Heap-based buffer overflow in tif_ojpeg.c in the OJPEG decoder in LibTIFF before 3.9.5 allows remote attackers to execute arbitrary code via a crafted TIFF file.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugzilla.maptools.org/show_bug.cgi?id=1999 - Exploit | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058478.html - | |
References | () http://openwall.com/lists/oss-security/2011/04/12/10 - Exploit | |
References | () http://secunia.com/advisories/44271 - Vendor Advisory | |
References | () http://secunia.com/advisories/50726 - | |
References | () http://security.gentoo.org/glsa/glsa-201209-02.xml - | |
References | () http://securitytracker.com/id?1025380 - | |
References | () http://www.debian.org/security/2011/dsa-2256 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2011:078 - | |
References | () http://www.redhat.com/support/errata/RHSA-2011-0452.html - | |
References | () http://www.remotesensing.org/libtiff/v3.9.5.html - Patch | |
References | () http://www.securityfocus.com/bid/47338 - | |
References | () http://www.ubuntu.com/usn/USN-1120-1 - | |
References | () http://www.vupen.com/english/advisories/2011/1014 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2011/1082 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=695885 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/66774 - |
Information
Published : 2011-05-03 20:55
Updated : 2024-11-21 01:11
NVD link : CVE-2009-5022
Mitre link : CVE-2009-5022
CVE.ORG link : CVE-2009-5022
JSON object : View
Products Affected
libtiff
- libtiff
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer