U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Results Type: Overview
  • Keyword (text search): cpe:2.3:a:libtiff:libtiff:3.8.1:*:*:*:*:*:*:*
  • CPE Name Search: true
There are 85 matching records.
Displaying matches 81 through 85.
Vuln ID Summary CVSS Severity
CVE-2006-3464

TIFF library (libtiff) before 3.8.2 allows context-dependent attackers to pass numeric range checks and possibly execute code, and trigger assert errors, via large offset values in a TIFF directory that lead to an integer overflow and other unspecified vectors involving "unchecked arithmetic operations".

Published: August 02, 2006; 9:04:00 PM -0400
V3.x:(not available)
V2.0: 7.5 HIGH
CVE-2006-3465

Unspecified vulnerability in the custom tag support for the TIFF library (libtiff) before 3.8.2 allows remote attackers to cause a denial of service (instability or crash) and execute arbitrary code via unknown vectors.

Published: August 02, 2006; 9:04:00 PM -0400
V3.x:(not available)
V2.0: 7.5 HIGH
CVE-2006-2193

Buffer overflow in the t2p_write_pdf_string function in tiff2pdf in libtiff 3.8.2 and earlier allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a TIFF file with a DocumentName tag that contains UTF-8 characters, which triggers the overflow when a character is sign extended to an integer that produces more digits than expected in an sprintf call.

Published: June 08, 2006; 3:06:00 PM -0400
V3.x:(not available)
V2.0: 7.5 HIGH
CVE-2006-2656

Stack-based buffer overflow in the tiffsplit command in libtiff 3.8.2 and earlier might might allow attackers to execute arbitrary code via a long filename. NOTE: tiffsplit is not setuid. If there is not a common scenario under which tiffsplit is called with attacker-controlled command line arguments, then perhaps this issue should not be included in CVE.

Published: May 30, 2006; 2:02:00 PM -0400
V3.x:(not available)
V2.0: 7.5 HIGH
CVE-2006-2120

The TIFFToRGB function in libtiff before 3.8.1 allows remote attackers to cause a denial of service (crash) via a crafted TIFF image with Yr/Yg/Yb values that exceed the YCR/YCG/YCB values, which triggers an out-of-bounds read.

Published: May 01, 2006; 6:06:00 PM -0400
V3.x:(not available)
V2.0: 2.1 LOW