CVE-2010-2067

Stack-based buffer overflow in the TIFFFetchSubjectDistance function in tif_dirread.c in LibTIFF before 3.9.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long EXIF SubjectDistance field in a TIFF file.
References
Link Resource
http://bugzilla.maptools.org/show_bug.cgi?id=2212 Issue Tracking Third Party Advisory
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=874 Broken Link
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html Mailing List Third Party Advisory
http://marc.info/?l=oss-security&m=127731610612908&w=2 Mailing List Third Party Advisory
http://osvdb.org/65676 Broken Link
http://secunia.com/advisories/40241 Third Party Advisory
http://secunia.com/advisories/40381 Third Party Advisory
http://secunia.com/advisories/50726 Third Party Advisory
http://security.gentoo.org/glsa/glsa-201209-02.xml Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.596424 Third Party Advisory
http://www.remotesensing.org/libtiff/v3.9.4.html Broken Link
http://www.ubuntu.com/usn/USN-954-1 Third Party Advisory
http://www.vupen.com/english/advisories/2010/1638 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=599576 Issue Tracking Third Party Advisory
http://bugzilla.maptools.org/show_bug.cgi?id=2212 Issue Tracking Third Party Advisory
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=874 Broken Link
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html Mailing List Third Party Advisory
http://marc.info/?l=oss-security&m=127731610612908&w=2 Mailing List Third Party Advisory
http://osvdb.org/65676 Broken Link
http://secunia.com/advisories/40241 Third Party Advisory
http://secunia.com/advisories/40381 Third Party Advisory
http://secunia.com/advisories/50726 Third Party Advisory
http://security.gentoo.org/glsa/glsa-201209-02.xml Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.596424 Third Party Advisory
http://www.remotesensing.org/libtiff/v3.9.4.html Broken Link
http://www.ubuntu.com/usn/USN-954-1 Third Party Advisory
http://www.vupen.com/english/advisories/2010/1638 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=599576 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*

History

21 Nov 2024, 01:15

Type Values Removed Values Added
References () http://bugzilla.maptools.org/show_bug.cgi?id=2212 - Issue Tracking, Third Party Advisory () http://bugzilla.maptools.org/show_bug.cgi?id=2212 - Issue Tracking, Third Party Advisory
References () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=874 - Broken Link () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=874 - Broken Link
References () http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html - Mailing List, Third Party Advisory
References () http://marc.info/?l=oss-security&m=127731610612908&w=2 - Mailing List, Third Party Advisory () http://marc.info/?l=oss-security&m=127731610612908&w=2 - Mailing List, Third Party Advisory
References () http://osvdb.org/65676 - Broken Link () http://osvdb.org/65676 - Broken Link
References () http://secunia.com/advisories/40241 - Third Party Advisory () http://secunia.com/advisories/40241 - Third Party Advisory
References () http://secunia.com/advisories/40381 - Third Party Advisory () http://secunia.com/advisories/40381 - Third Party Advisory
References () http://secunia.com/advisories/50726 - Third Party Advisory () http://secunia.com/advisories/50726 - Third Party Advisory
References () http://security.gentoo.org/glsa/glsa-201209-02.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-201209-02.xml - Third Party Advisory
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.596424 - Third Party Advisory () http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.596424 - Third Party Advisory
References () http://www.remotesensing.org/libtiff/v3.9.4.html - Broken Link () http://www.remotesensing.org/libtiff/v3.9.4.html - Broken Link
References () http://www.ubuntu.com/usn/USN-954-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-954-1 - Third Party Advisory
References () http://www.vupen.com/english/advisories/2010/1638 - Third Party Advisory () http://www.vupen.com/english/advisories/2010/1638 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=599576 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=599576 - Issue Tracking, Third Party Advisory

Information

Published : 2010-06-24 12:30

Updated : 2024-11-21 01:15


NVD link : CVE-2010-2067

Mitre link : CVE-2010-2067

CVE.ORG link : CVE-2010-2067


JSON object : View

Products Affected

canonical

  • ubuntu_linux

libtiff

  • libtiff
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer