CVE-2014-8129 – libtiff: out-of-bounds read/write with malformed TIFF image in tiff2pdf
https://notcve.org/view.php?id=CVE-2014-8129
LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by failure of tif_next.c to verify that the BitsPerSample value is 2, and the t2p_sample_lab_signed_to_unsigned function in tiff2pdf.c. LibTIFF 4.0.3 permite que atacantes remotos provoquen una denegación de servicio (escritura fuera de límites) u otro tipo de impacto sin especificar mediante una imagen TIFF manipulada. Esto se demuestra por el fracaso de tif_next.c a la hora de verificar que el valor de BitsPerSample es 2 y la función t2p_sample_lab_signed_to_unsigned en tiff2pdf.c. • http://bugzilla.maptools.org/show_bug.cgi?id=2487 http://bugzilla.maptools.org/show_bug.cgi?id=2488 http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html http://openwall.com/lists/oss-security/2015/01/24/15 http://rhn.redhat.com/errata/RHSA-2016-1546.html http://rhn.redhat.com/errata/RHSA-2016-1547.html http://support.apple.com/kb/HT204941 http://support.apple.com/kb/HT2049 • CWE-125: Out-of-bounds Read CWE-787: Out-of-bounds Write •
CVE-2014-9330 – libtiff: Out-of-bounds reads followed by a crash in bmp2tiff
https://notcve.org/view.php?id=CVE-2014-9330
Integer overflow in tif_packbits.c in bmp2tif in libtiff 4.0.3 allows remote attackers to cause a denial of service (crash) via crafted BMP image, related to dimensions, which triggers an out-of-bounds read. Desbordamiento de enteros en tif_packbits.c en bmp2tif en libtiff 4.0.3 permite a atacantes remotos causar una denegación de servicio (caída) a través de una imagen BMP manipulada, relacionado con dimensiones, lo que provoca una lectura fuera de rango. A flaw was discovered in the bmp2tiff utility. By tricking a user into processing a specially crafted file, a remote attacker could exploit this flaw to cause a crash or memory corruption and, possibly, execute arbitrary code with the privileges of the user running the libtiff tool. • http://bugzilla.maptools.org/show_bug.cgi?id=2494 http://rhn.redhat.com/errata/RHSA-2016-1546.html http://rhn.redhat.com/errata/RHSA-2016-1547.html http://seclists.org/fulldisclosure/2014/Dec/97 http://www.debian.org/security/2015/dsa-3273 http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html http://www.securityfocus.com/bid/71789 http://www.securitytracker.com/id/1031442 htt • CWE-125: Out-of-bounds Read CWE-189: Numeric Errors •
CVE-2013-4243 – (gif2tiff): possible heap-based buffer overflow in readgifimage()
https://notcve.org/view.php?id=CVE-2013-4243
Heap-based buffer overflow in the readgifimage function in the gif2tiff tool in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted height and width values in a GIF image. Desbordamiento de buffer de memoria dinámica en la función readgifimage de la herramienta gif2tiff en libtiff 4.0.3 y anteriores permite a un atacante remoto causar una denegación de servicio (cuelgue) y posiblemente ejecutar código a discrección a través de unos valores ancho y alto manipulados en una imagen GIF. • http://bugzilla.maptools.org/show_bug.cgi?id=2451 http://rhn.redhat.com/errata/RHSA-2014-0223.html http://secunia.com/advisories/54543 http://secunia.com/advisories/54628 http://www.debian.org/security/2013/dsa-2744 http://www.securityfocus.com/bid/62082 https://bugzilla.redhat.com/show_bug.cgi?id=996052 https://security.gentoo.org/glsa/201701-16 https://access.redhat.com/security/cve/CVE-2013-4243 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •
CVE-2013-4244 – (gif2tiff): OOB Write in LZW decompressor
https://notcve.org/view.php?id=CVE-2013-4244
The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image. El decompresor LZW en la utilidad gif2tiff de libtiff 4.0.3 y anteriores permite a un atacante dependiente de contexto causar una denegación de servicio (escritura fuera de rango y caída) o posiblemente ejecutar código a discrección a través de una imagen GIF manipulada. • http://bugzilla.maptools.org/show_bug.cgi?id=2452 http://rhn.redhat.com/errata/RHSA-2014-0223.html https://bugzilla.redhat.com/show_bug.cgi?id=996468 https://github.com/vadz/libtiff/commit/ce6841d9e41d621ba23cf18b190ee6a23b2cc833 https://access.redhat.com/security/cve/CVE-2013-4244 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-787: Out-of-bounds Write •
CVE-2013-4231 – (gif2tiff): GIF LZW decoder missing datasize value check
https://notcve.org/view.php?id=CVE-2013-4231
Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size. Múltiples desbordamientos de búfer en libtiff anterior a 4.0.3 que permite a atacantes remotos provocar una denegación de servicio (escritura fuera de rango) a través de (1) bloque de extensión en una imagen GIF manipulado o (2) el raster de la imagen GIF a tools/gif2tiff. c o (3) un nombre de archivo largo de una imagen TIFF a tools/rgb2ycbcr.c para. NOTA: los vectores 1 y 3 están en disputa por parte de Red Hat, que establece que la entrada no se puede superar el tamaño de búfer asignado. • http://bugzilla.maptools.org/show_bug.cgi?id=2450 http://rhn.redhat.com/errata/RHSA-2014-0223.html http://secunia.com/advisories/54543 http://secunia.com/advisories/54628 http://www.asmail.be/msg0055359936.html http://www.debian.org/security/2013/dsa-2744 http://www.openwall.com/lists/oss-security/2013/08/10/2 http://www.securityfocus.com/bid/61695 https://bugzilla.redhat.com/show_bug.cgi?id=995965 https://access.redhat.com/security/cve/CVE-2013-4231 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •