First published: Wed Jul 04 2012(Updated: )
A heap-based buffer overflow flaw was found in the way tiff2pdf, a TIFF image to a PDF document conversion tool, of libtiff, a library of functions for manipulating TIFF (Tagged Image File Format) image format files, performed write of TIFF image content into particular PDF document file, when not properly initialized T2P context struct pointer has been provided by tiff2pdf (application requesting the conversion) as one of parameters for the routine performing the write. A remote attacker could provide a specially-crafted TIFF image format file, that when processed by tiff2pdf would lead to tiff2pdf executable crash or, potentially, arbitrary code execution with the privileges of the user running the tiff2pdf binary. Issue found by: Huzaifa Sidhpurwala, Red Hat Security Response Team
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
tiff | <=4.0.2 | |
tiff | =3.4 | |
tiff | =3.4-beta18 | |
tiff | =3.4-beta24 | |
tiff | =3.4-beta28 | |
tiff | =3.4-beta29 | |
tiff | =3.4-beta31 | |
tiff | =3.4-beta32 | |
tiff | =3.4-beta34 | |
tiff | =3.4-beta35 | |
tiff | =3.4-beta36 | |
tiff | =3.4-beta37 | |
tiff | =3.5.1 | |
tiff | =3.5.2 | |
tiff | =3.5.3 | |
tiff | =3.5.4 | |
tiff | =3.5.5 | |
tiff | =3.5.6 | |
tiff | =3.5.6-beta | |
tiff | =3.5.7 | |
tiff | =3.5.7-alpha | |
tiff | =3.5.7-alpha2 | |
tiff | =3.5.7-alpha3 | |
tiff | =3.5.7-alpha4 | |
tiff | =3.5.7-beta | |
tiff | =3.6.0 | |
tiff | =3.6.0-beta | |
tiff | =3.6.0-beta2 | |
tiff | =3.6.1 | |
tiff | =3.7.0 | |
tiff | =3.7.0-alpha | |
tiff | =3.7.0-beta | |
tiff | =3.7.0-beta2 | |
tiff | =3.7.1 | |
tiff | =3.7.2 | |
tiff | =3.7.3 | |
tiff | =3.7.4 | |
tiff | =3.8.0 | |
tiff | =3.8.1 | |
tiff | =3.8.2 | |
tiff | =3.9 | |
tiff | =3.9.0 | |
tiff | =3.9.0-beta | |
tiff | =3.9.1 | |
tiff | =3.9.2 | |
tiff | =3.9.2-5.2.1 | |
tiff | =3.9.3 | |
tiff | =3.9.4 | |
tiff | =4.0 | |
tiff | =4.0-alpha | |
tiff | =4.0-beta1 | |
tiff | =4.0-beta2 | |
tiff | =4.0-beta3 | |
tiff | =4.0-beta4 | |
tiff | =4.0-beta5 | |
tiff | =4.0-beta6 | |
tiff | =4.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3401 is classified as a high severity vulnerability due to its potential for exploit via heap-based buffer overflow.
To fix CVE-2012-3401, upgrade to libtiff version 4.0.3 or later.
CVE-2012-3401 affects libtiff versions up to 4.0.2 and specific 3.x versions, commonly used for converting TIFF images to PDFs.
An attacker can exploit CVE-2012-3401 to execute arbitrary code or crash the application utilizing the affected library.
Yes, CVE-2012-3401 is well-documented in cybersecurity databases, indicating it's recognized as a significant vulnerability.