First published: Wed Jun 23 2010(Updated: )
A flaw was found in a way libtiff handled vertically flipped (i.e. with negative toskew) images on 64bit platforms. Numeric computation used to calculate buffer pointer was done in the way that incorrectly extended from 32bit type to 64bit, resulting in out-of-bounds writes. For more details, refer to following bugs: <a href="http://bugzilla.maptools.org/show_bug.cgi?id=2207">http://bugzilla.maptools.org/show_bug.cgi?id=2207</a> <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED WONTFIX - Assorted libtiff failures on downsampled OJPEG input" href="show_bug.cgi?id=583081">https://bugzilla.redhat.com/show_bug.cgi?id=583081</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
tiff | =3.9.0 | |
tiff | =3.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2233 has a medium severity rating due to the potential for out-of-bounds writes affecting application stability.
To fix CVE-2010-2233, update libtiff to versions 3.9.4 or later where the flaw has been addressed.
CVE-2010-2233 impacts libtiff versions 3.9.0 and 3.9.2.
CVE-2010-2233 is a buffer overflow vulnerability resulting from improper handling of vertically flipped images.
CVE-2010-2233 occurs on 64-bit platforms due to improper numerical computation during buffer pointer calculations.