First published: Tue Oct 26 2004(Updated: )
Multiple vulnerabilities in the RLE (run length encoding) decoders for libtiff 3.6.1 and earlier, related to buffer overflows and integer overflows, allow remote attackers to execute arbitrary code via TIFF files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
libtiff | =3.6.1 | |
PDFlib | =5.0.2 | |
wxGTK2 | =2.5_.0 | |
libtiff | =3.4 | |
libtiff | =3.5.7 | |
libtiff | =3.6.0 | |
libtiff | =3.5.3 | |
libtiff | =3.5.4 | |
libtiff | =3.5.2 | |
libtiff | =3.5.5 | |
libtiff | =3.5.1 | |
SUSE Linux | =9.0 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Fedora Core | =core_2.0 | |
Apple macOS Server | =10.3.2 | |
Apple iOS and macOS | =10.2.5 | |
Trustix Secure Linux | =2.0 | |
Apple macOS Server | =10.2.2 | |
redhat enterprise Linux desktop | =3.0 | |
SUSE Linux | =9.0 | |
Apple iOS and macOS | =10.2.7 | |
Apple iOS and macOS | =10.2.8 | |
Apple macOS Server | =10.2.4 | |
Red Hat Linux Advanced Workstation | =2.1 | |
KDE KDE | =3.3.1 | |
Apple iOS and macOS | =10.2.1 | |
SUSE Linux | =8.2 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =2.1 | |
Apple macOS Server | =10.3.5 | |
Apple iOS and macOS | =10.3.1 | |
SUSE Linux | =8 | |
KDE KDE | =3.2.2 | |
SUSE Linux | =1.0 | |
KDE KDE | =3.2.1 | |
Apple iOS and macOS | =10.3.5 | |
Apple macOS Server | =10.3.3 | |
Red Hat Enterprise Linux | =2.1 | |
Apple macOS Server | =10.2.7 | |
Apple macOS Server | =10.2.3 | |
Apple iOS and macOS | =10.2.4 | |
Apple macOS Server | =10.3.4 | |
Trustix Secure Linux | =1.5 | |
Apple iOS and macOS | =10.3.2 | |
Apple iOS and macOS | =10.2.2 | |
Apple macOS Server | =10.2.5 | |
Red Hat Linux Advanced Workstation | =2.1 | |
SUSE Linux | =9.1 | |
Apple iOS and macOS | =10.3.6 | |
Apple macOS Server | =10.3 | |
Apple macOS Server | =10.2.6 | |
Red Hat Enterprise Linux | =3.0 | |
Apple macOS Server | =10.2 | |
Red Hat Enterprise Linux | =2.1 | |
Apple macOS Server | =10.2.1 | |
Apple macOS Server | =10.3.1 | |
KDE KDE | =3.3 | |
Mandrake Linux | =10.0 | |
Red Hat Enterprise Linux | =3.0 | |
Apple iOS and macOS | =10.3.4 | |
Red Hat Enterprise Linux | =2.1 | |
Apple iOS and macOS | =10.3.3 | |
Apple iOS and macOS | =10.2.6 | |
Trustix Secure Linux | =2.1 | |
KDE KDE | =3.2 | |
KDE KDE | =3.2.3 | |
Apple iOS and macOS | =10.2.3 | |
Apple macOS Server | =10.2.8 | |
Apple iOS and macOS | =10.2 | |
SUSE Linux | =8.1 | |
Apple iOS and macOS | =10.3 | |
Red Hat Enterprise Linux | =2.1 | |
Apple macOS Server | =10.3.6 | |
Mandrake Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2004-0803 is considered critical due to its potential to allow remote code execution.
To fix CVE-2004-0803, update your libtiff library to version 3.6.2 or later, as this version addresses the vulnerabilities.
The impacts of CVE-2004-0803 include the potential for remote attackers to execute arbitrary code through specially crafted TIFF files.
Versions of libtiff 3.6.1 and earlier are affected by CVE-2004-0803, including 3.5.x and 3.4.x versions.
A temporary workaround for CVE-2004-0803 may involve disabling the handling of TIFF files in applications that use the vulnerable libtiff library.