Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j2r4-vwhq-m2gg

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Integer overflow in the TIFFFetchStripThing function in tif_dirread.c for libtiff 3.6.1 allows remote attackers to execute arbitrary code via a TIFF file with the STRIPOFFSETS flag and a large number of strips, which causes a zero byte buffer to be allocated and leads to a heap-based buffer overflow.

Integer overflow in the TIFFFetchStripThing function in tif_dirread.c for libtiff 3.6.1 allows remote attackers to execute arbitrary code via a TIFF file with the STRIPOFFSETS flag and a large number of strips, which causes a zero byte buffer to be allocated and leads to a heap-based buffer overflow.

EPSS

Процентиль: 89%
0.05111
Низкий

Связанные уязвимости

redhat
больше 20 лет назад

Integer overflow in the TIFFFetchStripThing function in tif_dirread.c for libtiff 3.6.1 allows remote attackers to execute arbitrary code via a TIFF file with the STRIPOFFSETS flag and a large number of strips, which causes a zero byte buffer to be allocated and leads to a heap-based buffer overflow.

nvd
больше 20 лет назад

Integer overflow in the TIFFFetchStripThing function in tif_dirread.c for libtiff 3.6.1 allows remote attackers to execute arbitrary code via a TIFF file with the STRIPOFFSETS flag and a large number of strips, which causes a zero byte buffer to be allocated and leads to a heap-based buffer overflow.

debian
больше 20 лет назад

Integer overflow in the TIFFFetchStripThing function in tif_dirread.c ...

EPSS

Процентиль: 89%
0.05111
Низкий