ID CVE-2012-4564
Summary ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow.
References
Vulnerable Configurations
  • cpe:2.3:a:libtiff:libtiff:-:*:*:*:*:*:*:*
    cpe:2.3:a:libtiff:libtiff:-:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 29-08-2017 - 01:32)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:P
redhat via4
advisories
rhsa
id RHSA-2012:1590
rpms
  • libtiff-0:3.8.2-18.el5_8
  • libtiff-devel-0:3.8.2-18.el5_8
  • libtiff-0:3.9.4-9.el6_3
  • libtiff-devel-0:3.9.4-9.el6_3
  • libtiff-static-0:3.9.4-9.el6_3
refmap via4
bid 56372
confirm https://bugzilla.redhat.com/show_bug.cgi?id=871700
debian DSA-2575
mlist
  • [oss-security] 20121102 Re: libtiff: Missing return value check in ppm2tiff leading to heap-buffer overflow when reading a tiff file
  • [oss-security] 20121102 libtiff: Missing return value check in ppm2tiff leading to heap-buffer overflow when reading a tiff file
osvdb 86878
secunia 51133
suse openSUSE-SU-2013:0187
ubuntu USN-1631-1
xf libtiff-ppm2tiff-bo(79750)
Last major update 29-08-2017 - 01:32
Published 11-11-2012 - 13:00
Back to Top