CVE-2004-0886

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls.

References

http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000888

http://marc.info/?l=bugtraq&m=109779465621929&w=2

http://secunia.com/advisories/12818

http://securitytracker.com/id?1011674

http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1

http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1

http://www.ciac.org/ciac/bulletins/p-015.shtml

http://www.debian.org/security/2004/dsa-567

http://www.kb.cert.org/vuls/id/687568

http://www.kde.org/info/security/advisory-20041209-2.txt

http://www.mandriva.com/security/advisories?name=MDKSA-2004:109

http://www.mandriva.com/security/advisories?name=MDKSA-2005:052

http://www.novell.com/linux/security/advisories/2004_38_libtiff.html

http://www.redhat.com/support/errata/RHSA-2004-577.html

http://www.redhat.com/support/errata/RHSA-2005-021.html

http://www.redhat.com/support/errata/RHSA-2005-354.html

http://www.securityfocus.com/bid/11406

http://www.trustix.org/errata/2004/0054/

https://exchange.xforce.ibmcloud.com/vulnerabilities/17715

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100116

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9907

Details

Source: MITRE

Published: 2005-01-27

Updated: 2017-10-11

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:libtiff:libtiff:3.4:*:*:*:*:*:*:*

cpe:2.3:a:libtiff:libtiff:3.5.1:*:*:*:*:*:*:*

cpe:2.3:a:libtiff:libtiff:3.5.2:*:*:*:*:*:*:*

cpe:2.3:a:libtiff:libtiff:3.5.3:*:*:*:*:*:*:*

cpe:2.3:a:libtiff:libtiff:3.5.4:*:*:*:*:*:*:*

cpe:2.3:a:libtiff:libtiff:3.5.5:*:*:*:*:*:*:*

cpe:2.3:a:libtiff:libtiff:3.5.7:*:*:*:*:*:*:*

cpe:2.3:a:libtiff:libtiff:3.6.0:*:*:*:*:*:*:*

cpe:2.3:a:libtiff:libtiff:3.6.1:*:*:*:*:*:*:*

cpe:2.3:a:pdflib:pdf_library:5.0.2:*:*:*:*:*:*:*

cpe:2.3:a:wxgtk2:wxgtk2:*:*:*:*:*:*:*:*

cpe:2.3:a:wxgtk2:wxgtk2:2.5_.0:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.2.7:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*

cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*

cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*

cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*

cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*

cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*

cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*

cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*

cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*

cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*

cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*

cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*

cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*

Tenable Plugins

View all (17 total)

IDNameProductFamilySeverity
37929FreeBSD : tiff -- multiple integer overflows (3897a2f8-1d57-11d9-bc4a-000c41e2cdad)NessusFreeBSD Local Security Checks
medium
24551Mandrake Linux Security Advisory : wxGTK2 (MDKSA-2004:111)NessusMandriva Local Security Checks
high
21809CentOS 3 : tetex (CESA-2005:354)NessusCentOS Local Security Checks
critical
21795CentOS 3 : kdegraphics (CESA-2005:021)NessusCentOS Local Security Checks
critical
18775Slackware 10.0 / 8.1 / 9.0 / 9.1 / current : libtiff (SSA:2004-305-02)NessusSlackware Local Security Checks
high
18017RHEL 2.1 / 3 : kdegraphics (RHSA-2005:021)NessusRed Hat Local Security Checks
critical
17680RHEL 2.1 / 3 : tetex (RHSA-2005:354)NessusRed Hat Local Security Checks
critical
17281Mandrake Linux Security Advisory : kdegraphics (MDKSA-2005:052)NessusMandriva Local Security Checks
critical
16004GLSA-200412-17 : kfax: Multiple overflows in the included TIFF libraryNessusGentoo Local Security Checks
high
15906GLSA-200412-02 : PDFlib: Multiple overflows in the included TIFF libraryNessusGentoo Local Security Checks
high
15898Mac OS X Multiple Vulnerabilities (Security Update 2004-12-02)NessusMacOS X Local Security Checks
high
15665Debian DSA-567-1 : tiff - heap overflowsNessusDebian Local Security Checks
high
15629RHEL 2.1 / 3 : libtiff (RHSA-2004:577)NessusRed Hat Local Security Checks
high
15552SUSE-SA:2004:038: libtiffNessusSuSE Local Security Checks
critical
15523Mandrake Linux Security Advisory : libtiff (MDKSA-2004:109)NessusMandriva Local Security Checks
high
15504FreeBSD : tiff -- multiple integer overflows (193)NessusFreeBSD Local Security Checks
medium
15475Fedora Core 2 : libtiff-3.5.7-20.2 (2004-334)NessusFedora Local Security Checks
medium