Lucene search

K
cve[email protected]CVE-2004-1307
HistoryMay 04, 2005 - 4:00 a.m.

CVE-2004-1307

2005-05-0404:00:00
web.nvd.nist.gov
33
cve-2004-1307
libtiff
integer overflow
remote code execution
buffer overflow
heap-based overflow
tif_dirread.c

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.7 High

AI Score

Confidence

Low

0.048 Low

EPSS

Percentile

92.8%

Integer overflow in the TIFFFetchStripThing function in tif_dirread.c for libtiff 3.6.1 allows remote attackers to execute arbitrary code via a TIFF file with the STRIPOFFSETS flag and a large number of strips, which causes a zero byte buffer to be allocated and leads to a heap-based buffer overflow.

Affected configurations

NVD
Node
avayacall_management_system_serverMatch8.0
OR
avayacall_management_system_serverMatch9.0
OR
avayacall_management_system_serverMatch11.0
OR
avayacall_management_system_serverMatch12.0
OR
avayacall_management_system_serverMatch13.0
OR
avayacvlan
OR
avayaintegrated_management
OR
avayainteractive_response
OR
avayainteractive_responseMatch1.2.1
OR
avayainteractive_responseMatch1.3
OR
avayaintuity_audix_lx
OR
f5icontrol_service_managerMatch1.3
OR
f5icontrol_service_managerMatch1.3.4
OR
f5icontrol_service_managerMatch1.3.5
OR
f5icontrol_service_managerMatch1.3.6
OR
libtifflibtiffMatch3.4
OR
libtifflibtiffMatch3.5.1
OR
libtifflibtiffMatch3.5.2
OR
libtifflibtiffMatch3.5.3
OR
libtifflibtiffMatch3.5.4
OR
libtifflibtiffMatch3.5.5
OR
libtifflibtiffMatch3.5.7
OR
libtifflibtiffMatch3.6.0
OR
libtifflibtiffMatch3.6.1
OR
libtifflibtiffMatch3.7.0
OR
sgipropackMatch3.0
OR
conectivalinuxMatch9.0
OR
conectivalinuxMatch10.0
Node
avayamn100
OR
applemac_os_xMatch10.3
OR
applemac_os_xMatch10.3.1
OR
applemac_os_xMatch10.3.2
OR
applemac_os_xMatch10.3.3
OR
applemac_os_xMatch10.3.4
OR
applemac_os_xMatch10.3.5
OR
applemac_os_xMatch10.3.6
OR
applemac_os_xMatch10.3.7
OR
applemac_os_xMatch10.3.8
OR
applemac_os_xMatch10.3.9
OR
applemac_os_x_serverMatch10.3
OR
applemac_os_x_serverMatch10.3.1
OR
applemac_os_x_serverMatch10.3.2
OR
applemac_os_x_serverMatch10.3.3
OR
applemac_os_x_serverMatch10.3.4
OR
applemac_os_x_serverMatch10.3.5
OR
applemac_os_x_serverMatch10.3.6
OR
applemac_os_x_serverMatch10.3.7
OR
applemac_os_x_serverMatch10.3.8
OR
applemac_os_x_serverMatch10.3.9
OR
avayamodular_messaging_message_storage_serverMatch1.1
OR
avayamodular_messaging_message_storage_serverMatch2.0
OR
gentoolinux
OR
mandrakesoftmandrake_linuxMatch10.0
OR
mandrakesoftmandrake_linuxMatch10.0amd64
OR
mandrakesoftmandrake_linuxMatch10.1
OR
mandrakesoftmandrake_linuxMatch10.1x86_64
OR
mandrakesoftmandrake_linux_corporate_serverMatch3.0
OR
mandrakesoftmandrake_linux_corporate_serverMatch3.0x86_64
OR
scounixwareMatch7.1.4
OR
sunsolarisMatch7.0x86
OR
sunsolarisMatch8.0x86
OR
sunsolarisMatch9.0sparc
OR
sunsolarisMatch9.0x86
OR
sunsolarisMatch9.0x86_update_2
OR
sunsolarisMatch10.0sparc
OR
sunsolarisMatch10.0x86
OR
sunsunosMatch5.7
OR
sunsunosMatch5.8

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.7 High

AI Score

Confidence

Low

0.048 Low

EPSS

Percentile

92.8%