Computer Security
[EN] securityvulns.ru no-pyccku


libtiff library integer overflow
updated since 09.04.2012
Published:09.07.2012
Source:
SecurityVulns ID:12308
Type:library
Threat Level:
7/10
Description:Integer overflow on tiff parsing.
Affected:LIBTIFF : libtiff 3.9
CVE:CVE-2012-2113 (Multiple integer overflows in tiff2pdf in libtiff before 4.0.2 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.)
 CVE-2012-2088 (Integer signedness error in the TIFFReadDirectory function in tif_dirread.c in libtiff 3.9.4 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a negative tile depth in a tiff image, which triggers an improper conversion between signed and unsigned types, leading to a heap-based buffer overflow.)
 CVE-2012-1173 (Multiple integer overflows in tiff_getimage.c in LibTIFF 3.9.4 allow remote attackers to execute arbitrary code via a crafted tile size in a TIFF file, which is not properly handled by the (1) gtTileSeparate or (2) gtStripSeparate function, leading to a heap-based buffer overflow.)
Original documentdocumentMANDRIVA, [ MDVSA-2012:101 ] libtiff (09.07.2012)
 documentMANDRIVA, [ MDVSA-2012:054 ] libtiff (09.04.2012)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod