CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
AI Score
Confidence
High
EPSS
Percentile
81.9%
Multiple buffer underflows in the (1) LZWDecode, (2) LZWDecodeCompat, and (3) LZWDecodeVector functions in tif_lzw.c in the LZW decoder in LibTIFF 3.8.2 and earlier allow context-dependent attackers to execute arbitrary code via a crafted TIFF file, related to improper handling of the CODE_CLEAR code.
Vendor | Product | Version | CPE |
---|---|---|---|
libtiff | libtiff | * | cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:* |
libtiff | libtiff | 3.4 | cpe:2.3:a:libtiff:libtiff:3.4:*:*:*:*:*:*:* |
libtiff | libtiff | 3.5.1 | cpe:2.3:a:libtiff:libtiff:3.5.1:*:*:*:*:*:*:* |
libtiff | libtiff | 3.5.2 | cpe:2.3:a:libtiff:libtiff:3.5.2:*:*:*:*:*:*:* |
libtiff | libtiff | 3.5.3 | cpe:2.3:a:libtiff:libtiff:3.5.3:*:*:*:*:*:*:* |
libtiff | libtiff | 3.5.4 | cpe:2.3:a:libtiff:libtiff:3.5.4:*:*:*:*:*:*:* |
libtiff | libtiff | 3.5.5 | cpe:2.3:a:libtiff:libtiff:3.5.5:*:*:*:*:*:*:* |
libtiff | libtiff | 3.5.6 | cpe:2.3:a:libtiff:libtiff:3.5.6:*:*:*:*:*:*:* |
libtiff | libtiff | 3.5.7 | cpe:2.3:a:libtiff:libtiff:3.5.7:*:*:*:*:*:*:* |
libtiff | libtiff | 3.6.0 | cpe:2.3:a:libtiff:libtiff:3.6.0:*:*:*:*:*:*:* |
bugs.gentoo.org/show_bug.cgi?id=234080
lists.apple.com/archives/security-announce//2008/Nov/msg00001.html
lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
lists.apple.com/archives/security-announce/2008/Nov/msg00002.html
lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html
secunia.com/advisories/31610
secunia.com/advisories/31623
secunia.com/advisories/31668
secunia.com/advisories/31670
secunia.com/advisories/31698
secunia.com/advisories/31838
secunia.com/advisories/31882
secunia.com/advisories/31982
secunia.com/advisories/32706
secunia.com/advisories/32756
security-tracker.debian.net/tracker/CVE-2008-2327
security-tracker.debian.net/tracker/DSA-1632-1
security-tracker.debian.net/tracker/DTSA-160-1
security.gentoo.org/glsa/glsa-200809-07.xml
sunsolve.sun.com/search/document.do?assetkey=1-26-265030-1
support.apple.com/kb/HT3276
support.apple.com/kb/HT3298
support.apple.com/kb/HT3318
www.debian.org/security/2008/dsa-1632
www.mandriva.com/security/advisories?name=MDVSA-2008:184
www.redhat.com/support/errata/RHSA-2008-0847.html
www.redhat.com/support/errata/RHSA-2008-0848.html
www.redhat.com/support/errata/RHSA-2008-0863.html
www.securityfocus.com/archive/1/496033/100/0/threaded
www.securityfocus.com/archive/1/497962/100/0/threaded
www.securityfocus.com/bid/30832
www.securitytracker.com/id?1020750
www.ubuntu.com/usn/usn-639-1
www.us-cert.gov/cas/techalerts/TA08-260A.html
www.vmware.com/security/advisories/VMSA-2008-0017.html
www.vupen.com/english/advisories/2008/2438
www.vupen.com/english/advisories/2008/2584
www.vupen.com/english/advisories/2008/2776
www.vupen.com/english/advisories/2008/2971
www.vupen.com/english/advisories/2008/3107
www.vupen.com/english/advisories/2008/3232
www.vupen.com/english/advisories/2009/2143
bugzilla.redhat.com/show_bug.cgi?id=458674
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11489
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5514
www.redhat.com/archives/fedora-package-announce/2008-September/msg00102.html
www.redhat.com/archives/fedora-package-announce/2008-September/msg00121.html