CVE-2013-4232 – (tiff2pdf): use-after-free in t2p_readwrite_pdf_image()
https://notcve.org/view.php?id=CVE-2013-4232
Use-after-free vulnerability in the t2p_readwrite_pdf_image function in tools/tiff2pdf.c in libtiff 4.0.3 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted TIFF image. Una vulnerabilidad de uso de la memoria previamente liberada en la función t2p_readwrite_pdf_image en el archivo tools/tiff2pdf.c en libtiff versión 4.0.3, permite a los atacantes remotos causar una denegación de servicio (bloqueo de aplicación) o posiblemente ejecutar código arbitrario por medio de una imagen TIFF diseñada. • http://bugzilla.maptools.org/show_bug.cgi?id=2449 http://rhn.redhat.com/errata/RHSA-2014-0223.html http://secunia.com/advisories/54543 http://secunia.com/advisories/54628 http://www.asmail.be/msg0055359936.html http://www.debian.org/security/2013/dsa-2744 http://www.openwall.com/lists/oss-security/2013/08/10/2 https://bugzilla.redhat.com/show_bug.cgi?id=995975 https://access.redhat.com/security/cve/CVE-2013-4232 • CWE-399: Resource Management Errors CWE-416: Use After Free •
CVE-2013-1961 – (tiff2pdf): Stack-based buffer overflow with malformed image-length and resolution
https://notcve.org/view.php?id=CVE-2013-1961
Stack-based buffer overflow in the t2p_write_pdf_page function in tiff2pdf in libtiff before 4.0.3 allows remote attackers to cause a denial of service (application crash) via a crafted image length and resolution in a TIFF image file. Desbordamiento de búfer basado en función t2p_write_pdf_page en tiff2pdf in libtiff anterior a 4.0.3 permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) a través la manipulación del alto de la imagen y la resolución en un archivo de imagen TIFF. • http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104916.html http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105253.html http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105828.html http://lists.opensuse.org/opensuse-updates/2013-06/msg00058.html http://lists.opensuse.org/opensuse-updates/2013-06/msg00080.html http://rhn.redhat.com/errata/RHSA-2014-0223.html http://seclists.org/oss-sec/2013/q2/254 http://secunia.com/advisories/53237 ht • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-121: Stack-based Buffer Overflow •
CVE-2013-1960 – (tiff2pdf): Heap-based buffer overflow in t2_process_jpeg_strip()
https://notcve.org/view.php?id=CVE-2013-1960
Heap-based buffer overflow in the t2p_process_jpeg_strip function in tiff2pdf in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image file. Desbordamiento de búfer basado en memoria dinámica en la función tp_process_jpeg_strip en tiff2pdf en libtiff 4.0.3 y anteriores, permite a atacantes remotos provocar una denegación de servicio (caída) y posiblemente la ejecución arbitraria de código a través de una imagen TIFF manipulada. • http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104916.html http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105253.html http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105828.html http://lists.opensuse.org/opensuse-updates/2013-06/msg00058.html http://lists.opensuse.org/opensuse-updates/2013-06/msg00080.html http://rhn.redhat.com/errata/RHSA-2014-0223.html http://seclists.org/oss-sec/2013/q2/254 http://secunia.com/advisories/53237 ht • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •
CVE-2012-5581 – libtiff: Stack-based buffer overflow when reading a tiled tiff file
https://notcve.org/view.php?id=CVE-2012-5581
Stack-based buffer overflow in tif_dir.c in LibTIFF before 4.0.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DOTRANGE tag in a TIFF image. Desbordamiento de búfer basado en pila en tif_dir.c en LibTIFF anteriores a v4.0.2, permite a atacantes remotos provocar una denegación de servicio (caída) y posiblemente ejecutar código de su elección a través de una etiqueta DOTRANGE manipulada en una imagen TIFF. • http://lists.opensuse.org/opensuse-updates/2013-01/msg00076.html http://rhn.redhat.com/errata/RHSA-2012-1590.html http://secunia.com/advisories/51491 http://www.debian.org/security/2012/dsa-2589 http://www.openwall.com/lists/oss-security/2012/11/28/1 http://www.securityfocus.com/bid/56715 http://www.ubuntu.com/usn/USN-1655-1 https://bugzilla.redhat.com/show_bug.cgi?id=867235 https://exchange.xforce.ibmcloud.com/vulnerabilities/80339 https://access.redhat.com/secur • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-121: Stack-based Buffer Overflow •
CVE-2012-4564 – libtiff: Missing return value check in ppm2tiff leading to heap-buffer overflow when reading a tiff file
https://notcve.org/view.php?id=CVE-2012-4564
ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow. ppm2tiff no comprueba el valor devuelto por la función TIFFScanlineSize, lo que permite a atacantes remotos provocar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario a través de una imagen PPM modificada que provoca un desbordamiento de entero, una asignación zero-memory, y un desbordamiento de búfer basado en memoria dinámica. • http://lists.opensuse.org/opensuse-updates/2013-01/msg00076.html http://rhn.redhat.com/errata/RHSA-2012-1590.html http://secunia.com/advisories/51133 http://www.debian.org/security/2012/dsa-2575 http://www.openwall.com/lists/oss-security/2012/11/02/3 http://www.openwall.com/lists/oss-security/2012/11/02/7 http://www.osvdb.org/86878 http://www.securityfocus.com/bid/56372 http://www.ubuntu.com/usn/USN-1631-1 https://bugzilla.redhat.com/show_bug.cgi?i • CWE-122: Heap-based Buffer Overflow •