Page 25 of 138 results (0.017 seconds)

CVSS: 7.5EPSS: 3%CPEs: 1EXPL: 0

Heap-based buffer overflow in the PixarLog decoder in the TIFF library (libtiff) before 3.8.2 might allow context-dependent attackers to execute arbitrary code via unknown vectors. Desbordamiento de búfer basado en montón en el decodificador PixarLog en la biblioteca TIFF (libtiff) versiones anteriores a 3.8.2 podría permitir a atacantes locales o remotos dependientes del contexto ejecutar código de su elección mediante vectores desconocidos. • ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html http://lwn.net/Alerts/194228 http://secunia.com/advisories/21253 http://secunia.com/advisories/21274 http://secunia.com/advisories/21290 http://secunia.com/advisories/21304 http://secunia.com/advisories/21319 http://secunia.com/advisories/21334 http://secunia& •

CVSS: 7.5EPSS: 3%CPEs: 1EXPL: 0

Heap-based buffer overflow in the NeXT RLE decoder in the TIFF library (libtiff) before 3.8.2 might allow context-dependent attackers to execute arbitrary code via unknown vectors involving decoding large RLE images. Desbordamiento de búfer basado en pila en el descodificador NeXT RLE en la librería TIFF (libtiff) anterior a 3.8.2 podría permitir a atacantes dependientes de contexto ejecutar código de su elección mediante vectores no especificados que implican la descodificación de imágenes RLE grandes. • ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc http://docs.info.apple.com/article.html?artnum=304063 http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html http://lwn.net/Alerts/194228 http://secunia.com/advisories/21253 http://secunia.com/advisories/21274 http://secunia.com/advisories/21290 http://secunia.com/advisories/21304 http://secunia.com/advisories/21319& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 1%CPEs: 15EXPL: 1

Buffer overflow in the t2p_write_pdf_string function in tiff2pdf in libtiff 3.8.2 and earlier allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a TIFF file with a DocumentName tag that contains UTF-8 characters, which triggers the overflow when a character is sign extended to an integer that produces more digits than expected in an sprintf call. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=370355 http://bugzilla.remotesensing.org/show_bug.cgi?id=1196 http://lists.suse.com/archive/suse-security-announce/2006-Jun/0008.html http://secunia.com/advisories/20488 http://secunia.com/advisories/20501 http://secunia.com/advisories/20520 http://secunia.com/advisories/20693 http://secunia.com/advisories/20766 http://secunia.com/advisories/21002 http://secunia.com/advisories/27181 http://secunia.com/advisories/27222 http:&#x •

CVSS: 7.5EPSS: 2%CPEs: 15EXPL: 1

Stack-based buffer overflow in the tiffsplit command in libtiff 3.8.2 and earlier might might allow attackers to execute arbitrary code via a long filename. NOTE: tiffsplit is not setuid. If there is not a common scenario under which tiffsplit is called with attacker-controlled command line arguments, then perhaps this issue should not be included in CVE. Desbordamiento de búfer basado en pila en el comando tiffsplit en libtiff 3.8.2 y versiones anteriores podría permitir a atacantes ejecutar código arbitrario a través de un nombre de archivo largo. NOTA: tiffsplit no es setuid. • https://www.exploit-db.com/exploits/1831 http://lists.suse.com/archive/suse-security-announce/2006-Jun/0008.html http://marc.info/?l=vuln-dev&m=114857412916909&w=2 http://secunia.com/advisories/20501 http://secunia.com/advisories/20520 http://secunia.com/advisories/20766 http://secunia.com/advisories/21002 http://security.gentoo.org/glsa/glsa-200607-03.xml http://www.debian.org/security/2006/dsa-1091 http://www.mandriva.com/security/advisories?name=MDKSA-2006:095 ht • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 2.1EPSS: 11%CPEs: 1EXPL: 0

The TIFFToRGB function in libtiff before 3.8.1 allows remote attackers to cause a denial of service (crash) via a crafted TIFF image with Yr/Yg/Yb values that exceed the YCR/YCG/YCB values, which triggers an out-of-bounds read. • ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc http://bugzilla.remotesensing.org/show_bug.cgi?id=1065 http://secunia.com/advisories/19936 http://secunia.com/advisories/19949 http://secunia.com/advisories/19964 http://secunia.com/advisories/20023 http://secunia.com/advisories/20210 http://secunia.com/advisories/20330 http://secunia.com/advisories/20667 http://support.avaya.com/elmodocs2/security/ASA-2006-119.htm http://www.debian.org/security/2006/ •