6.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
libtiff is vulnerable to arbitrary code execution. The vulnerability exists as an integer overflow flaw was discovered in libtiff. An attacker could create a carefully crafted TIFF file in such a way that it could cause an application linked with libtiff to crash or possibly execute arbitrary code.
CPE | Name | Operator | Version |
---|---|---|---|
libtiff | eq | 3.5.7__22.el3 | |
libtiff | eq | 3.5.7__22.el3 |
bugzilla.remotesensing.org/show_bug.cgi?id=1102
ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc
ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc
secunia.com/advisories/19838
secunia.com/advisories/19897
secunia.com/advisories/19936
secunia.com/advisories/19949
secunia.com/advisories/19964
secunia.com/advisories/20021
secunia.com/advisories/20023
secunia.com/advisories/20210
secunia.com/advisories/20345
secunia.com/advisories/20667
sunsolve.sun.com/search/document.do?assetkey=1-26-103099-1
sunsolve.sun.com/search/document.do?assetkey=1-66-201332-1
support.avaya.com/elmodocs2/security/ASA-2006-119.htm
www.debian.org/security/2006/dsa-1054
www.gentoo.org/security/en/glsa/glsa-200605-17.xml
www.mandriva.com/security/advisories?name=MDKSA-2006:082
www.novell.com/linux/security/advisories/2006_04_28.html
www.redhat.com/security/updates/classification/#important
www.redhat.com/support/errata/RHSA-2006-0425.html
www.securityfocus.com/bid/17732
www.trustix.org/errata/2006/0024
www.vupen.com/english/advisories/2006/1563
access.redhat.com/errata/RHSA-2006:0425
bugzilla.redhat.com/bugzilla/show_bug.cgi?id=189933
exchange.xforce.ibmcloud.com/vulnerabilities/26134
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10593
usn.ubuntu.com/277-1/