Page 25 of 225 results (0.011 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

The OJPEGReadHeaderInfoSecTablesDcTable function in tif_ojpeg.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (memory leak) via a crafted image. La función OJPEGReadHeaderInfoSecTablesDcTable en tif_ojpeg.c en LibTIFF 4.0.7 permite a atacantes remotos provocar una denegación de servicio (fuga de memoria) a través de una imagen manipulada. • http://bugzilla.maptools.org/show_bug.cgi?id=2659 http://www.debian.org/security/2017/dsa-3844 http://www.securityfocus.com/bid/97503 https://security.gentoo.org/glsa/201709-27 https://usn.ubuntu.com/3602-1 • CWE-772: Missing Release of Resource after Effective Lifetime •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

LibTIFF 4.0.7 has an "outside the range of representable values of type unsigned char" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. • http://www.debian.org/security/2017/dsa-3844 https://blogs.gentoo.org/ago/2017/04/01/libtiff-multiple-ubsan-crashes https://security.gentoo.org/glsa/201709-27 https://usn.ubuntu.com/3602-1 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 1

LibTIFF 4.0.7 has an "outside the range of representable values of type short" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. LibTIFF 4.0.7 tiene un problema de comportamiento "fuera de rango de valores representables de tipo corto" no definido, lo que podrían permitir a atacantes remotos provocar una denegación de servicio (caída de la aplicación) o posiblemente tener otro impacto no especificado a través de una imagen manipulada. • http://www.debian.org/security/2017/dsa-3844 http://www.securityfocus.com/bid/97505 http://www.securityfocus.com/bid/97508 https://blogs.gentoo.org/ago/2017/04/01/libtiff-multiple-ubsan-crashes https://security.gentoo.org/glsa/201709-27 https://usn.ubuntu.com/3602-1 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 1

LibTIFF 4.0.7 has a "shift exponent too large for 64-bit type long" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image. LibTIFF 4.0.7 tiene un problema de comportamiento de "exponente de cambio excesivamente grande para el tipo long de 64 bits" no definido, lo que podrían permitir a atacantes remotos provocar una denegación de servicio (caída de la aplicación) o posiblemente tener otro impacto no especificado a través de una imagen manipulada. • http://www.debian.org/security/2017/dsa-3844 http://www.securityfocus.com/bid/97511 https://blogs.gentoo.org/ago/2017/04/01/libtiff-multiple-ubsan-crashes https://security.gentoo.org/glsa/201709-27 https://usn.ubuntu.com/3602-1 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 0

tools/tiffcp.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (integer underflow and heap-based buffer under-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 78490" and libtiff/tif_unix.c:115:23. tools/tiffcp.c en LibTIFF 4.0.7 permite a los atacantes remotos causar una denegación de servicio (desbordamiento inferior de enteros y lectura inferior de búfer basado en memoria dinámica) o posiblemente tener otro impacto no especificado a través de una imagen TIFF manipulada, relacionado con "READ de tamaño 78490" y libtiff/tif_unix.c:115:23. • http://www.securityfocus.com/bid/97202 https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow https://github.com/vadz/libtiff/commit/5397a417e61258c69209904e652a1f409ec3b9df https://security.gentoo.org/glsa/201709-27 https://usn.ubuntu.com/3602-1 • CWE-191: Integer Underflow (Wrap or Wraparound) •