Heap-based buffer overflow in the OJPEGVSetField function in tif_ojpeg.c for libtiff 3.6.1 and earlier, when compiled with the OJPEG_SUPPORT (old JPEG support) option, allows remote attackers to execute arbitrary code via a malformed TIFF image.
References
Link | Resource |
---|---|
http://www.idefense.com/application/poi/display?id=154&type=vulnerabilities | Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/129910 | US Government Resource |
http://www.novell.com/linux/security/advisories/2004_38_libtiff.html | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17843 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2005-01-26 21:00
Updated : 2017-07-10 18:30
NVD link : CVE-2004-0929
Mitre link : CVE-2004-0929
JSON object : View
CWE
Products Affected
suse
- suse_linux
libtiff
- libtiff