4/7/2012
13/8/2012
13/5/2023
CVE-2012-3401: Buffer Overflow
First published: Wed Jul 04 2012(Updated: )
A heap-based buffer overflow flaw was found in the way tiff2pdf, a TIFF image to a PDF document conversion tool, of libtiff, a library of functions for manipulating TIFF (Tagged Image File Format) image format files, performed write of TIFF image content into particular PDF document file, when not properly initialized T2P context struct pointer has been provided by tiff2pdf (application requesting the conversion) as one of parameters for the routine performing the write. A remote attacker could provide a specially-crafted TIFF image format file, that when processed by tiff2pdf would lead to tiff2pdf executable crash or, potentially, arbitrary code execution with the privileges of the user running the tiff2pdf binary.
Issue found by: Huzaifa Sidhpurwala, Red Hat Security Response Team
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|
Libtiff Libtiff | <=4.0.2 | |
Libtiff Libtiff | =3.4 | |
Libtiff Libtiff | =3.4-beta18 | |
Libtiff Libtiff | =3.4-beta24 | |
Libtiff Libtiff | =3.4-beta28 | |
Libtiff Libtiff | =3.4-beta29 | |
Libtiff Libtiff | =3.4-beta31 | |
Libtiff Libtiff | =3.4-beta32 | |
Libtiff Libtiff | =3.4-beta34 | |
Libtiff Libtiff | =3.4-beta35 | |
Libtiff Libtiff | =3.4-beta36 | |
Libtiff Libtiff | =3.4-beta37 | |
Libtiff Libtiff | =3.5.1 | |
Libtiff Libtiff | =3.5.2 | |
Libtiff Libtiff | =3.5.3 | |
Libtiff Libtiff | =3.5.4 | |
Libtiff Libtiff | =3.5.5 | |
Libtiff Libtiff | =3.5.6 | |
Libtiff Libtiff | =3.5.6-beta | |
Libtiff Libtiff | =3.5.7 | |
Libtiff Libtiff | =3.5.7-alpha | |
Libtiff Libtiff | =3.5.7-alpha2 | |
Libtiff Libtiff | =3.5.7-alpha3 | |
Libtiff Libtiff | =3.5.7-alpha4 | |
Libtiff Libtiff | =3.5.7-beta | |
Libtiff Libtiff | =3.6.0 | |
Libtiff Libtiff | =3.6.0-beta | |
Libtiff Libtiff | =3.6.0-beta2 | |
Libtiff Libtiff | =3.6.1 | |
Libtiff Libtiff | =3.7.0 | |
Libtiff Libtiff | =3.7.0-alpha | |
Libtiff Libtiff | =3.7.0-beta | |
Libtiff Libtiff | =3.7.0-beta2 | |
Libtiff Libtiff | =3.7.1 | |
Libtiff Libtiff | =3.7.2 | |
Libtiff Libtiff | =3.7.3 | |
Libtiff Libtiff | =3.7.4 | |
Libtiff Libtiff | =3.8.0 | |
Libtiff Libtiff | =3.8.1 | |
Libtiff Libtiff | =3.8.2 | |
Libtiff Libtiff | =3.9 | |
Libtiff Libtiff | =3.9.0 | |
Libtiff Libtiff | =3.9.0-beta | |
Libtiff Libtiff | =3.9.1 | |
Libtiff Libtiff | =3.9.2 | |
Libtiff Libtiff | =3.9.2-5.2.1 | |
Libtiff Libtiff | =3.9.3 | |
Libtiff Libtiff | =3.9.4 | |
Libtiff Libtiff | =4.0 | |
Libtiff Libtiff | =4.0-alpha | |
Libtiff Libtiff | =4.0-beta1 | |
Libtiff Libtiff | =4.0-beta2 | |
Libtiff Libtiff | =4.0-beta3 | |
Libtiff Libtiff | =4.0-beta4 | |
Libtiff Libtiff | =4.0-beta5 | |
Libtiff Libtiff | =4.0-beta6 | |
Libtiff Libtiff | =4.0.1 | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
- agent/author
- agent/description
- agent/event
- agent/first-publish-date
- agent/last-modified-date
- agent/references
- agent/severity
- agent/softwarecombine
- agent/tags
- agent/type
- agent/weakness
- collector/nvd-index
- collector/redhat-bugzilla
- alias/CVE-2012-3401
- vendor/libtiff
- canonical/libtiff libtiff
- version/libtiff libtiff/4.0.2
- version/libtiff libtiff/3.4
- version/libtiff libtiff/3.4-beta18
- version/libtiff libtiff/3.4-beta24
- version/libtiff libtiff/3.4-beta28
- version/libtiff libtiff/3.4-beta29
- version/libtiff libtiff/3.4-beta31
- version/libtiff libtiff/3.4-beta32
- version/libtiff libtiff/3.4-beta34
- version/libtiff libtiff/3.4-beta35
- version/libtiff libtiff/3.4-beta36
- version/libtiff libtiff/3.4-beta37
- version/libtiff libtiff/3.5.1
- version/libtiff libtiff/3.5.2
- version/libtiff libtiff/3.5.3
- version/libtiff libtiff/3.5.4
- version/libtiff libtiff/3.5.5
- version/libtiff libtiff/3.5.6
- version/libtiff libtiff/3.5.6-beta
- version/libtiff libtiff/3.5.7
- version/libtiff libtiff/3.5.7-alpha
- version/libtiff libtiff/3.5.7-alpha2
- version/libtiff libtiff/3.5.7-alpha3
- version/libtiff libtiff/3.5.7-alpha4
- version/libtiff libtiff/3.5.7-beta
- version/libtiff libtiff/3.6.0
- version/libtiff libtiff/3.6.0-beta
- version/libtiff libtiff/3.6.0-beta2
- version/libtiff libtiff/3.6.1
- version/libtiff libtiff/3.7.0
- version/libtiff libtiff/3.7.0-alpha
- version/libtiff libtiff/3.7.0-beta
- version/libtiff libtiff/3.7.0-beta2
- version/libtiff libtiff/3.7.1
- version/libtiff libtiff/3.7.2
- version/libtiff libtiff/3.7.3
- version/libtiff libtiff/3.7.4
- version/libtiff libtiff/3.8.0
- version/libtiff libtiff/3.8.1
- version/libtiff libtiff/3.8.2
- version/libtiff libtiff/3.9
- version/libtiff libtiff/3.9.0
- version/libtiff libtiff/3.9.0-beta
- version/libtiff libtiff/3.9.1
- version/libtiff libtiff/3.9.2
- version/libtiff libtiff/3.9.2-5.2.1
- version/libtiff libtiff/3.9.3
- version/libtiff libtiff/3.9.4
- version/libtiff libtiff/4.0
- version/libtiff libtiff/4.0-alpha
- version/libtiff libtiff/4.0-beta1
- version/libtiff libtiff/4.0-beta2
- version/libtiff libtiff/4.0-beta3
- version/libtiff libtiff/4.0-beta4
- version/libtiff libtiff/4.0-beta5
- version/libtiff libtiff/4.0-beta6
- version/libtiff libtiff/4.0.1
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203