CVE-2004-1307 Affecting tiff package, versions <3.7.0
Threat Intelligence
EPSS
4.81% (93rd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN8-TIFF-406017
- published 21 Dec 2004
- disclosed 21 Dec 2004
Introduced: 21 Dec 2004
CVE-2004-1307 Open this link in a new tabHow to fix?
Upgrade Debian:8 tiff to version 3.7.0 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream tiff package and not the tiff package as distributed by Debian.
See How to fix? for Debian:8 relevant fixed versions and status.
Integer overflow in the TIFFFetchStripThing function in tif_dirread.c for libtiff 3.6.1 allows remote attackers to execute arbitrary code via a TIFF file with the STRIPOFFSETS flag and a large number of strips, which causes a zero byte buffer to be allocated and leads to a heap-based buffer overflow.
References
- https://security-tracker.debian.org/tracker/CVE-2004-1307
- http://lists.apple.com/archives/security-announce/2005/May/msg00001.html
- http://www.us-cert.gov/cas/techalerts/TA05-136A.html
- http://www.kb.cert.org/vuls/id/539110
- http://www.idefense.com/application/poi/display?id=173&type=vulnerabilities&flashstatus=true
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11175
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1
CVSS Scores
version 3.1