| Vulnerability Name: | CVE-2010-2598 (CCN-60019) | ||||||||||||||||
| Assigned: | 2010-06-10 | ||||||||||||||||
| Published: | 2010-06-10 | ||||||||||||||||
| Updated: | 2016-11-08 | ||||||||||||||||
| Summary: | LibTIFF in Red Hat Enterprise Linux (RHEL) 3 on x86_64 platforms, as used in tiff2rgba, attempts to process image data even when the required compression functionality is not configured, which allows remote attackers to cause a denial of service via a crafted TIFF image, related to "downsampled OJPEG input." | ||||||||||||||||
| CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||||||||||
| CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P) 3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
3.2 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||
| Vulnerability Type: | CWE-20 | ||||||||||||||||
| Vulnerability Consequences: | Denial of Service | ||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2010-2598 Source: CCN Type: RHSA-2010-0520 Important: libtiff security update Source: CCN Type: SA40422 LibTIFF Denial of Service Vulnerabilities Source: SECUNIA Type: Permissions Required, Third Party Advisory 40536 Source: CCN Type: OSVDB ID: 65972 LibTIFF on RHEL Unconfigured Compression Functionality Downsampled OJPEG Input DoS Source: REDHAT Type: Not Applicable RHSA-2010:0520 Source: CCN Type: LibTIFF Web site LibTIFF - TIFF Library and Utilities Source: CCN Type: BID-41295 LibTIFF Multiple Remote Denial of Service Vulnerabilities Source: VUPEN Type: Broken Link ADV-2010-1761 Source: CCN Type: Red Hat Bugzilla Bug 583081 Assorted libtiff failures on downsampled OJPEG input Source: CONFIRM Type: Exploit https://bugzilla.redhat.com/show_bug.cgi?id=583081 Source: XF Type: UNKNOWN libtiff-rhel-downsampled-dos(60019) | ||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||
| Oval Definitions | |||||||||||||||||
| |||||||||||||||||
| BACK | |||||||||||||||||