The OJPEGPostDecode function in tif_ojpeg.c in LibTIFF 3.9.0 and 3.9.2, as used in tiff2ps, allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted TIFF image, related to "downsampled OJPEG input."
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugzilla.maptools.org/show_bug.cgi?id=2209 - | |
References | () http://marc.info/?l=oss-security&m=127731610612908&w=2 - | |
References | () http://secunia.com/advisories/40422 - | |
References | () http://secunia.com/advisories/50726 - | |
References | () http://security.gentoo.org/glsa/glsa-201209-02.xml - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=583081 - Exploit |
Information
Published : 2010-07-02 12:43
Updated : 2024-11-21 01:16
NVD link : CVE-2010-2596
Mitre link : CVE-2010-2596
CVE.ORG link : CVE-2010-2596
JSON object : View
Products Affected
libtiff
- libtiff
CWE
CWE-20
Improper Input Validation