CVE-2013-4231
Published: January 19, 2014Last modified: November 10, 2023
Description
Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size.
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | tiff | Not affected (4.4.0-r4) |
Stream | tiff | Not affected (4.5.1-r0) |
References
- http://bugzilla.maptools.org/show_bug.cgi?id=2450
- http://rhn.redhat.com/errata/RHSA-2014-0223.html
- http://secunia.com/advisories/54543
- http://secunia.com/advisories/54628
- http://www.asmail.be/msg0055359936.html
- http://www.debian.org/security/2013/dsa-2744
- http://www.openwall.com/lists/oss-security/2013/08/10/2
- http://www.securityfocus.com/bid/61695
- https://bugzilla.redhat.com/show_bug.cgi?id=995965