Description
LibTIFF 3.9.4 and earlier does not properly handle an invalid td_stripbytecount field, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted TIFF file, a different vulnerability than CVE-2010-2443.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Tomas Hoger · textdoslinux
https://www.exploit-db.com/exploits/14573
References (12)
Core 12
Core References
Issue Tracking x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=608010
Mailing List mailing-list
x_refsource_mlist
http://marc.info/?l=oss-security&m=127736307002102&w=2
Issue Tracking x_refsource_confirm
https://bugs.launchpad.net/bugs/597246
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2012/dsa-2552
Third Party Advisory vendor-advisory
x_refsource_gentoo
http://security.gentoo.org/glsa/glsa-201209-02.xml
Exploit x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=603024
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/40422
Issue Tracking x_refsource_confirm
http://bugzilla.maptools.org/show_bug.cgi?id=1996
Mailing List mailing-list
x_refsource_mlist
http://marc.info/?l=oss-security&m=127738540902757&w=2
Mailing List mailing-list
x_refsource_mlist
http://marc.info/?l=oss-security&m=127797353202873&w=2
Mailing List mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2010/06/30/22
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/50726
Scores
EPSS
0.1883
EPSS Percentile
95.4%
Details
Status
published
Products (23)
libtiff/libtiff
3.4 (11 CPE variants)
libtiff/libtiff
3.5.1
libtiff/libtiff
3.5.2
libtiff/libtiff
3.5.3
libtiff/libtiff
3.5.4
libtiff/libtiff
3.5.5
libtiff/libtiff
3.5.6 (2 CPE variants)
libtiff/libtiff
3.5.7 (6 CPE variants)
libtiff/libtiff
3.6.0 (3 CPE variants)
libtiff/libtiff
3.6.1
... and 13 more
Published
Jul 06, 2010
Tracked Since
Feb 18, 2026