Multiple vulnerabilities in libtiff before 3.8.1 allow context-dependent attackers to cause a denial of service via a TIFF image that triggers errors in (1) the TIFFFetchAnyArray function in (a) tif_dirread.c; (2) certain "codec cleanup methods" in (b) tif_lzw.c, (c) tif_pixarlog.c, and (d) tif_zip.c; (3) and improper restoration of setfield and getfield methods in cleanup functions within (e) tif_jpeg.c, tif_pixarlog.c, (f) tif_fax3.c, and tif_zip.c.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1054-1 | New TIFF packages fix denial of service and arbitrary code execution |
Ubuntu USN |
USN-277-1 | TIFF library vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T17:35:31.058Z
Reserved: 2006-04-25T00:00:00
Link: CVE-2006-2024
No data.
Status : Deferred
Published: 2006-04-25T23:02:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2006-2024
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN