Integer overflow in tiffdump utility for libtiff 3.7.1 & earlier allows remote attackers to cause denial of service & possibly execute arbitrary code via crafted TIFF file
Reporter | Title | Published | Views | Family All 35 |
---|---|---|---|---|
![]() | CAN-2004-1183 | 23 Feb 202418:15 | – | cve |
![]() | FreeBSD : tiff -- tiffdump integer overflow vulnerability (8f86d8b5-6025-11d9-a9e7-0001020eed82) | 13 Jul 200500:00 | – | nessus |
![]() | Debian DSA-626-1 : tiff - unsanitised input | 6 Jan 200500:00 | – | nessus |
![]() | Ubuntu 4.10 : tiff vulnerability (USN-54-1) | 15 Jan 200600:00 | – | nessus |
![]() | GLSA-200501-06 : tiff: New overflows in image decoding | 14 Feb 200500:00 | – | nessus |
![]() | RHEL 4 : libtiff (RHSA-2005:035) | 22 Feb 200500:00 | – | nessus |
![]() | SUSE-SA:2005:001: libtiff/tiff | 3 Feb 200500:00 | – | nessus |
![]() | RHEL 2.1 / 3 : libtiff (RHSA-2005:019) | 13 Jan 200500:00 | – | nessus |
![]() | Mandrake Linux Security Advisory : libtiff (MDKSA-2005:001) | 7 Jan 200500:00 | – | nessus |
![]() | Mandrake Linux Security Advisory : wxGTK2 (MDKSA-2005:002) | 7 Jan 200500:00 | – | nessus |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo