CVE-2013-4231
Published: 19 January 2014
Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size.
Notes
Author | Note |
---|---|
jdstrand | tiff3 does not build tiff-tools |
Priority
Status
Package | Release | Status |
---|---|---|
tiff Launchpad, Ubuntu, Debian |
lucid |
Released
(3.9.2-2ubuntu0.14)
|
precise |
Released
(3.9.5-2ubuntu1.6)
|
|
quantal |
Released
(4.0.2-1ubuntu2.3)
|
|
raring |
Ignored
(end of life)
|
|
saucy |
Released
(4.0.2-4ubuntu3.1)
|
|
trusty |
Not vulnerable
(4.0.3-5ubuntu1)
|
|
upstream |
Released
(4.0.3-2)
|
|
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu. | ||
tiff3 Launchpad, Ubuntu, Debian |
lucid |
Does not exist
|
precise |
Does not exist
|
|
quantal |
Not vulnerable
|
|
raring |
Not vulnerable
|
|
saucy |
Not vulnerable
|
|
trusty |
Does not exist
|
|
upstream |
Not vulnerable
|