Vulnerability Name: | CVE-2010-2597 (CCN-60110) | ||||||||||||||||||||||||||||
Assigned: | 2010-06-12 | ||||||||||||||||||||||||||||
Published: | 2010-06-12 | ||||||||||||||||||||||||||||
Updated: | 2013-05-15 | ||||||||||||||||||||||||||||
Summary: | The TIFFVStripSize function in tif_strip.c in LibTIFF 3.9.0 and 3.9.2 makes incorrect calls to the TIFFGetField function, which allows remote attackers to cause a denial of service (application crash) via a crafted TIFF image, related to "downsampled OJPEG input" and possibly related to a compiler optimization that triggers a divide-by-zero error. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P) 3.5 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:U/RC:UR)
3.5 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:U/RC:UR)
3.5 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:U/RC:UR)
| ||||||||||||||||||||||||||||
Vulnerability Type: | CWE-20 | ||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||
References: | Source: CONFIRM Type: UNKNOWN http://bugzilla.maptools.org/show_bug.cgi?id=2215 Source: MITRE Type: CNA CVE-2010-2597 Source: CCN Type: RHSA-2010-0519 Important: libtiff security update Source: CCN Type: SA40422 LibTIFF Denial of Service Vulnerabilities Source: SECUNIA Type: UNKNOWN 40422 Source: SECUNIA Type: UNKNOWN 40527 Source: SECUNIA Type: UNKNOWN 50726 Source: GENTOO Type: UNKNOWN GLSA-201209-02 Source: DEBIAN Type: UNKNOWN DSA-2552 Source: DEBIAN Type: DSA-2552 tiff -- several vulnerabilities Source: CCN Type: OSVDB ID: 65971 LibTIFF tif_strip.c TIFFVStripSize Function Downsampled OJPEG Input DoS Source: REDHAT Type: UNKNOWN RHSA-2010:0519 Source: CCN Type: LibTIFF Web site LibTIFF - TIFF Library and Utilities Source: VUPEN Type: UNKNOWN ADV-2010-1761 Source: CONFIRM Type: UNKNOWN https://bugs.launchpad.net/bugs/593067 Source: CCN Type: Red Hat Bugzilla Bug 583081 Assorted libtiff failures on downsampled OJPEG input Source: CONFIRM Type: Exploit https://bugzilla.redhat.com/show_bug.cgi?id=583081 Source: CCN Type: Red Hat Bugzilla Bug 603024 libtiff: OJPEGReadBufferFill() NULL pointer deref Source: CONFIRM Type: Patch https://bugzilla.redhat.com/show_bug.cgi?id=603703 Source: XF Type: UNKNOWN libtiff-tiffvstripsize-dos(60110) | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration RedHat 6: Configuration RedHat 7: Configuration RedHat 8: Configuration RedHat 9: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
BACK |