Integer overflow in the TIFFroundup macro in LibTIFF before 3.9.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TIFF file that triggers a buffer overflow.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
http://secunia.com/advisories/40181 | third party advisory vendor advisory |
http://blogs.sun.com/security/entry/cve_2010_2065_cve_2010 | |
http://marc.info/?l=oss-security&m=127731610612908&w=2 | mailing list |
http://www.vupen.com/english/advisories/2010/1638 | vdb entry |
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.596424 | vendor advisory |
http://www.vupen.com/english/advisories/2011/0621 | vdb entry |
http://www.ubuntu.com/usn/USN-954-1 | vendor advisory |
http://security.gentoo.org/glsa/glsa-201209-02.xml | vendor advisory |
http://www.vupen.com/english/advisories/2011/0204 | vdb entry |
http://www.remotesensing.org/libtiff/v3.9.3.html | |
https://bugzilla.redhat.com/show_bug.cgi?id=601274 | |
https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/589565 | |
http://www.mandriva.com/security/advisories?name=MDVSA-2011:043 | vendor advisory |
http://secunia.com/advisories/40381 | third party advisory |
http://secunia.com/advisories/50726 | third party advisory |