CVE-2009-5022

Heap-based buffer overflow in tif_ojpeg.c in the OJPEG decoder in LibTIFF before 3.9.5 allows remote attackers to execute arbitrary code via a crafted TIFF file.
References
Link Resource
http://bugzilla.maptools.org/show_bug.cgi?id=1999 Exploit
http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058478.html
http://openwall.com/lists/oss-security/2011/04/12/10 Exploit
http://secunia.com/advisories/44271 Vendor Advisory
http://secunia.com/advisories/50726
http://security.gentoo.org/glsa/glsa-201209-02.xml
http://securitytracker.com/id?1025380
http://www.debian.org/security/2011/dsa-2256
http://www.mandriva.com/security/advisories?name=MDVSA-2011:078
http://www.redhat.com/support/errata/RHSA-2011-0452.html
http://www.remotesensing.org/libtiff/v3.9.5.html Patch
http://www.securityfocus.com/bid/47338
http://www.ubuntu.com/usn/USN-1120-1
http://www.vupen.com/english/advisories/2011/1014 Vendor Advisory
http://www.vupen.com/english/advisories/2011/1082 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=695885 Exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/66774
http://bugzilla.maptools.org/show_bug.cgi?id=1999 Exploit
http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058478.html
http://openwall.com/lists/oss-security/2011/04/12/10 Exploit
http://secunia.com/advisories/44271 Vendor Advisory
http://secunia.com/advisories/50726
http://security.gentoo.org/glsa/glsa-201209-02.xml
http://securitytracker.com/id?1025380
http://www.debian.org/security/2011/dsa-2256
http://www.mandriva.com/security/advisories?name=MDVSA-2011:078
http://www.redhat.com/support/errata/RHSA-2011-0452.html
http://www.remotesensing.org/libtiff/v3.9.5.html Patch
http://www.securityfocus.com/bid/47338
http://www.ubuntu.com/usn/USN-1120-1
http://www.vupen.com/english/advisories/2011/1014 Vendor Advisory
http://www.vupen.com/english/advisories/2011/1082 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=695885 Exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/66774
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.4:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.4:beta18:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.4:beta24:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.4:beta28:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.4:beta29:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.4:beta31:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.4:beta32:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.4:beta34:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.4:beta35:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.4:beta36:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.4:beta37:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.1:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.2:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.3:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.4:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.5:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.6:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.6:beta:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.7:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.7:alpha:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.7:alpha2:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.7:alpha3:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.7:alpha4:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.7:beta:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.6.0:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.6.0:beta:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.6.0:beta2:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.6.1:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.7.0:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.7.0:alpha:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.7.0:beta:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.7.0:beta2:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.7.1:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.7.2:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.7.3:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.7.4:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.8.0:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.8.1:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.8.2:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.9:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.9.0:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.9.0:beta:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.9.1:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.9.2:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.9.2-5.2.1:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.9.3:*:*:*:*:*:*:*

History

21 Nov 2024, 01:11

Type Values Removed Values Added
References () http://bugzilla.maptools.org/show_bug.cgi?id=1999 - Exploit () http://bugzilla.maptools.org/show_bug.cgi?id=1999 - Exploit
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058478.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058478.html -
References () http://openwall.com/lists/oss-security/2011/04/12/10 - Exploit () http://openwall.com/lists/oss-security/2011/04/12/10 - Exploit
References () http://secunia.com/advisories/44271 - Vendor Advisory () http://secunia.com/advisories/44271 - Vendor Advisory
References () http://secunia.com/advisories/50726 - () http://secunia.com/advisories/50726 -
References () http://security.gentoo.org/glsa/glsa-201209-02.xml - () http://security.gentoo.org/glsa/glsa-201209-02.xml -
References () http://securitytracker.com/id?1025380 - () http://securitytracker.com/id?1025380 -
References () http://www.debian.org/security/2011/dsa-2256 - () http://www.debian.org/security/2011/dsa-2256 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:078 - () http://www.mandriva.com/security/advisories?name=MDVSA-2011:078 -
References () http://www.redhat.com/support/errata/RHSA-2011-0452.html - () http://www.redhat.com/support/errata/RHSA-2011-0452.html -
References () http://www.remotesensing.org/libtiff/v3.9.5.html - Patch () http://www.remotesensing.org/libtiff/v3.9.5.html - Patch
References () http://www.securityfocus.com/bid/47338 - () http://www.securityfocus.com/bid/47338 -
References () http://www.ubuntu.com/usn/USN-1120-1 - () http://www.ubuntu.com/usn/USN-1120-1 -
References () http://www.vupen.com/english/advisories/2011/1014 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/1014 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/1082 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/1082 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=695885 - Exploit () https://bugzilla.redhat.com/show_bug.cgi?id=695885 - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/66774 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/66774 -

Information

Published : 2011-05-03 20:55

Updated : 2024-11-21 01:11


NVD link : CVE-2009-5022

Mitre link : CVE-2009-5022

CVE.ORG link : CVE-2009-5022


JSON object : View

Products Affected

libtiff

  • libtiff
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer