CVE-2004-0803

Multiple vulnerabilities in the RLE (run length encoding) decoders for libtiff 3.6.1 and earlier, related to buffer overflows and integer overflows, allow remote attackers to execute arbitrary code via TIFF files.
References
Link Resource
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000888
http://marc.info/?l=bugtraq&m=109778785107450&w=2
http://scary.beasts.org/security/CESA-2004-006.txt
http://secunia.com/advisories/12818
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1
http://www.debian.org/security/2004/dsa-567 Patch Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200410-11.xml
http://www.kb.cert.org/vuls/id/948752 Third Party Advisory US Government Resource
http://www.kde.org/info/security/advisory-20041209-2.txt
http://www.mandriva.com/security/advisories?name=MDKSA-2004:109
http://www.mandriva.com/security/advisories?name=MDKSA-2005:052
http://www.novell.com/linux/security/advisories/2004_38_libtiff.html
http://www.redhat.com/support/errata/RHSA-2004-577.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-021.html
http://www.redhat.com/support/errata/RHSA-2005-354.html
http://www.securityfocus.com/bid/11406
https://exchange.xforce.ibmcloud.com/vulnerabilities/17703
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100114
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8896
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000888
http://marc.info/?l=bugtraq&m=109778785107450&w=2
http://scary.beasts.org/security/CESA-2004-006.txt
http://secunia.com/advisories/12818
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1
http://www.debian.org/security/2004/dsa-567 Patch Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200410-11.xml
http://www.kb.cert.org/vuls/id/948752 Third Party Advisory US Government Resource
http://www.kde.org/info/security/advisory-20041209-2.txt
http://www.mandriva.com/security/advisories?name=MDKSA-2004:109
http://www.mandriva.com/security/advisories?name=MDKSA-2005:052
http://www.novell.com/linux/security/advisories/2004_38_libtiff.html
http://www.redhat.com/support/errata/RHSA-2004-577.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-021.html
http://www.redhat.com/support/errata/RHSA-2005-354.html
http://www.securityfocus.com/bid/11406
https://exchange.xforce.ibmcloud.com/vulnerabilities/17703
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100114
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8896
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:libtiff:libtiff:3.4:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.1:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.2:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.3:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.4:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.5:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.7:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.6.0:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.6.1:*:*:*:*:*:*:*
cpe:2.3:a:pdflib:pdf_library:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:wxgtk2:wxgtk2:2.5_.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.2.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2004-12-23 05:00

Updated : 2025-04-03 01:03


NVD link : CVE-2004-0803

Mitre link : CVE-2004-0803

CVE.ORG link : CVE-2004-0803


JSON object : View

Products Affected

trustix

  • secure_linux

libtiff

  • libtiff

kde

  • kde

pdflib

  • pdf_library

mandrakesoft

  • mandrake_linux

redhat

  • enterprise_linux_desktop
  • fedora_core
  • linux_advanced_workstation
  • enterprise_linux

suse

  • suse_linux

apple

  • mac_os_x
  • mac_os_x_server

wxgtk2

  • wxgtk2