CVE-2010-1411

Multiple integer overflows in the Fax3SetupState function in tif_fax3.c in the FAX3 decoder in LibTIFF before 3.9.3, as used in ImageIO in Apple Mac OS X 10.5.8 and Mac OS X 10.6 before 10.6.4, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF file that triggers a heap-based buffer overflow.
References
Link Resource
http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html Vendor Advisory
http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043769.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043835.html
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
http://marc.info/?l=oss-security&m=127731610612908&w=2
http://secunia.com/advisories/40181
http://secunia.com/advisories/40196
http://secunia.com/advisories/40220 Vendor Advisory
http://secunia.com/advisories/40381
http://secunia.com/advisories/40478
http://secunia.com/advisories/40527
http://secunia.com/advisories/40536
http://secunia.com/advisories/50726
http://security.gentoo.org/glsa/glsa-201209-02.xml
http://securitytracker.com/id?1024103
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.596424
http://support.apple.com/kb/HT4188 Patch Vendor Advisory
http://support.apple.com/kb/HT4196
http://support.apple.com/kb/HT4220
http://www.redhat.com/support/errata/RHSA-2010-0519.html
http://www.redhat.com/support/errata/RHSA-2010-0520.html
http://www.remotesensing.org/libtiff/v3.9.3.html
http://www.securityfocus.com/bid/40823
http://www.ubuntu.com/usn/USN-954-1
http://www.vupen.com/english/advisories/2010/1435
http://www.vupen.com/english/advisories/2010/1481 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1512
http://www.vupen.com/english/advisories/2010/1638
http://www.vupen.com/english/advisories/2010/1731
http://www.vupen.com/english/advisories/2010/1761
https://bugzilla.redhat.com/show_bug.cgi?id=592361
http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html Vendor Advisory
http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043769.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043835.html
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
http://marc.info/?l=oss-security&m=127731610612908&w=2
http://secunia.com/advisories/40181
http://secunia.com/advisories/40196
http://secunia.com/advisories/40220 Vendor Advisory
http://secunia.com/advisories/40381
http://secunia.com/advisories/40478
http://secunia.com/advisories/40527
http://secunia.com/advisories/40536
http://secunia.com/advisories/50726
http://security.gentoo.org/glsa/glsa-201209-02.xml
http://securitytracker.com/id?1024103
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.596424
http://support.apple.com/kb/HT4188 Patch Vendor Advisory
http://support.apple.com/kb/HT4196
http://support.apple.com/kb/HT4220
http://www.redhat.com/support/errata/RHSA-2010-0519.html
http://www.redhat.com/support/errata/RHSA-2010-0520.html
http://www.remotesensing.org/libtiff/v3.9.3.html
http://www.securityfocus.com/bid/40823
http://www.ubuntu.com/usn/USN-954-1
http://www.vupen.com/english/advisories/2010/1435
http://www.vupen.com/english/advisories/2010/1481 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1512
http://www.vupen.com/english/advisories/2010/1638
http://www.vupen.com/english/advisories/2010/1731
http://www.vupen.com/english/advisories/2010/1761
https://bugzilla.redhat.com/show_bug.cgi?id=592361
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*

History

21 Nov 2024, 01:14

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html - Vendor Advisory () http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html - Vendor Advisory
References () http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html - () http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043769.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043769.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043835.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043835.html -
References () http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html - () http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html -
References () http://marc.info/?l=oss-security&m=127731610612908&w=2 - () http://marc.info/?l=oss-security&m=127731610612908&w=2 -
References () http://secunia.com/advisories/40181 - () http://secunia.com/advisories/40181 -
References () http://secunia.com/advisories/40196 - () http://secunia.com/advisories/40196 -
References () http://secunia.com/advisories/40220 - Vendor Advisory () http://secunia.com/advisories/40220 - Vendor Advisory
References () http://secunia.com/advisories/40381 - () http://secunia.com/advisories/40381 -
References () http://secunia.com/advisories/40478 - () http://secunia.com/advisories/40478 -
References () http://secunia.com/advisories/40527 - () http://secunia.com/advisories/40527 -
References () http://secunia.com/advisories/40536 - () http://secunia.com/advisories/40536 -
References () http://secunia.com/advisories/50726 - () http://secunia.com/advisories/50726 -
References () http://security.gentoo.org/glsa/glsa-201209-02.xml - () http://security.gentoo.org/glsa/glsa-201209-02.xml -
References () http://securitytracker.com/id?1024103 - () http://securitytracker.com/id?1024103 -
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.596424 - () http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.596424 -
References () http://support.apple.com/kb/HT4188 - Patch, Vendor Advisory () http://support.apple.com/kb/HT4188 - Patch, Vendor Advisory
References () http://support.apple.com/kb/HT4196 - () http://support.apple.com/kb/HT4196 -
References () http://support.apple.com/kb/HT4220 - () http://support.apple.com/kb/HT4220 -
References () http://www.redhat.com/support/errata/RHSA-2010-0519.html - () http://www.redhat.com/support/errata/RHSA-2010-0519.html -
References () http://www.redhat.com/support/errata/RHSA-2010-0520.html - () http://www.redhat.com/support/errata/RHSA-2010-0520.html -
References () http://www.remotesensing.org/libtiff/v3.9.3.html - () http://www.remotesensing.org/libtiff/v3.9.3.html -
References () http://www.securityfocus.com/bid/40823 - () http://www.securityfocus.com/bid/40823 -
References () http://www.ubuntu.com/usn/USN-954-1 - () http://www.ubuntu.com/usn/USN-954-1 -
References () http://www.vupen.com/english/advisories/2010/1435 - () http://www.vupen.com/english/advisories/2010/1435 -
References () http://www.vupen.com/english/advisories/2010/1481 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1481 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/1512 - () http://www.vupen.com/english/advisories/2010/1512 -
References () http://www.vupen.com/english/advisories/2010/1638 - () http://www.vupen.com/english/advisories/2010/1638 -
References () http://www.vupen.com/english/advisories/2010/1731 - () http://www.vupen.com/english/advisories/2010/1731 -
References () http://www.vupen.com/english/advisories/2010/1761 - () http://www.vupen.com/english/advisories/2010/1761 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=592361 - () https://bugzilla.redhat.com/show_bug.cgi?id=592361 -

Information

Published : 2010-06-17 16:30

Updated : 2024-11-21 01:14


NVD link : CVE-2010-1411

Mitre link : CVE-2010-1411

CVE.ORG link : CVE-2010-1411


JSON object : View

Products Affected

apple

  • mac_os_x
  • mac_os_x_server
CWE
CWE-189

Numeric Errors