search menu icon-carat-right cmu-wordmark

CERT Coordination Center

LibTIFF contains multiple integer overflows

Vulnerability Note VU#687568

Original Release Date: 2004-12-01 | Last Revised: 2005-01-25

Overview

Multiple integer overflows in the LibTIFF library may allow an attacker to execute arbitrary code.

Description

LibTIFF is a library used to encode and decode images in Tag Image File Format (TIFF) format. A number of potential integer overflow errors exist in the LibTIFF library. A lack of input validation on user-controlled data may allow a remote attacker to manipulate calls to the malloc() routine.

One instance of these vulnerabilities is in the TIFFFetchStripThing()routine within the tif_dirread.c file. A lack of validation on data specifying the size of an TIFF image may allow a remote attacker to manipulte malloc()to create a buffer with insufficient size. When data is copied to this under-sized buffer, a heap-based buffer overflow may occur. In order to exploit this specific attack vector, an attacker must craft a TIFF image with the STRIPOFFSETS flag set.

Please note that other routines may be vulnerable. In addition, any application that uses the LibTIFF library may be affected by this issue. Users are encouraged to contact their vendors to determine if they are vulnerable.

Impact

Depending on the application being used and the attack vector being exploited, potential consequences range from a denial-of-service condition to the execution of arbitrary code with the privileges of the LibTIFF process.

Solution

Apply Patch


Patch or upgrade as specified by your vendor. Users who suspect they are vulnerable are encouraged to check with their vendor to determine the appropriate action to take.

Vendor Information

687568
 

View all 36 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported in Secunia Security Advisory SA12818.Secunia credits Matthias Clasen for providing information regarding this vulnerability.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2004-0886
Severity Metric: 10.33
Date Public: 2004-10-14
Date First Published: 2004-12-01
Date Last Updated: 2005-01-25 18:11 UTC
Document Revision: 131

Sponsored by CISA.