PATCHFamily: unix




A heap-based buffer overflow flaw was found in the way libtiff processed certain TIFF images using the Pixar Log Format encoding. An attacker could create a specially-crafted TIFF file that, when opened, could cause an application using libtiff to crash or, possibly, execute arbitrary code with the privileges of the user running the application. A stack-based buffer overflow flaw was found in the way libtiff handled DOTRANGE tags. An attacker could use this flaw to create a specially-crafted TIFF file that, when opened, would cause an application linked against libtiff to crash or, possibly, execute arbitrary code. A heap-based buffer overflow flaw was found in the tiff2pdf tool. An attacker could use this flaw to create a specially-crafted TIFF file that would cause tiff2pdf to crash or, possibly, execute arbitrary code. A missing return value check flaw, leading to a heap-based buffer overflow, was found in the ppm2tiff tool. An attacker could use this flaw to create a specially-crafted PPM file that would cause ppm2tiff to crash or, possibly, execute arbitrary code

Platform:
Amazon Linux AMI
Product:
libtiff
Reference:
ALAS-2012-147
CVE-2012-3401
CVE-2012-4447
CVE-2012-4564
CVE-2012-5581
CVE    4
CVE-2012-4564
CVE-2012-4447
CVE-2012-3401
CVE-2012-5581
...
CPE    60
cpe:/o:amazon:linux
cpe:/a:libtiff:libtiff:3.9.2-5.2.1
cpe:/a:libtiff:libtiff:4.0.2
cpe:/a:libtiff:libtiff:4.0.1
...

© SecPod Technologies