CVE-2013-4231

Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c.  NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 95%
VendorProductVersion
libtifflibtiff
𝑥
≤ 4.0.2
libtifflibtiff
4.0
libtifflibtiff
4.0:alpha
libtifflibtiff
4.0:beta1
libtifflibtiff
4.0:beta2
libtifflibtiff
4.0:beta3
libtifflibtiff
4.0:beta4
libtifflibtiff
4.0:beta5
libtifflibtiff
4.0:beta6
libtifflibtiff
4.0.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
tiff
bullseye (security)
4.2.0-1+deb11u5
fixed
bullseye
4.2.0-1+deb11u5
fixed
bookworm
4.5.0-6+deb12u1
fixed
bookworm (security)
4.5.0-6+deb12u1
fixed
sid
4.5.1+git230720-5
fixed
trixie
4.5.1+git230720-5
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
tiff
trusty
not-affected
saucy
Fixed 4.0.2-4ubuntu3.1
released
raring
ignored
quantal
Fixed 4.0.2-1ubuntu2.3
released
precise
Fixed 3.9.5-2ubuntu1.6
released
lucid
Fixed 3.9.2-2ubuntu0.14
released
tiff3
trusty
dne
saucy
not-affected
raring
not-affected
quantal
not-affected
precise
dne
lucid
dne