CVE-2013-4243
Published: 10 September 2013
Heap-based buffer overflow in the readgifimage function in the gif2tiff tool in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted height and width values in a GIF image.
Notes
Author | Note |
---|---|
jdstrand | per Debian, tiff3 source package doesn't build the TIFF tools |
mdeslaur | as of 2014-03-10, no upstream fix yet |
Priority
Status
Package | Release | Status |
---|---|---|
tiff Launchpad, Ubuntu, Debian |
lucid |
Released
(3.9.2-2ubuntu0.14)
|
precise |
Released
(3.9.5-2ubuntu1.6)
|
|
quantal |
Released
(4.0.2-1ubuntu2.3)
|
|
raring |
Ignored
(end of life)
|
|
saucy |
Released
(4.0.2-4ubuntu3.1)
|
|
trusty |
Released
(4.0.3-7ubuntu0.1)
|
|
upstream |
Needs triage
|
|
Patches: vendor: http://bugzilla.maptools.org/show_bug.cgi?id=2451#c10 |
||
tiff3 Launchpad, Ubuntu, Debian |
lucid |
Does not exist
|
precise |
Does not exist
|
|
quantal |
Not vulnerable
|
|
raring |
Not vulnerable
|
|
saucy |
Not vulnerable
|
|
trusty |
Does not exist
|
|
upstream |
Needed
|