CVE-2004-1308
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
10/01/2005
Last modified:
03/04/2025
Description
Integer overflow in (1) tif_dirread.c and (2) tif_fax3.c for libtiff 3.5.7 and 3.7.0 allows remote attackers to execute arbitrary code via a TIFF file containing a TIFF_ASCII or TIFF_UNDEFINED directory entry with a -1 entry count, which leads to a heap-based buffer overflow.
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:libtiff:libtiff:3.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:libtiff:libtiff:3.5.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:libtiff:libtiff:3.5.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:libtiff:libtiff:3.5.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:libtiff:libtiff:3.5.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:libtiff:libtiff:3.5.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:libtiff:libtiff:3.5.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:libtiff:libtiff:3.6.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:libtiff:libtiff:3.6.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:libtiff:libtiff:3.7.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000920
- http://lists.apple.com/archives/security-announce/2005/May/msg00001.html
- http://secunia.com/advisories/13776
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1
- http://www.debian.org/security/2004/dsa-617
- http://www.idefense.com/application/poi/display?id=174&type=vulnerabilities
- http://www.kb.cert.org/vuls/id/125598
- http://www.mandriva.com/security/advisories?name=MDKSA-2005%3A052
- http://www.novell.com/linux/security/advisories/2005_01_libtiff_tiff.html
- http://www.redhat.com/support/errata/RHSA-2005-019.html
- http://www.redhat.com/support/errata/RHSA-2005-035.html
- http://www.us-cert.gov/cas/techalerts/TA05-136A.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18637
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100117
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9392
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000920
- http://lists.apple.com/archives/security-announce/2005/May/msg00001.html
- http://secunia.com/advisories/13776
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1
- http://www.debian.org/security/2004/dsa-617
- http://www.idefense.com/application/poi/display?id=174&type=vulnerabilities
- http://www.kb.cert.org/vuls/id/125598
- http://www.mandriva.com/security/advisories?name=MDKSA-2005%3A052
- http://www.novell.com/linux/security/advisories/2005_01_libtiff_tiff.html
- http://www.redhat.com/support/errata/RHSA-2005-019.html
- http://www.redhat.com/support/errata/RHSA-2005-035.html
- http://www.us-cert.gov/cas/techalerts/TA05-136A.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18637
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100117
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9392