CVE-2004-0886

Current Description

Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls.

Basic Data

PublishedJanuary 27, 2005
Last ModifiedOctober 11, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score5.0
SeverityMEDIUM
Exploitability Score10.0
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationLibtiffLibtiff3.4*******
    2.3ApplicationLibtiffLibtiff3.5.1*******
    2.3ApplicationLibtiffLibtiff3.5.2*******
    2.3ApplicationLibtiffLibtiff3.5.3*******
    2.3ApplicationLibtiffLibtiff3.5.4*******
    2.3ApplicationLibtiffLibtiff3.5.5*******
    2.3ApplicationLibtiffLibtiff3.5.7*******
    2.3ApplicationLibtiffLibtiff3.6.0*******
    2.3ApplicationLibtiffLibtiff3.6.1*******
    2.3ApplicationPdflibPdf Library5.0.2*******
    2.3ApplicationWxgtk2Wxgtk2********
    2.3ApplicationWxgtk2Wxgtk22.5_.0*******
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSAppleMac Os X10.2*******
    2.3OSAppleMac Os X10.2.1*******
    2.3OSAppleMac Os X10.2.2*******
    2.3OSAppleMac Os X10.2.3*******
    2.3OSAppleMac Os X10.2.4*******
    2.3OSAppleMac Os X10.2.5*******
    2.3OSAppleMac Os X10.2.6*******
    2.3OSAppleMac Os X10.2.7*******
    2.3OSAppleMac Os X10.2.8*******
    2.3OSAppleMac Os X10.3*******
    2.3OSAppleMac Os X10.3.1*******
    2.3OSAppleMac Os X10.3.2*******
    2.3OSAppleMac Os X10.3.3*******
    2.3OSAppleMac Os X10.3.4*******
    2.3OSAppleMac Os X10.3.5*******
    2.3OSAppleMac Os X10.3.6*******
    2.3OSAppleMac Os X Server10.2*******
    2.3OSAppleMac Os X Server10.2.1*******
    2.3OSAppleMac Os X Server10.2.2*******
    2.3OSAppleMac Os X Server10.2.3*******
    2.3OSAppleMac Os X Server10.2.4*******
    2.3OSAppleMac Os X Server10.2.5*******
    2.3OSAppleMac Os X Server10.2.6*******
    2.3OSAppleMac Os X Server10.2.7*******
    2.3OSAppleMac Os X Server10.2.8*******
    2.3OSAppleMac Os X Server10.3*******
    2.3OSAppleMac Os X Server10.3.1*******
    2.3OSAppleMac Os X Server10.3.2*******
    2.3OSAppleMac Os X Server10.3.3*******
    2.3OSAppleMac Os X Server10.3.4*******
    2.3OSAppleMac Os X Server10.3.5*******
    2.3OSAppleMac Os X Server10.3.6*******
    2.3OSKdeKde3.2*******
    2.3OSKdeKde3.2.1*******
    2.3OSKdeKde3.2.2*******
    2.3OSKdeKde3.2.3*******
    2.3OSKdeKde3.3*******
    2.3OSKdeKde3.3.1*******
    2.3OSMandrakesoftMandrake Linux10.0*******
    2.3OSMandrakesoftMandrake Linux10.0*amd64*****
    2.3OSRedhatEnterprise Linux2.1*advanced_server*****
    2.3OSRedhatEnterprise Linux2.1*advanced_server_ia64*****
    2.3OSRedhatEnterprise Linux2.1*enterprise_server*****
    2.3OSRedhatEnterprise Linux2.1*enterprise_server_ia64*****
    2.3OSRedhatEnterprise Linux2.1*workstation*****
    2.3OSRedhatEnterprise Linux2.1*workstation_ia64*****
    2.3OSRedhatEnterprise Linux3.0*advanced_server*****
    2.3OSRedhatEnterprise Linux3.0*enterprise_server*****
    2.3OSRedhatEnterprise Linux3.0*workstation_server*****
    2.3OSRedhatEnterprise Linux Desktop3.0*******
    2.3OSRedhatFedora Corecore_2.0*******
    2.3OSRedhatLinux Advanced Workstation2.1*ia64*****
    2.3OSRedhatLinux Advanced Workstation2.1*itanium_processor*****
    2.3OSSuseSuse Linux1.0*desktop*****
    2.3OSSuseSuse Linux8*enterprise_server*****
    2.3OSSuseSuse Linux8.1*******
    2.3OSSuseSuse Linux8.2*******
    2.3OSSuseSuse Linux9.0*******
    2.3OSSuseSuse Linux9.0*enterprise_server*****
    2.3OSSuseSuse Linux9.1*******
    2.3OSTrustixSecure Linux1.5*******
    2.3OSTrustixSecure Linux2.0*******
    2.3OSTrustixSecure Linux2.1*******

Vulnerable Software List

VendorProductVersions
Apple Mac Os X Server 10.2, 10.2.1, 10.2.2, 10.2.3, 10.2.4, 10.2.5, 10.2.6, 10.2.7, 10.2.8, 10.3, 10.3.1, 10.3.2, 10.3.3, 10.3.4, 10.3.5, 10.3.6
Apple Mac Os X 10.2, 10.2.1, 10.2.2, 10.2.3, 10.2.4, 10.2.5, 10.2.6, 10.2.7, 10.2.8, 10.3, 10.3.1, 10.3.2, 10.3.3, 10.3.4, 10.3.5, 10.3.6
Redhat Enterprise Linux 2.1, 3.0
Redhat Enterprise Linux Desktop 3.0
Redhat Fedora Core core_2.0
Redhat Linux Advanced Workstation 2.1
Libtiff Libtiff 3.4, 3.5.1, 3.5.2, 3.5.3, 3.5.4, 3.5.5, 3.5.7, 3.6.0, 3.6.1
Mandrakesoft Mandrake Linux 10.0
Pdflib Pdf Library 5.0.2
Wxgtk2 Wxgtk2 *, 2.5_.0
Kde Kde 3.2, 3.2.1, 3.2.2, 3.2.3, 3.3, 3.3.1
Trustix Secure Linux 1.5, 2.0, 2.1
Suse Suse Linux 1.0, 8, 8.1, 8.2, 9.0, 9.1

References

NameSourceURLTags
CLA-2004:888http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000888CONECTIVA
OpenPKG-SA-2004.043http://marc.info/?l=bugtraq&m=109779465621929&w=2OPENPKG
12818http://secunia.com/advisories/12818SECUNIA
1011674http://securitytracker.com/id?1011674SECTRACK
101677http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1SUNALERT
201072http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1SUNALERT
P-015http://www.ciac.org/ciac/bulletins/p-015.shtmlCIAC
DSA-567http://www.debian.org/security/2004/dsa-567DEBIAN
VU#687568http://www.kb.cert.org/vuls/id/687568CERT-VNUS Government Resource
http://www.kde.org/info/security/advisory-20041209-2.txthttp://www.kde.org/info/security/advisory-20041209-2.txtCONFIRM
MDKSA-2004:109http://www.mandriva.com/security/advisories?name=MDKSA-2004:109MANDRAKE
MDKSA-2005:052http://www.mandriva.com/security/advisories?name=MDKSA-2005:052MANDRAKE
SUSE-SA:2004:038http://www.novell.com/linux/security/advisories/2004_38_libtiff.htmlSUSE
RHSA-2004:577http://www.redhat.com/support/errata/RHSA-2004-577.htmlREDHATPatch Vendor Advisory
RHSA-2005:021http://www.redhat.com/support/errata/RHSA-2005-021.htmlREDHAT
RHSA-2005:354http://www.redhat.com/support/errata/RHSA-2005-354.htmlREDHAT
11406http://www.securityfocus.com/bid/11406BIDExploit Patch Vendor Advisory
2004-0054http://www.trustix.org/errata/2004/0054/TRUSTIX
libtiff-bo(17715)https://exchange.xforce.ibmcloud.com/vulnerabilities/17715XF
oval:org.mitre.oval:def:100116https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100116OVAL
oval:org.mitre.oval:def:9907https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9907OVAL