9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
libtiff is vulnerable to arbitrary code execution attacks. The vulnerability exists as a heap-based buffer overflow in the t2p_process_jpeg_strip function in tiff2pdf in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image file.
lists.fedoraproject.org/pipermail/package-announce/2013-May/104916.html
lists.fedoraproject.org/pipermail/package-announce/2013-May/105253.html
lists.fedoraproject.org/pipermail/package-announce/2013-May/105828.html
lists.opensuse.org/opensuse-updates/2013-06/msg00058.html
lists.opensuse.org/opensuse-updates/2013-06/msg00080.html
rhn.redhat.com/errata/RHSA-2014-0223.html
seclists.org/oss-sec/2013/q2/254
secunia.com/advisories/53237
secunia.com/advisories/53765
www.debian.org/security/2013/dsa-2698
www.securityfocus.com/bid/59609
access.redhat.com/errata/RHSA-2014:0222
access.redhat.com/errata/RHSA-2014:0223
access.redhat.com/security/cve/CVE-2013-1960
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=952158
rhn.redhat.com/errata/RHSA-2014-0223.html