First published: Sat May 14 2005(Updated: )
Stack-based buffer overflow in libTIFF before 3.7.2 allows remote attackers to execute arbitrary code via a TIFF file with a malformed BitsPerSample tag.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
tiff | =3.4 | |
tiff | =3.5.1 | |
tiff | =3.5.2 | |
tiff | =3.5.3 | |
tiff | =3.5.4 | |
tiff | =3.5.5 | |
tiff | =3.5.6 | |
tiff | =3.5.7 | |
tiff | =3.6.0 | |
tiff | =3.6.1 | |
tiff | =3.7.0 | |
tiff | =3.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1544 has a high severity level due to its potential to allow remote code execution.
To fix CVE-2005-1544, upgrade to libTIFF version 3.7.2 or later.
CVE-2005-1544 affects libTIFF versions 3.4 through 3.7.1.
CVE-2005-1544 is a stack-based buffer overflow vulnerability.
Yes, CVE-2005-1544 can be exploited remotely through a specially crafted TIFF file.