CVE-2012-5581
Published: 28 November 2012
Stack-based buffer overflow in tif_dir.c in LibTIFF before 4.0.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DOTRANGE tag in a TIFF image.
Priority
Status
Package | Release | Status |
---|---|---|
tiff Launchpad, Ubuntu, Debian |
hardy |
Released
(3.8.2-7ubuntu3.16)
|
lucid |
Released
(3.9.2-2ubuntu0.12)
|
|
oneiric |
Released
(3.9.5-1ubuntu1.5)
|
|
precise |
Released
(3.9.5-2ubuntu1.4)
|
|
quantal |
Not vulnerable
(4.0.2-1ubuntu2.1)
|
|
raring |
Not vulnerable
(4.0.2-4ubuntu2)
|
|
saucy |
Not vulnerable
(4.0.2-4ubuntu2)
|
|
trusty |
Not vulnerable
(4.0.2-4ubuntu2)
|
|
upstream |
Released
(4.0.2)
|
|
Patches: vendor: https://bugzilla.redhat.com/attachment.cgi?id=640578 |
||
tiff3 Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Does not exist
|
|
oneiric |
Does not exist
|
|
precise |
Does not exist
|
|
quantal |
Ignored
(end of life)
|
|
raring |
Ignored
(end of life)
|
|
saucy |
Ignored
(end of life)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.0.2-1)
|