Integer overflow in the TIFFFetchData function in tif_dirread.c for libtiff before 3.8.1 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via a crafted TIFF image.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Libtiff | Libtiff | * | 3.8.0 (including) |
| Libtiff | Libtiff | 3.4 (including) | 3.4 (including) |
| Libtiff | Libtiff | 3.5.1 (including) | 3.5.1 (including) |
| Libtiff | Libtiff | 3.5.2 (including) | 3.5.2 (including) |
| Libtiff | Libtiff | 3.5.3 (including) | 3.5.3 (including) |
| Libtiff | Libtiff | 3.5.4 (including) | 3.5.4 (including) |
| Libtiff | Libtiff | 3.5.5 (including) | 3.5.5 (including) |
| Libtiff | Libtiff | 3.5.6 (including) | 3.5.6 (including) |
| Libtiff | Libtiff | 3.5.7 (including) | 3.5.7 (including) |
| Libtiff | Libtiff | 3.6.0 (including) | 3.6.0 (including) |
| Libtiff | Libtiff | 3.6.1 (including) | 3.6.1 (including) |
| Libtiff | Libtiff | 3.7.0 (including) | 3.7.0 (including) |
| Libtiff | Libtiff | 3.7.1 (including) | 3.7.1 (including) |
| Red Hat Enterprise Linux 3 | RedHat | libtiff-0:3.5.7-25.el3.1 | * |
| Red Hat Enterprise Linux 3 | RedHat | kdegraphics-7:3.1.3-3.10 | * |
| Red Hat Enterprise Linux 4 | RedHat | libtiff-0:3.6.1-10 | * |
| Tiff | Ubuntu | dapper | * |