Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-4564

Опубликовано: 11 нояб. 2012
Источник: debian
EPSS Средний

Описание

ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tiff3not-affectedpackage
tifffixed4.0.2-5package

EPSS

Процентиль: 96%
0.2646
Средний

Связанные уязвимости

ubuntu
почти 13 лет назад

ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow.

redhat
почти 13 лет назад

ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow.

nvd
почти 13 лет назад

ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow.

github
больше 3 лет назад

ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow.

oracle-oval
больше 12 лет назад

ELSA-2012-1590: libtiff security update (MODERATE)

EPSS

Процентиль: 96%
0.2646
Средний