Heap-based buffer overflow in the OJPEGVSetField function in tif_ojpeg.c for libtiff 3.6.1 and earlier, when compiled with the OJPEG_SUPPORT (old JPEG support) option, allows remote attackers to execute arbitrary code via a malformed TIFF image.
References
Link | Resource |
---|---|
http://www.idefense.com/application/poi/display?id=154&type=vulnerabilities | Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/129910 | US Government Resource |
http://www.novell.com/linux/security/advisories/2004_38_libtiff.html | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17843 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2005-01-27 05:00
Updated : 2017-07-11 01:30
NVD link : CVE-2004-0929
Mitre link : CVE-2004-0929
CVE.ORG link : CVE-2004-0929
JSON object : View
Products Affected
libtiff
- libtiff
suse
- suse_linux
CWE