First published: Mon Jan 26 2015(Updated: )
LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by failure of tif_next.c to verify that the BitsPerSample value is 2, and the t2p_sample_lab_signed_to_unsigned function in tiff2pdf.c.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tiff | 4.1.0+git191117-2~deb10u4 4.1.0+git191117-2~deb10u8 4.2.0-1+deb11u4 4.5.0-6 4.5.1+git230720-1 | |
Libtiff Libtiff | =4.0.3 | |
Debian Debian Linux | =7.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.2 | |
Redhat Enterprise Linux Server Aus | =7.3 | |
Redhat Enterprise Linux Server Aus | =7.4 | |
Redhat Enterprise Linux Server Eus | =7.2 | |
Redhat Enterprise Linux Server Eus | =7.3 | |
Redhat Enterprise Linux Server Eus | =7.4 | |
Redhat Enterprise Linux Server Tus | =7.2 | |
Redhat Enterprise Linux Server Tus | =7.3 | |
Apple Mac OS X | =10.8.5 | |
Apple Mac OS X | =10.9.5 | |
Apple Mac OS X | =10.10.0 | |
Apple Mac OS X | =10.10.1 | |
Apple Mac OS X | =10.10.2 | |
Apple Mac OS X | =10.10.3 | |
Apple iPhone OS | ||
Apple iPhone OS | ||
Apple iPhone OS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.