ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Libtiff | Libtiff | * | 4.0.3 (including) |
Red Hat Enterprise Linux 5 | RedHat | libtiff-0:3.8.2-18.el5_8 | * |
Red Hat Enterprise Linux 6 | RedHat | libtiff-0:3.9.4-9.el6_3 | * |
Tiff | Ubuntu | devel | * |
Tiff | Ubuntu | hardy | * |
Tiff | Ubuntu | lucid | * |
Tiff | Ubuntu | oneiric | * |
Tiff | Ubuntu | precise | * |
Tiff | Ubuntu | quantal | * |
Tiff | Ubuntu | raring | * |
Tiff | Ubuntu | saucy | * |
Tiff | Ubuntu | trusty | * |
Tiff | Ubuntu | upstream | * |
Tiff3 | Ubuntu | quantal | * |
Tiff3 | Ubuntu | raring | * |
Tiff3 | Ubuntu | saucy | * |
Tiff3 | Ubuntu | upstream | * |