Multiple integer overflows in tiff2pdf in libtiff before 4.0.2 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/54076 | vdb entry |
http://secunia.com/advisories/49493 | third party advisory vendor advisory |
http://www.remotesensing.org/libtiff/v4.0.2.html | |
https://hermes.opensuse.org/messages/15083566 | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00010.html | vendor advisory |
http://www.debian.org/security/2012/dsa-2552 | vendor advisory |
http://rhn.redhat.com/errata/RHSA-2012-1054.html | vendor advisory |
http://security.gentoo.org/glsa/glsa-201209-02.xml | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=810551 | |
http://www.mandriva.com/security/advisories?name=MDVSA-2012:101 | vendor advisory |
http://secunia.com/advisories/49686 | third party advisory vendor advisory |
http://secunia.com/advisories/50726 | third party advisory |