Integer overflow in the ReadDirectory function in tiffdump.c in tiffdump in LibTIFF before 3.9.5 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF file containing a directory data structure with many directory entries.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
http://openwall.com/lists/oss-security/2011/04/12/10 | patch mailing list |
http://secunia.com/advisories/44271 | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html | vendor advisory |
http://bugzilla.maptools.org/show_bug.cgi?id=2218 | patch |
http://www.debian.org/security/2012/dsa-2552 | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=695887 | patch |
http://security.gentoo.org/glsa/glsa-201209-02.xml | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058478.html | vendor advisory |
http://www.remotesensing.org/libtiff/v3.9.5.html | patch |
http://ubuntu.com/usn/usn-1416-1 | vendor advisory |
http://www.securityfocus.com/bid/47338 | vdb entry |
http://secunia.com/advisories/50726 | third party advisory |