CVE-2010-2065

Integer overflow in the TIFFroundup macro in LibTIFF before 3.9.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TIFF file that triggers a buffer overflow.
References
Link Resource
http://blogs.sun.com/security/entry/cve_2010_2065_cve_2010
http://marc.info/?l=oss-security&m=127731610612908&w=2
http://secunia.com/advisories/40181 Vendor Advisory
http://secunia.com/advisories/40381
http://secunia.com/advisories/50726
http://security.gentoo.org/glsa/glsa-201209-02.xml
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.596424
http://www.mandriva.com/security/advisories?name=MDVSA-2011:043
http://www.remotesensing.org/libtiff/v3.9.3.html
http://www.ubuntu.com/usn/USN-954-1
http://www.vupen.com/english/advisories/2010/1638
http://www.vupen.com/english/advisories/2011/0204
http://www.vupen.com/english/advisories/2011/0621
https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/589565
https://bugzilla.redhat.com/show_bug.cgi?id=601274
http://blogs.sun.com/security/entry/cve_2010_2065_cve_2010
http://marc.info/?l=oss-security&m=127731610612908&w=2
http://secunia.com/advisories/40181 Vendor Advisory
http://secunia.com/advisories/40381
http://secunia.com/advisories/50726
http://security.gentoo.org/glsa/glsa-201209-02.xml
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.596424
http://www.mandriva.com/security/advisories?name=MDVSA-2011:043
http://www.remotesensing.org/libtiff/v3.9.3.html
http://www.ubuntu.com/usn/USN-954-1
http://www.vupen.com/english/advisories/2010/1638
http://www.vupen.com/english/advisories/2011/0204
http://www.vupen.com/english/advisories/2011/0621
https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/589565
https://bugzilla.redhat.com/show_bug.cgi?id=601274
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.4:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.4:beta18:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.4:beta24:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.4:beta28:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.4:beta29:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.4:beta31:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.4:beta32:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.4:beta34:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.4:beta35:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.4:beta36:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.4:beta37:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.1:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.2:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.3:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.4:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.5:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.6:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.6:beta:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.7:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.7:alpha:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.7:alpha2:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.7:alpha3:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.7:alpha4:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.7:beta:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.6.0:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.6.0:beta:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.6.0:beta2:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.6.1:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.7.0:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.7.0:alpha:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.7.0:beta:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.7.0:beta2:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.7.1:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.7.2:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.7.3:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.7.4:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.8.0:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.8.1:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.8.2:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.9:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.9.0:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.9.0:beta:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.9.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:15

Type Values Removed Values Added
References () http://blogs.sun.com/security/entry/cve_2010_2065_cve_2010 - () http://blogs.sun.com/security/entry/cve_2010_2065_cve_2010 -
References () http://marc.info/?l=oss-security&m=127731610612908&w=2 - () http://marc.info/?l=oss-security&m=127731610612908&w=2 -
References () http://secunia.com/advisories/40181 - Vendor Advisory () http://secunia.com/advisories/40181 - Vendor Advisory
References () http://secunia.com/advisories/40381 - () http://secunia.com/advisories/40381 -
References () http://secunia.com/advisories/50726 - () http://secunia.com/advisories/50726 -
References () http://security.gentoo.org/glsa/glsa-201209-02.xml - () http://security.gentoo.org/glsa/glsa-201209-02.xml -
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.596424 - () http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.596424 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:043 - () http://www.mandriva.com/security/advisories?name=MDVSA-2011:043 -
References () http://www.remotesensing.org/libtiff/v3.9.3.html - () http://www.remotesensing.org/libtiff/v3.9.3.html -
References () http://www.ubuntu.com/usn/USN-954-1 - () http://www.ubuntu.com/usn/USN-954-1 -
References () http://www.vupen.com/english/advisories/2010/1638 - () http://www.vupen.com/english/advisories/2010/1638 -
References () http://www.vupen.com/english/advisories/2011/0204 - () http://www.vupen.com/english/advisories/2011/0204 -
References () http://www.vupen.com/english/advisories/2011/0621 - () http://www.vupen.com/english/advisories/2011/0621 -
References () https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/589565 - () https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/589565 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=601274 - () https://bugzilla.redhat.com/show_bug.cgi?id=601274 -

Information

Published : 2010-06-24 12:30

Updated : 2024-11-21 01:15


NVD link : CVE-2010-2065

Mitre link : CVE-2010-2065

CVE.ORG link : CVE-2010-2065


JSON object : View

Products Affected

libtiff

  • libtiff
CWE
CWE-189

Numeric Errors