Numeric Errors Affecting tiff package, versions <4.0.2-1
Threat Intelligence
EPSS
4.34% (93rd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN8-TIFF-405532
- published 22 Jul 2012
- disclosed 22 Jul 2012
Introduced: 22 Jul 2012
CVE-2012-2113 Open this link in a new tabHow to fix?
Upgrade Debian:8 tiff to version 4.0.2-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream tiff package and not the tiff package as distributed by Debian.
See How to fix? for Debian:8 relevant fixed versions and status.
Multiple integer overflows in tiff2pdf in libtiff before 4.0.2 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
References
- https://security-tracker.debian.org/tracker/CVE-2012-2113
- http://www.debian.org/security/2012/dsa-2552
- http://security.gentoo.org/glsa/glsa-201209-02.xml
- https://hermes.opensuse.org/messages/15083566
- http://www.remotesensing.org/libtiff/v4.0.2.html
- http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00010.html
- https://bugzilla.redhat.com/show_bug.cgi?id=810551
- http://rhn.redhat.com/errata/RHSA-2012-1054.html
- http://secunia.com/advisories/49493
- http://secunia.com/advisories/49686
- http://secunia.com/advisories/50726
- http://www.securityfocus.com/bid/54076
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2012-2113
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:101
- https://access.redhat.com/errata/RHSA-2012:1054
- https://access.redhat.com/security/cve/CVE-2012-2113
CVSS Scores
version 3.1