The TIFFVStripSize function in tif_strip.c in LibTIFF 3.9.0 and 3.9.2 makes incorrect calls to the TIFFGetField function, which allows remote attackers to cause a denial of service (application crash) via a crafted TIFF image, related to "downsampled OJPEG input" and possibly related to a compiler optimization that triggers a divide-by-zero error.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=603703 | patch |
http://secunia.com/advisories/40527 | third party advisory |
http://bugzilla.maptools.org/show_bug.cgi?id=2215 | |
http://www.debian.org/security/2012/dsa-2552 | vendor advisory |
https://bugs.launchpad.net/bugs/593067 | |
http://www.vupen.com/english/advisories/2010/1761 | vdb entry |
http://security.gentoo.org/glsa/glsa-201209-02.xml | vendor advisory |
http://www.redhat.com/support/errata/RHSA-2010-0519.html | vendor advisory |
http://secunia.com/advisories/40422 | third party advisory |
http://secunia.com/advisories/50726 | third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=583081 | exploit |