Vulnerabilities > CVE-2006-0405 - Denial of Service vulnerability in Libtiff 3.8.0
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
PARTIAL Summary
The TIFFFetchShortPair function in tif_dirread.c in libtiff 3.8.0 allows remote attackers to cause a denial of service (application crash) via a crafted TIFF image that triggers a NULL pointer dereference, possibly due to changes in type declarations and/or the TIFFVSetField function. Per: http://cwe.mitre.org/data/definitions/476.html 'CWE-476: NULL Pointer Dereference'
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-200605-17.NASL |
description | The remote host is affected by the vulnerability described in GLSA-200605-17 (libTIFF: Multiple vulnerabilities) Multiple vulnerabilities, ranging from integer overflows and NULL pointer dereferences to double frees, were reported in libTIFF. Impact : An attacker could exploit these vulnerabilities by enticing a user to open a specially crafted TIFF image, possibly leading to the execution of arbitrary code or a Denial of Service. Workaround : There is no known workaround at this time. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 21615 |
published | 2006-05-31 |
reporter | This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/21615 |
title | GLSA-200605-17 : libTIFF: Multiple vulnerabilities |
code |
|
Statements
contributor | Mark J Cox |
lastmodified | 2006-08-30 |
organization | Red Hat |
statement | This issue did not affect the versions of libtiff as distributed with Red Hat Enterprise Linux 2.1, 3, or 4. |
References
- http://bugzilla.remotesensing.org/show_bug.cgi?id=1029
- http://bugzilla.remotesensing.org/show_bug.cgi?id=1034
- http://secunia.com/advisories/18587
- http://secunia.com/advisories/20345
- http://www.gentoo.org/security/en/glsa/glsa-200605-17.xml
- http://www.securityfocus.com/bid/18172
- http://www.vupen.com/english/advisories/2006/0302
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24275