Vulnerability Name: | CVE-2009-5022 (CCN-66774) | ||||||||||||||||||||||||||||
Assigned: | 2009-02-09 | ||||||||||||||||||||||||||||
Published: | 2009-02-09 | ||||||||||||||||||||||||||||
Updated: | 2023-02-13 | ||||||||||||||||||||||||||||
Summary: | Heap-based buffer overflow in tif_ojpeg.c in the OJPEG decoder in LibTIFF before 3.9.5 allows remote attackers to execute arbitrary code via a crafted TIFF file. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
5.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||
References: | Source: CCN Type: Maptools Bug 1999 OJPEG Crash, Pointer Overwritten during decode Source: secalert@redhat.com Type: Exploit secalert@redhat.com Source: MITRE Type: CNA CVE-2009-5022 Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: Exploit secalert@redhat.com Source: CCN Type: RHSA-2011-0452 Important: libtiff security update Source: CCN Type: SA43593 LibTIFF EXPAND2D() Buffer Overflow Vulnerability Source: CCN Type: SA49856 IrfanView TIFF Image Decompression Buffer Overflow Vulnerability Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: DEBIAN Type: DSA-2256 tiff -- buffer overflow Source: CCN Type: IrfanView Web site IrfanView Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: OSVDB ID: 72260 LibTIFF OJPEG Decoder tif_ojpeg.c Crafted TIFF File Handling Overflow Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: LibTIFF Web site LibTIFF - TIFF Library and Utilities Source: CCN Type: libtiff TIFF CHANGE INFORMATION Source: secalert@redhat.com Type: Patch secalert@redhat.com Source: CCN Type: BID-47338 LibTIFF Multiple Buffer Overflow Vulnerabilities Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: Exploit secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: XF Type: UNKNOWN libtiff-ojpeg-bo(66774) Source: SUSE Type: SUSE-SR:2011:008 SUSE Security Summary Report | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
BACK |