Heap-based buffer overflow in the PackBitsPreEncode function in tif_packbits.c in bmp2tiff in libtiff 4.0.6 and earlier allows remote attackers to execute arbitrary code or cause a denial of service via a large width field in a BMP image.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 02:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/135080/libtiff-4.0.6-Heap-Overflow.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://rhn.redhat.com/errata/RHSA-2016-1546.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-1547.html - Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html - Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html - Third Party Advisory | |
References | () http://www.securityfocus.com/archive/1/537208/100/0/threaded - Broken Link, VDB Entry | |
References | () https://security.gentoo.org/glsa/201701-16 - Third Party Advisory |
20 Dec 2023, 18:28
Type | Values Removed | Values Added |
---|---|---|
First Time |
Redhat enterprise Linux Desktop
Oracle Redhat enterprise Linux Redhat enterprise Linux Workstation Oracle vm Server Oracle linux Redhat |
|
CPE | cpe:2.3:a:oracle:vm_server:3.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:* cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:vm_server:3.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* |
|
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2016-1547.html - Third Party Advisory | |
References | (CONFIRM) http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html - Third Party Advisory | |
References | (CONFIRM) http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html - Third Party Advisory | |
References | (MISC) http://packetstormsecurity.com/files/135080/libtiff-4.0.6-Heap-Overflow.html - Exploit, Third Party Advisory, VDB Entry | |
References | (GENTOO) https://security.gentoo.org/glsa/201701-16 - Third Party Advisory | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2016-1546.html - Third Party Advisory | |
References | (BUGTRAQ) http://www.securityfocus.com/archive/1/537208/100/0/threaded - Broken Link, VDB Entry | |
CWE | CWE-787 |
Information
Published : 2016-01-08 19:59
Updated : 2024-11-21 02:38
NVD link : CVE-2015-8668
Mitre link : CVE-2015-8668
CVE.ORG link : CVE-2015-8668
JSON object : View
Products Affected
oracle
- vm_server
- linux
redhat
- enterprise_linux
- enterprise_linux_desktop
- enterprise_linux_workstation
libtiff
- libtiff
CWE
CWE-787
Out-of-bounds Write