Vulnerabilidad en tiff_getimage.c in LibTIFF (CVE-2012-1173)
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-189
Errores numéricos
Fecha de publicación:
04/06/2012
Última modificación:
11/04/2025
Descripción
Múltiples desbordamientos de entero en v3.9.4 permite a atacantes remotos ejecutar código a través de un tamaño del "tile" manipulado, que no es gestionado de forma adecuada por las funciones (1) gtTileSeparate o (2) gtStripSeparate, produciendo un desbordamiento de memoria dinámica.
Impacto
Puntuación base 2.0
6.80
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:libtiff:libtiff:3.9.4:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://bugzilla.maptools.org/attachment.cgi?id=477&action=diff
- http://bugzilla.maptools.org/show_bug.cgi?id=2369
- http://home.gdal.org/private/zdi-can-1221/zdi-can-1221.txt
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077463.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078403.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078835.html
- http://rhn.redhat.com/errata/RHSA-2012-0468.html
- http://secunia.com/advisories/48684
- http://secunia.com/advisories/48722
- http://secunia.com/advisories/48735
- http://secunia.com/advisories/48757
- http://secunia.com/advisories/48893
- http://secunia.com/advisories/50726
- http://security.gentoo.org/glsa/glsa-201209-02.xml
- http://support.apple.com/kb/HT5501
- http://support.apple.com/kb/HT5503
- http://ubuntu.com/usn/usn-1416-1
- http://www.debian.org/security/2012/dsa-2447
- http://www.mandriva.com/security/advisories?name=MDVSA-2012%3A054
- http://www.osvdb.org/81025
- http://www.securityfocus.com/bid/52891
- http://www.securitytracker.com/id?1026895=
- https://downloads.avaya.com/css/P8/documents/100161772
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74656
- https://hermes.opensuse.org/messages/14302713
- http://bugzilla.maptools.org/attachment.cgi?id=477&action=diff
- http://bugzilla.maptools.org/show_bug.cgi?id=2369
- http://home.gdal.org/private/zdi-can-1221/zdi-can-1221.txt
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077463.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078403.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078835.html
- http://rhn.redhat.com/errata/RHSA-2012-0468.html
- http://secunia.com/advisories/48684
- http://secunia.com/advisories/48722
- http://secunia.com/advisories/48735
- http://secunia.com/advisories/48757
- http://secunia.com/advisories/48893
- http://secunia.com/advisories/50726
- http://security.gentoo.org/glsa/glsa-201209-02.xml
- http://support.apple.com/kb/HT5501
- http://support.apple.com/kb/HT5503
- http://ubuntu.com/usn/usn-1416-1
- http://www.debian.org/security/2012/dsa-2447
- http://www.mandriva.com/security/advisories?name=MDVSA-2012%3A054
- http://www.osvdb.org/81025
- http://www.securityfocus.com/bid/52891
- http://www.securitytracker.com/id?1026895=
- https://downloads.avaya.com/css/P8/documents/100161772
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74656
- https://hermes.opensuse.org/messages/14302713



