CVE-2009-2285

libtiff 3.8.2 - Denial of Service via LZWDecodeCompat Buffer Underflow

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 2 public exploits for CVE-2009-2285. PoCs published by wololo.

AI-analyzed exploit summary This is a vulnerability writeup for CVE-2009-2285, detailing a buffer-underflow vulnerability in LibTIFF 3.8.2. The document lists affected systems and provides a description of the vulnerability but does not contain exploit code.

Description

Buffer underflow in the LZWDecodeCompat function in libtiff 3.8.2 allows context-dependent attackers to cause a denial of service (crash) via a crafted TIFF image, a different vulnerability than CVE-2008-2327.

Exploits (2)

exploitdb WRITEUP VERIFIED
by wololo · textdosmultiple
https://www.exploit-db.com/exploits/10205

This is a vulnerability writeup for CVE-2009-2285, detailing a buffer-underflow vulnerability in LibTIFF 3.8.2. The document lists affected systems and provides a description of the vulnerability but does not contain exploit code.

Classification
Writeup 100%
Attack Type
Rce
Complexity
Trivial
Reliability
Theoretical
Target: LibTIFF 3.8.2
No auth needed
Prerequisites: User interaction required to open a malicious TIFF file
devstral-2 · analyzed Feb 16, 2026 Full analysis →
exploitdb WRITEUP VERIFIED
by wololo · textdoslinux
https://www.exploit-db.com/exploits/33049

The provided text describes a remote buffer-underflow vulnerability in LibTIFF 3.8.2, which can lead to arbitrary code execution due to inadequate boundary checks. It references a binary exploit but does not contain actual exploit code.

Classification
Writeup 90%
Attack Type
Rce
Complexity
Moderate
Reliability
Theoretical
Target: LibTIFF 3.8.2
No auth needed
Prerequisites: A vulnerable version of LibTIFF · Ability to deliver a maliciously crafted TIFF file to the target
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (41)

Core 41
Core References
Vendor Advisory vendor-advisory x_refsource_sunalert
http://sunsolve.sun.com/search/document.do?assetkey=1-66-267808-1
Vendor Advisory x_refsource_confirm
http://support.apple.com/kb/HT4004
Mailing List vendor-advisory x_refsource_apple
http://lists.apple.com/archives/security-announce/2010/Mar/msg00000.html
Vendor Advisory vendor-advisory x_refsource_fedora
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00161.html
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/35866
Vendor Advisory vendor-advisory x_refsource_fedora
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00655.html
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2009/1637
Mailing List mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2009/06/23/1
Third Party Advisory, VDB Entry vdb-entry signature x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7049
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/39135
Mailing List vendor-advisory x_refsource_apple
http://lists.apple.com/archives/security-announce/2010/Jan/msg00000.html
Vendor Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/797-1/
Third Party Advisory, VDB Entry vdb-entry signature x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10145
Vendor Advisory x_refsource_confirm
http://support.apple.com/kb/HT4105
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/35716
Vendor Advisory vendor-advisory x_refsource_fedora
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00714.html
Exploit mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2009/06/22/1
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/35912
Vendor Advisory x_refsource_confirm
http://support.apple.com/kb/HT4070
Mailing List vendor-advisory x_refsource_apple
http://lists.apple.com/archives/security-announce/2010/Feb/msg00000.html
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/35883
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2009/2727
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/35695
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/36194
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/36831
Third Party Advisory vendor-advisory x_refsource_gentoo
http://security.gentoo.org/glsa/glsa-200908-03.xml
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2009/3184
Vendor Advisory x_refsource_confirm
http://support.apple.com/kb/HT4013
Vendor Advisory vendor-advisory x_refsource_fedora
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00142.html
Mailing List vendor-advisory x_refsource_apple
http://lists.apple.com/archives/security-announce/2010//Mar/msg00003.html
Vendor Advisory vendor-advisory x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2009-1159.html
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/38241
Mailing List vendor-advisory x_refsource_apple
http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
Vendor Advisory vendor-advisory x_refsource_fedora
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00230.html
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2009/dsa-1835
Exploit mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2009/06/29/5
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2010/0173
Vendor Advisory x_refsource_confirm
http://support.apple.com/kb/HT3937

Scores

EPSS 0.1678
EPSS Percentile 95.0%

Details

CWE
CWE-119
Status published
Products (1)
libtiff/libtiff 3.8.2
Published Jul 01, 2009
Tracked Since Feb 18, 2026