CVE-2013-4231
(gif2tiff): GIF LZW decoder missing datasize value check
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size.
Múltiples desbordamientos de búfer en libtiff anterior a 4.0.3 que permite a atacantes remotos provocar una denegación de servicio (escritura fuera de rango) a través de (1) bloque de extensión en una imagen GIF manipulado o (2) el raster de la imagen GIF a tools/gif2tiff. c o (3) un nombre de archivo largo de una imagen TIFF a tools/rgb2ycbcr.c para. NOTA: los vectores 1 y 3 están en disputa por parte de Red Hat, que establece que la entrada no se puede superar el tamaño de búfer asignado.
Pedro Ribeiro discovered that LibTIFF incorrectly handled certain malformed images when using the gif2tiff tool. If a user or automated system were tricked into opening a specially crafted GIF image, a remote attacker could crash the application, leading to a denial of service, or possibly execute arbitrary code with user privileges. This issue only affected Ubuntu 10.04 LTS, Ubuntu 12.04 LTS, Ubuntu 12.10 and Ubuntu 13.10. Pedro Ribeiro discovered that LibTIFF incorrectly handled certain malformed images when using the tiff2pdf tool. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could crash the application, leading to a denial of service, or possibly execute arbitrary code with user privileges. This issue only affected Ubuntu 10.04 LTS, Ubuntu 12.04 LTS, Ubuntu 12.10 and Ubuntu 13.10. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2013-06-12 CVE Reserved
- 2013-08-23 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://bugzilla.maptools.org/show_bug.cgi?id=2450 | X_refsource_confirm | |
http://www.asmail.be/msg0055359936.html | Mailing List | |
http://www.openwall.com/lists/oss-security/2013/08/10/2 | Mailing List |
|
http://www.securityfocus.com/bid/61695 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2014-0223.html | 2023-11-07 | |
http://secunia.com/advisories/54543 | 2023-11-07 | |
http://secunia.com/advisories/54628 | 2023-11-07 | |
http://www.debian.org/security/2013/dsa-2744 | 2023-11-07 | |
https://bugzilla.redhat.com/show_bug.cgi?id=995965 | 2014-02-27 | |
https://access.redhat.com/security/cve/CVE-2013-4231 | 2014-02-27 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Libtiff Search vendor "Libtiff" | Libtiff Search vendor "Libtiff" for product "Libtiff" | <= 4.0.2 Search vendor "Libtiff" for product "Libtiff" and version " <= 4.0.2" | - |
Affected
| ||||||
Libtiff Search vendor "Libtiff" | Libtiff Search vendor "Libtiff" for product "Libtiff" | 4.0 Search vendor "Libtiff" for product "Libtiff" and version "4.0" | - |
Affected
| ||||||
Libtiff Search vendor "Libtiff" | Libtiff Search vendor "Libtiff" for product "Libtiff" | 4.0 Search vendor "Libtiff" for product "Libtiff" and version "4.0" | alpha |
Affected
| ||||||
Libtiff Search vendor "Libtiff" | Libtiff Search vendor "Libtiff" for product "Libtiff" | 4.0 Search vendor "Libtiff" for product "Libtiff" and version "4.0" | beta1 |
Affected
| ||||||
Libtiff Search vendor "Libtiff" | Libtiff Search vendor "Libtiff" for product "Libtiff" | 4.0 Search vendor "Libtiff" for product "Libtiff" and version "4.0" | beta2 |
Affected
| ||||||
Libtiff Search vendor "Libtiff" | Libtiff Search vendor "Libtiff" for product "Libtiff" | 4.0 Search vendor "Libtiff" for product "Libtiff" and version "4.0" | beta3 |
Affected
| ||||||
Libtiff Search vendor "Libtiff" | Libtiff Search vendor "Libtiff" for product "Libtiff" | 4.0 Search vendor "Libtiff" for product "Libtiff" and version "4.0" | beta4 |
Affected
| ||||||
Libtiff Search vendor "Libtiff" | Libtiff Search vendor "Libtiff" for product "Libtiff" | 4.0 Search vendor "Libtiff" for product "Libtiff" and version "4.0" | beta5 |
Affected
| ||||||
Libtiff Search vendor "Libtiff" | Libtiff Search vendor "Libtiff" for product "Libtiff" | 4.0 Search vendor "Libtiff" for product "Libtiff" and version "4.0" | beta6 |
Affected
| ||||||
Libtiff Search vendor "Libtiff" | Libtiff Search vendor "Libtiff" for product "Libtiff" | 4.0.1 Search vendor "Libtiff" for product "Libtiff" and version "4.0.1" | - |
Affected
|