// For flags

CVE-2006-3464

Multiple libtiff flaws (CVE-2006-3460 CVE-2006-3461 CVE-2006-3462 CVE-2006-3463 CVE-2006-3464 CVE-2006-3465)

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

TIFF library (libtiff) before 3.8.2 allows context-dependent attackers to pass numeric range checks and possibly execute code, and trigger assert errors, via large offset values in a TIFF directory that lead to an integer overflow and other unspecified vectors involving "unchecked arithmetic operations".

La libreria TIFF (libtiff) anterior a 3.8.2 permite a atacantes dependientes del contexto pasar la validación de rango de números y posiblemente ejecutar código, y disparar avisos de error, a través de valores de offset en un directorio TIFF que conduce a un desbordamiento de entero y otros vectores no especificados afectando a "operaciones aritméticas no validadas".

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2006-07-10 CVE Reserved
  • 2006-08-03 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-189: Numeric Errors
CAPEC
References (38)
URL Date SRC
URL Date SRC
ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P 2017-10-11
http://lwn.net/Alerts/194228 2017-10-11
http://secunia.com/advisories/21274 2017-10-11
http://secunia.com/advisories/21290 2017-10-11
http://secunia.com/advisories/21304 2017-10-11
http://secunia.com/advisories/21319 2017-10-11
http://secunia.com/advisories/21334 2017-10-11
http://secunia.com/advisories/21338 2017-10-11
http://secunia.com/advisories/21346 2017-10-11
http://secunia.com/advisories/21370 2017-10-11
http://secunia.com/advisories/21392 2017-10-11
http://secunia.com/advisories/21501 2017-10-11
http://secunia.com/advisories/21537 2017-10-11
http://secunia.com/advisories/21598 2017-10-11
http://secunia.com/advisories/21632 2017-10-11
http://secunia.com/advisories/22036 2017-10-11
http://secunia.com/advisories/27832 2017-10-11
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.536600 2017-10-11
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103160-1 2017-10-11
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201331-1 2017-10-11
http://www.gentoo.org/security/en/glsa/glsa-200608-07.xml 2017-10-11
http://www.mandriva.com/security/advisories?name=MDKSA-2006:136 2017-10-11
http://www.mandriva.com/security/advisories?name=MDKSA-2006:137 2017-10-11
http://www.novell.com/linux/security/advisories/2006_44_libtiff.html 2017-10-11
http://www.redhat.com/support/errata/RHSA-2006-0603.html 2017-10-11
http://www.redhat.com/support/errata/RHSA-2006-0648.html 2017-10-11
http://www.ubuntu.com/usn/usn-330-1 2017-10-11
http://www.vupen.com/english/advisories/2006/3105 2017-10-11
http://www.vupen.com/english/advisories/2007/4034 2017-10-11
https://access.redhat.com/security/cve/CVE-2006-3464 2006-08-28
https://bugzilla.redhat.com/show_bug.cgi?id=199111 2006-08-28
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Libtiff
Search vendor "Libtiff"
Libtiff
Search vendor "Libtiff" for product "Libtiff"
<= 3.8.1
Search vendor "Libtiff" for product "Libtiff" and version " <= 3.8.1"
-
Affected