Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-3401

Опубликовано: 13 авг. 2012
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.8

Описание

The t2p_read_tiff_init function in tiff2pdf (tools/tiff2pdf.c) in LibTIFF 4.0.2 and earlier does not properly initialize the T2P context struct pointer in certain error conditions, which allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image that triggers a heap-based buffer overflow.

РелизСтатусПримечание
devel

released

4.0.2-1ubuntu2
hardy

released

3.8.2-7ubuntu3.13
lucid

released

3.9.2-2ubuntu0.10
natty

released

3.9.4-5ubuntu6.3
oneiric

released

3.9.5-1ubuntu1.3
precise

released

3.9.5-2ubuntu1.2
upstream

released

3.9.6-7

Показывать по

РелизСтатусПримечание
devel

not-affected

no binary
hardy

DNE

lucid

DNE

natty

DNE

oneiric

DNE

precise

DNE

upstream

released

4.0.2-2

Показывать по

EPSS

Процентиль: 72%
0.00719
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

redhat
около 13 лет назад

The t2p_read_tiff_init function in tiff2pdf (tools/tiff2pdf.c) in LibTIFF 4.0.2 and earlier does not properly initialize the T2P context struct pointer in certain error conditions, which allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image that triggers a heap-based buffer overflow.

nvd
около 13 лет назад

The t2p_read_tiff_init function in tiff2pdf (tools/tiff2pdf.c) in LibTIFF 4.0.2 and earlier does not properly initialize the T2P context struct pointer in certain error conditions, which allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image that triggers a heap-based buffer overflow.

debian
около 13 лет назад

The t2p_read_tiff_init function in tiff2pdf (tools/tiff2pdf.c) in LibT ...

github
больше 3 лет назад

The t2p_read_tiff_init function in tiff2pdf (tools/tiff2pdf.c) in LibTIFF 4.0.2 and earlier does not properly initialize the T2P context struct pointer in certain error conditions, which allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image that triggers a heap-based buffer overflow.

oracle-oval
больше 12 лет назад

ELSA-2012-1590: libtiff security update (MODERATE)

EPSS

Процентиль: 72%
0.00719
Низкий

6.8 Medium

CVSS2