The TIFFVStripSize function in tif_strip.c in LibTIFF 3.9.0 and 3.9.2 makes incorrect calls to the TIFFGetField function, which allows remote attackers to cause a denial of service (application crash) via a crafted TIFF image, related to "downsampled OJPEG input" and possibly related to a compiler optimization that triggers a divide-by-zero error.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
The TIFFVStripSize function in tif_strip.c in LibTIFF 3.9.0 and 3.9.2 makes incorrect calls to the TIFFGetField function, which allows remote attackers to cause a denial of service (application crash) via a crafted TIFF image, related to "downsampled OJPEG input" and possibly related to a compiler optimization that triggers a divide-by-zero error.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=603703 | x_refsource_CONFIRM |
http://secunia.com/advisories/40527 | third-party-advisory x_refsource_SECUNIA |
http://bugzilla.maptools.org/show_bug.cgi?id=2215 | x_refsource_CONFIRM |
http://www.debian.org/security/2012/dsa-2552 | vendor-advisory x_refsource_DEBIAN |
https://bugs.launchpad.net/bugs/593067 | x_refsource_CONFIRM |
http://www.vupen.com/english/advisories/2010/1761 | vdb-entry x_refsource_VUPEN |
http://security.gentoo.org/glsa/glsa-201209-02.xml | vendor-advisory x_refsource_GENTOO |
http://www.redhat.com/support/errata/RHSA-2010-0519.html | vendor-advisory x_refsource_REDHAT |
http://secunia.com/advisories/40422 | third-party-advisory x_refsource_SECUNIA |
http://secunia.com/advisories/50726 | third-party-advisory x_refsource_SECUNIA |
https://bugzilla.redhat.com/show_bug.cgi?id=583081 | x_refsource_CONFIRM |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=603703 | x_refsource_CONFIRM x_transferred |
http://secunia.com/advisories/40527 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://bugzilla.maptools.org/show_bug.cgi?id=2215 | x_refsource_CONFIRM x_transferred |
http://www.debian.org/security/2012/dsa-2552 | vendor-advisory x_refsource_DEBIAN x_transferred |
https://bugs.launchpad.net/bugs/593067 | x_refsource_CONFIRM x_transferred |
http://www.vupen.com/english/advisories/2010/1761 | vdb-entry x_refsource_VUPEN x_transferred |
http://security.gentoo.org/glsa/glsa-201209-02.xml | vendor-advisory x_refsource_GENTOO x_transferred |
http://www.redhat.com/support/errata/RHSA-2010-0519.html | vendor-advisory x_refsource_REDHAT x_transferred |
http://secunia.com/advisories/40422 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/50726 | third-party-advisory x_refsource_SECUNIA x_transferred |
https://bugzilla.redhat.com/show_bug.cgi?id=583081 | x_refsource_CONFIRM x_transferred |
The TIFFVStripSize function in tif_strip.c in LibTIFF 3.9.0 and 3.9.2 makes incorrect calls to the TIFFGetField function, which allows remote attackers to cause a denial of service (application crash) via a crafted TIFF image, related to "downsampled OJPEG input" and possibly related to a compiler optimization that triggers a divide-by-zero error.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 4.3 | MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |