Heap-based Buffer Overflow Affecting libtiff-static package, versions <0:3.9.4-6.el6_3
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS6-LIBTIFFSTATIC-2058881
- published 26 Jul 2021
- disclosed 15 Jun 2012
Introduced: 15 Jun 2012
CVE-2012-2088 Open this link in a new tabHow to fix?
Upgrade Centos:6
libtiff-static
to version 0:3.9.4-6.el6_3 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff-static
package and not the libtiff-static
package as distributed by Centos
.
See How to fix?
for Centos:6
relevant fixed versions and status.
Integer signedness error in the TIFFReadDirectory function in tif_dirread.c in libtiff 3.9.4 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a negative tile depth in a tiff image, which triggers an improper conversion between signed and unsigned types, leading to a heap-based buffer overflow.
References
- http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html
- http://www.securityfocus.com/bid/54270
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6163
- https://access.redhat.com/security/cve/CVE-2012-2088
- http://security.gentoo.org/glsa/glsa-201209-02.xml
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:101
- https://bugzilla.redhat.com/show_bug.cgi?id=832864
- http://rhn.redhat.com/errata/RHSA-2012-1054.html
- https://access.redhat.com/errata/RHSA-2012:1054
- http://secunia.com/advisories/49686
- http://secunia.com/advisories/50726
- http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00010.html
- https://hermes.opensuse.org/messages/15083566