Описание
A heap-based buffer overflow flaw was found in libtiff in the handling of TIFF images in libtiff's TIFF2PDF tool. A specially crafted TIFF file can lead to arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 4.0.9-5ubuntu0.4 |
| devel | not-affected | 4.1.0+git201212-1ubuntu1 |
| esm-infra-legacy/trusty | released | 4.0.3-7ubuntu0.11+esm6 |
| esm-infra/bionic | released | 4.0.9-5ubuntu0.4 |
| esm-infra/focal | released | 4.1.0+git191117-2ubuntu0.20.04.1 |
| esm-infra/xenial | released | 4.0.6-1ubuntu0.8 |
| focal | released | 4.1.0+git191117-2ubuntu0.20.04.1 |
| groovy | released | 4.1.0+git191117-2ubuntu0.20.10.1 |
| hirsute | not-affected | 4.1.0+git201212-1ubuntu1 |
| impish | not-affected | 4.1.0+git201212-1ubuntu1 |
Показывать по
6.8 Medium
CVSS2
7.8 High
CVSS3
Связанные уязвимости
A heap-based buffer overflow flaw was found in libtiff in the handling of TIFF images in libtiff's TIFF2PDF tool. A specially crafted TIFF file can lead to arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
A heap-based buffer overflow flaw was found in libtiff in the handling of TIFF images in libtiff's TIFF2PDF tool. A specially crafted TIFF file can lead to arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
A heap-based buffer overflow flaw was found in libtiff in the handling of TIFF images in libtiff's TIFF2PDF tool. A specially crafted TIFF file can lead to arbitrary code execution. The highest threat from this vulnerability is to confidentiality integrity as well as system availability.
A heap-based buffer overflow flaw was found in libtiff in the handling ...
A heap-based buffer overflow flaw was found in libtiff in the handling of TIFF images in libtiff's TIFF2PDF tool. A specially crafted TIFF file can lead to arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
6.8 Medium
CVSS2
7.8 High
CVSS3