CVE-2013-4231

Published: 19 January 2014

Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size.

Priority

Low

Status

Package Release Status
tiff
Launchpad, Ubuntu, Debian
Upstream
Released (4.0.3-2)
Ubuntu 14.04 ESM (Trusty Tahr) Not vulnerable
(4.0.3-5ubuntu1)
Patches:
upstream: cvs diff -u -r 1.12 -r 1.13 tools/gif2tiff.c
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu.
tiff3
Launchpad, Ubuntu, Debian
Upstream Not vulnerable

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist