CVE-2013-4231
19.01.2014, 17:16
Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size.Enginsight
Vendor | Product | Version |
---|---|---|
libtiff | libtiff | 𝑥 ≤ 4.0.2 |
libtiff | libtiff | 4.0 |
libtiff | libtiff | 4.0:alpha |
libtiff | libtiff | 4.0:beta1 |
libtiff | libtiff | 4.0:beta2 |
libtiff | libtiff | 4.0:beta3 |
libtiff | libtiff | 4.0:beta4 |
libtiff | libtiff | 4.0:beta5 |
libtiff | libtiff | 4.0:beta6 |
libtiff | libtiff | 4.0.1 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References