First published: Mon Jan 26 2015(Updated: )
LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by failure of tif_next.c to verify that the BitsPerSample value is 2, and the t2p_sample_lab_signed_to_unsigned function in tiff2pdf.c.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tiff | 4.1.0+git191117-2~deb10u4 4.1.0+git191117-2~deb10u8 4.2.0-1+deb11u4 4.5.0-6 4.5.1+git230720-1 | |
libtiff | =4.0.3 | |
Debian GNU/Linux | =7.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.2 | |
redhat enterprise Linux server aus | =7.3 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server eus | =7.2 | |
redhat enterprise Linux server eus | =7.3 | |
redhat enterprise Linux server eus | =7.4 | |
redhat enterprise Linux server tus | =7.2 | |
redhat enterprise Linux server tus | =7.3 | |
macOS Yosemite | =10.8.5 | |
macOS Yosemite | =10.9.5 | |
macOS Yosemite | =10.10.0 | |
macOS Yosemite | =10.10.1 | |
macOS Yosemite | =10.10.2 | |
macOS Yosemite | =10.10.3 | |
Apple iPhone OS | ||
Apple iPhone OS | ||
Apple iPhone OS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8129 has a severity rating of medium due to its potential for causing denial of service.
To fix CVE-2014-8129, upgrade to LibTIFF version 4.1.0 or later as specified in your package manager's updates.
CVE-2014-8129 affects systems that utilize LibTIFF version 4.0.3, including various Debian and Red Hat distributions.
The impacts associated with CVE-2014-8129 include denial of service from an out-of-bounds write when processing crafted TIFF images.
There are no publicly known exploits specifically targeting CVE-2014-8129 reported at this time.