ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Libtiff | Libtiff | * | 4.0.3 (including) |
| Red Hat Enterprise Linux 5 | RedHat | libtiff-0:3.8.2-18.el5_8 | * |
| Red Hat Enterprise Linux 6 | RedHat | libtiff-0:3.9.4-9.el6_3 | * |
| Tiff | Ubuntu | devel | * |
| Tiff | Ubuntu | esm-infra-legacy/trusty | * |
| Tiff | Ubuntu | hardy | * |
| Tiff | Ubuntu | lucid | * |
| Tiff | Ubuntu | oneiric | * |
| Tiff | Ubuntu | precise | * |
| Tiff | Ubuntu | quantal | * |
| Tiff | Ubuntu | raring | * |
| Tiff | Ubuntu | saucy | * |
| Tiff | Ubuntu | trusty | * |
| Tiff | Ubuntu | trusty/esm | * |
| Tiff | Ubuntu | upstream | * |
| Tiff3 | Ubuntu | quantal | * |
| Tiff3 | Ubuntu | raring | * |
| Tiff3 | Ubuntu | saucy | * |
| Tiff3 | Ubuntu | upstream | * |