CVE-2013-4231
Published: 19 January 2014
Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size.
Priority
Status
Package | Release | Status |
---|---|---|
tiff Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.0.3-2)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Not vulnerable
(4.0.3-5ubuntu1)
|
|
Patches: upstream: cvs diff -u -r 1.12 -r 1.13 tools/gif2tiff.c |
||
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu. | ||
tiff3 Launchpad, Ubuntu, Debian |
Upstream |
Not vulnerable
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
Notes
Author | Note |
---|---|
jdstrand | tiff3 does not build tiff-tools |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4231
- http://www.asmail.be/msg0055359936.html
- https://usn.ubuntu.com/usn/usn-2205-1
- NVD
- Launchpad
- Debian