4.3

CVE-2013-4231

Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c.  NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size.

Data is provided by the National Vulnerability Database (NVD)
LibtiffLibtiff Version <= 4.0.2
LibtiffLibtiff Version4.0
LibtiffLibtiff Version4.0 Updatealpha
LibtiffLibtiff Version4.0 Updatebeta1
LibtiffLibtiff Version4.0 Updatebeta2
LibtiffLibtiff Version4.0 Updatebeta3
LibtiffLibtiff Version4.0 Updatebeta4
LibtiffLibtiff Version4.0 Updatebeta5
LibtiffLibtiff Version4.0 Updatebeta6
LibtiffLibtiff Version4.0.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 21.41% 0.952
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:N/A:P
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.