vendor:
LibTIFF
by:
Agustin Gianni and Samelat
7,5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: LibTIFF
Affected Version From: 3.7.1
Affected Version To: 3.7.1
Patch Exists: YES
Related CWE: CVE-2009-2285
CPE: a:libtiff:libtiff
Metasploit:
https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2009-1159/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2009-2285/, https://www.rapid7.com/db/vulnerabilities/apple-safari-cve-2009-2285/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2009-2285/, https://www.rapid7.com/db/vulnerabilities/apple-osx-imageio-cve-2009-2285/, https://www.rapid7.com/db/vulnerabilities/apple-itunes-cve-2009-2285/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2009-2285/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux, Windows
2009
LibTIFF exploit
LibTIFF is vulnerable to a buffer overflow vulnerability due to improper bounds checking of user-supplied input. An attacker can exploit this vulnerability by supplying a specially crafted TIFF file to the vulnerable application, which can lead to arbitrary code execution. This exploit was tested on LibTIFF 3.7.1 and coded by Agustin Gianni and Samelat. It can also be used as a remote exploit.
Mitigation:
The vendor has released a patch to address this vulnerability. Users should upgrade to the latest version of LibTIFF.