First published: Wed Dec 22 2004(Updated: )
Integer overflow in (1) tif_dirread.c and (2) tif_fax3.c for libtiff 3.5.7 and 3.7.0 allows remote attackers to execute arbitrary code via a TIFF file containing a TIFF_ASCII or TIFF_UNDEFINED directory entry with a -1 entry count, which leads to a heap-based buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
libtiff | =3.6.1 | |
libtiff | =3.4 | |
libtiff | =3.5.7 | |
libtiff | =3.7.0 | |
libtiff | =3.6.0 | |
libtiff | =3.5.3 | |
libtiff | =3.5.4 | |
libtiff | =3.5.2 | |
libtiff | =3.5.5 | |
libtiff | =3.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1308 has a critical severity rating due to the potential for arbitrary code execution.
To fix CVE-2004-1308, update libtiff to version 3.6.1 or later.
CVE-2004-1308 allows remote attackers to exploit the vulnerability through specially crafted TIFF files.
Affected versions include libtiff versions 3.4, 3.5.2 to 3.5.7, and 3.7.0.
A temporary workaround for CVE-2004-1308 is to avoid opening untrusted TIFF files.