header-logo
Suggest Exploit
vendor:
LibTIFF
by:
SecurityFocus
7.5
CVSS
HIGH
Buffer-Underflow
122
CWE
Product Name: LibTIFF
Affected Version From: 3.8.2002
Affected Version To: 3.8.2002
Patch Exists: Yes
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

LibTIFF Remote Buffer-Underflow Vulnerability

LibTIFF is prone to a remote buffer-underflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. An attacker can exploit this issue to execute arbitrary malicious code in the context of a user running an application that uses the affected library. Failed exploit attempts will likely crash the application.

Mitigation:

Users should apply the patch from the vendor as soon as possible.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/35451/info

LibTIFF is prone to a remote buffer-underflow vulnerability because it fails to perform adequate boundary checks on user-supplied data.

An attacker can exploit this issue to execute arbitrary malicious code in the context of a user running an application that uses the affected library. Failed exploit attempts will likely crash the application.

LibTIFF 3.8.2 is vulnerable; other versions may be affected as well. 

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33049.zip