CVE-2013-4231

Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:4.0:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:4.0:alpha:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:4.0:beta1:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:4.0:beta2:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:4.0:beta3:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:4.0:beta4:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:4.0:beta5:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:4.0:beta6:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:4.0.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:55

Type Values Removed Values Added
References () http://bugzilla.maptools.org/show_bug.cgi?id=2450 - () http://bugzilla.maptools.org/show_bug.cgi?id=2450 -
References () http://rhn.redhat.com/errata/RHSA-2014-0223.html - () http://rhn.redhat.com/errata/RHSA-2014-0223.html -
References () http://secunia.com/advisories/54543 - Vendor Advisory () http://secunia.com/advisories/54543 - Vendor Advisory
References () http://secunia.com/advisories/54628 - Vendor Advisory () http://secunia.com/advisories/54628 - Vendor Advisory
References () http://www.asmail.be/msg0055359936.html - () http://www.asmail.be/msg0055359936.html -
References () http://www.debian.org/security/2013/dsa-2744 - () http://www.debian.org/security/2013/dsa-2744 -
References () http://www.openwall.com/lists/oss-security/2013/08/10/2 - () http://www.openwall.com/lists/oss-security/2013/08/10/2 -
References () http://www.securityfocus.com/bid/61695 - () http://www.securityfocus.com/bid/61695 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=995965 - () https://bugzilla.redhat.com/show_bug.cgi?id=995965 -

07 Nov 2023, 02:16

Type Values Removed Values Added
Summary Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size. Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size.

Information

Published : 2014-01-19 17:16

Updated : 2024-11-21 01:55


NVD link : CVE-2013-4231

Mitre link : CVE-2013-4231

CVE.ORG link : CVE-2013-4231


JSON object : View

Products Affected

libtiff

  • libtiff
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer