CVE-2010-2067

Stack-based buffer overflow in the TIFFFetchSubjectDistance function in tif_dirread.c in LibTIFF before 3.9.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long EXIF SubjectDistance field in a TIFF file.
References
Link Resource
http://bugzilla.maptools.org/show_bug.cgi?id=2212 Issue Tracking Third Party Advisory
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=874 Broken Link
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html Mailing List Third Party Advisory
http://marc.info/?l=oss-security&m=127731610612908&w=2 Mailing List Third Party Advisory
http://osvdb.org/65676 Broken Link
http://secunia.com/advisories/40241 Third Party Advisory
http://secunia.com/advisories/40381 Third Party Advisory
http://secunia.com/advisories/50726 Third Party Advisory
http://security.gentoo.org/glsa/glsa-201209-02.xml Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.596424 Third Party Advisory
http://www.remotesensing.org/libtiff/v3.9.4.html Broken Link
http://www.ubuntu.com/usn/USN-954-1 Third Party Advisory
http://www.vupen.com/english/advisories/2010/1638 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=599576 Issue Tracking Third Party Advisory
http://bugzilla.maptools.org/show_bug.cgi?id=2212 Issue Tracking Third Party Advisory
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=874 Broken Link
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html Mailing List Third Party Advisory
http://marc.info/?l=oss-security&m=127731610612908&w=2 Mailing List Third Party Advisory
http://osvdb.org/65676 Broken Link
http://secunia.com/advisories/40241 Third Party Advisory
http://secunia.com/advisories/40381 Third Party Advisory
http://secunia.com/advisories/50726 Third Party Advisory
http://security.gentoo.org/glsa/glsa-201209-02.xml Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.596424 Third Party Advisory
http://www.remotesensing.org/libtiff/v3.9.4.html Broken Link
http://www.ubuntu.com/usn/USN-954-1 Third Party Advisory
http://www.vupen.com/english/advisories/2010/1638 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=599576 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*

History

No history.

Information

Published : 2010-06-24 12:30

Updated : 2025-04-11 00:51


NVD link : CVE-2010-2067

Mitre link : CVE-2010-2067

CVE.ORG link : CVE-2010-2067


JSON object : View

Products Affected

libtiff

  • libtiff

canonical

  • ubuntu_linux
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer