Page 38 of 252 results (0.009 seconds)

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds write) via an invalid number of samples per pixel in a LogL compressed TIFF image, a different vulnerability than CVE-2015-8782. tif_luv.c en libtiff permite a atacantes provocar una denegación de servicio (escritura fuera de rango) a través de un número no válido de muestras por píxel en una imagen TIFF comprimida con LogL, una vulnerabilidad diferente a CVE-2015-8782. • http://bugzilla.maptools.org/show_bug.cgi?id=2522#c0 http://lists.opensuse.org/opensuse-updates/2016-02/msg00058.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00064.html http://rhn.redhat.com/errata/RHSA-2016-1546.html http://rhn.redhat.com/errata/RHSA-2016-1547.html http://www.debian.org/security/2016/dsa-3467 http://www.openwall.com/lists/oss-security/2016/01/24/3 http://www.openwall.com/lists/oss-security/2016/01/24/7 http://www.oracle.com& • CWE-787: Out-of-bounds Write •

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds writes) via a crafted TIFF image, a different vulnerability than CVE-2015-8781. tif_luv.c en libtiff permite a atacantes provocar una denegación de servicio (escrituras fuera de rango) a través de una imagen TIFF manipulada, una vulnerabilidad diferente a CVE-2015-8781. • http://bugzilla.maptools.org/show_bug.cgi?id=2522 http://lists.opensuse.org/opensuse-updates/2016-02/msg00058.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00064.html http://rhn.redhat.com/errata/RHSA-2016-1546.html http://rhn.redhat.com/errata/RHSA-2016-1547.html http://www.debian.org/security/2016/dsa-3467 http://www.openwall.com/lists/oss-security/2016/01/24/3 http://www.openwall.com/lists/oss-security/2016/01/24/7 http://www.oracle.com/te • CWE-787: Out-of-bounds Write •

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds reads) via a crafted TIFF image. tif_luv.c en libtiff permite a atacantes provocar una denegación de servicio (lecturas fuera de rango) a través de una imagen TIFF manipulada. • http://bugzilla.maptools.org/show_bug.cgi?id=2522 http://lists.opensuse.org/opensuse-updates/2016-02/msg00058.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00064.html http://rhn.redhat.com/errata/RHSA-2016-1546.html http://rhn.redhat.com/errata/RHSA-2016-1547.html http://www.debian.org/security/2016/dsa-3467 http://www.openwall.com/lists/oss-security/2016/01/24/3 http://www.openwall.com/lists/oss-security/2016/01/24/7 http://www.oracle.com/te • CWE-125: Out-of-bounds Read CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 8%CPEs: 11EXPL: 1

Heap-based buffer overflow in the PackBitsPreEncode function in tif_packbits.c in bmp2tiff in libtiff 4.0.6 and earlier allows remote attackers to execute arbitrary code or cause a denial of service via a large width field in a BMP image. Desbordamiento de buffer basado en memoria dinámica en la función PackBitsPreEncode en tif_packbits.c en bmp2tiff en libtiff 4.0.6 y versiones anteriores permite a atacantes remotos ejecutar código arbitrario o provocar una denegación de servicio a través de un campo width grande en una imagen BMP. • http://packetstormsecurity.com/files/135080/libtiff-4.0.6-Heap-Overflow.html http://rhn.redhat.com/errata/RHSA-2016-1546.html http://rhn.redhat.com/errata/RHSA-2016-1547.html http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.securityfocus.com/archive/1/537208/100/0/threaded https://security.gentoo.org/glsa/201701-16 https://access.redhat.com/security/cve/CVE-2015-8 • CWE-122: Heap-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 4%CPEs: 1EXPL: 3

The _TIFFVGetField function in tif_dir.c in libtiff 4.0.6 allows attackers to cause a denial of service (invalid memory write and crash) or possibly have unspecified other impact via crafted field data in an extension tag in a TIFF image. La función _TIFFVGetField en tif_dir.c en libtiff 4.0.6 permite a atacantes causar una denegación de servicio (escritura de memoria no válida y caída) o posiblemente tener otro impacto no especificado a través de datos de campo manipulados en una etiqueta de extensión en una imagen TIFF. • http://lists.opensuse.org/opensuse-updates/2016-01/msg00078.html http://lists.opensuse.org/opensuse-updates/2016-01/msg00081.html http://lists.opensuse.org/opensuse-updates/2016-01/msg00100.html http://packetstormsecurity.com/files/135078/libtiff-4.0.6-Invalid-Write.html http://rhn.redhat.com/errata/RHSA-2016-1546.html http://rhn.redhat.com/errata/RHSA-2016-1547.html http://seclists.org/fulldisclosure/2015/Dec/119 http://www.openwall.com/lists/oss-security/2015/12/26/7 http: • CWE-254: 7PK - Security Features •