Out-of-Bounds Affecting libtiff-static package, versions <0:3.9.4-10.el6_5
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS6-LIBTIFFSTATIC-2093715
- published 26 Jul 2021
- disclosed 1 Aug 2013
Introduced: 1 Aug 2013
CVE-2013-4231 Open this link in a new tabHow to fix?
Upgrade Centos:6
libtiff-static
to version 0:3.9.4-10.el6_5 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream libtiff-static
package and not the libtiff-static
package as distributed by Centos
.
See How to fix?
for Centos:6
relevant fixed versions and status.
Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size.
References
- http://www.securityfocus.com/bid/61695
- http://bugzilla.maptools.org/show_bug.cgi?id=2450
- https://bugzilla.redhat.com/show_bug.cgi?id=995965
- https://access.redhat.com/security/cve/CVE-2013-4231
- http://www.debian.org/security/2013/dsa-2744
- http://www.asmail.be/msg0055359936.html
- http://www.openwall.com/lists/oss-security/2013/08/10/2
- http://rhn.redhat.com/errata/RHSA-2014-0223.html
- https://access.redhat.com/errata/RHSA-2014:0222
- http://secunia.com/advisories/54543
- http://secunia.com/advisories/54628