Lucene search

K
osvGoogleOSV:DSA-2552-1
HistorySep 26, 2012 - 12:00 a.m.

tiff - several

2012-09-2600:00:00
Google
osv.dev
7

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

Several vulnerabilities were discovered in TIFF, a library set and tools
to support the Tag Image File Format (TIFF), allowing denial of service and
potential privilege escalation.

These vulnerabilities can be exploited via a specially crafted TIFF image.

  • CVE-2012-2113
    The tiff2pdf utility has an integer overflow error when parsing images.
  • CVE-2012-3401
    Huzaifa Sidhpurwala discovered heap-based buffer overflow in the
    t2p_read_tiff_init() function.
  • CVE-2010-2482
    An invalid td_stripbytecount field is not properly handle and can trigger a
    NULL pointer dereference.
  • CVE-2010-2595
    An array index error, related to downsampled OJPEG input in the
    TIFFYCbCrtoRGB function causes an unexpected crash.
  • CVE-2010-2597
    Also related to downsampled OJPEG input, the TIFFVStripSize function crash
    unexpectly.
  • CVE-2010-2630
    The TIFFReadDirectory function does not properly validate the data types of
    codec-specific tags that have an out-of-order position in a TIFF file.
  • CVE-2010-4665
    The tiffdump utility has an integer overflow in the ReadDirectory function.

For the stable distribution (squeeze), these problems have been fixed in
version 3.9.4-5+squeeze5.

For the testing distribution (wheezy), these problems have been fixed in
version 4.0.2-2.

For the unstable distribution (sid), these problems have been fixed in
version 4.0.2-2.

We recommend that you upgrade your tiff packages.

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P