Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2012-5581

Overview

Vulnerability Score 6.8 6.8
CVE Id CVE-2012-5581
Last Modified 07 Feb 2013 11:55:25
Published 04 Jan 2013 05:55:02
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity MEDIUM
Authentication NONE

CVE-2012-5581

Summary

Stack-based buffer overflow in tif_dir.c in LibTIFF before 4.0.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DOTRANGE tag in a TIFF image.

Vulnerable Systems

Application

  • Libtiff 3.4

  • Libtiff 3.5.1

  • Libtiff 3.5.2

  • Libtiff 3.5.3

  • Libtiff 3.5.4

  • Libtiff 3.5.5

  • Libtiff 3.5.6

  • Libtiff 3.5.7

  • Libtiff 3.6.0

  • Libtiff 3.6.1

  • Libtiff 3.7.0

  • Libtiff 3.7.1

  • Libtiff 3.7.2

  • Libtiff 3.7.3

  • Libtiff 3.7.4

  • Libtiff 3.8.0

  • Libtiff 3.8.1

  • Libtiff 3.8.2

  • Libtiff 3.9

  • Libtiff 3.9.0

  • Libtiff 3.9.1

  • Libtiff 3.9.2

  • Libtiff 3.9.2-5.2.1

  • Libtiff 3.9.3

  • Libtiff 3.9.4

  • Libtiff 3.9.5

  • Libtiff 4.0

  • Libtiff 4.0.1


References

MISC - https://bugzilla.redhat.com/show_bug.cgi?id=867235

XF - libtiff-dotrange-bo(80339)

UBUNTU - USN-1655-1

BID - 56715

MLIST - [oss-security] 20121128 libtiff: Stack based buffer overflow when handling DOTRANGE tags

SECUNIA - 51491

SUSE - openSUSE-SU-2013:0187

REDHAT - RHSA-2012:1590

Related Patches

Red Hat 2012:1590-01 RHSA Moderate: libtiff security update for RHEL 5 x86

Novell SUSE 2013:7216 libtiff-devel security update for SLE 11 SP2 i586

Novell SUSE 2013:7216 libtiff-devel security update for SLE 11 SP2 x86_64

Novell SUSE 2013:8419 libtiff security update for SLE 10 SP4 i586

Novell SUSE 2013:8419 libtiff security update for SLE 10 SP4 x86_64


Last Updated: 27 May 2016 11:01:34