CVE-2012-4447
Published: 28 October 2012
Heap-based buffer overflow in tif_pixarlog.c in LibTIFF before 4.0.3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted TIFF image using the PixarLog Compression format.
Notes
Author | Note |
---|---|
mdeslaur | as of 2012-10-05, patch may be incomplete. See oss-security discussion. incomplete fix in 4.0.2 |
Priority
Status
Package | Release | Status |
---|---|---|
tiff Launchpad, Ubuntu, Debian |
hardy |
Released
(3.8.2-7ubuntu3.14)
|
lucid |
Released
(3.9.2-2ubuntu0.11)
|
|
natty |
Ignored
(end of life)
|
|
oneiric |
Released
(3.9.5-1ubuntu1.4)
|
|
precise |
Released
(3.9.5-2ubuntu1.3)
|
|
quantal |
Released
(4.0.2-1ubuntu2.1)
|
|
raring |
Not vulnerable
(4.0.2-4ubuntu1)
|
|
saucy |
Not vulnerable
(4.0.2-4ubuntu1)
|
|
trusty |
Not vulnerable
(4.0.2-4ubuntu1)
|
|
upstream |
Released
(4.0.2-4)
|
|
Patches: other: https://bugzilla.redhat.com/attachment.cgi?id=616925&action=diff&context=patch&collapsed=&headers=1&format=raw |
||
tiff3 Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Does not exist
|
|
natty |
Does not exist
|
|
oneiric |
Does not exist
|
|
precise |
Does not exist
|
|
quantal |
Ignored
(end of life)
|
|
raring |
Ignored
(end of life)
|
|
saucy |
Ignored
(end of life)
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
Patches: other: https://bugzilla.redhat.com/attachment.cgi?id=616925&action=diff&context=patch&collapsed=&headers=1&format=raw vendor: http://www.debian.org/security/2012/dsa-2561 |