Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2010-2630Improper Input Validation in Tiff

Severity
4.3MEDIUMNVD
EPSS
3.9%
top 11.65%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJul 6
Latest updateMay 17

Description

The TIFFReadDirectory function in LibTIFF 3.9.0 does not properly validate the data types of codec-specific tags that have an out-of-order position in a TIFF file, which allows remote attackers to cause a denial of service (application crash) via a crafted file, a different vulnerability than CVE-2010-2481.

CVSS vector

AV:N/AC:M/C:N/I:N/A:PExploitability: 8.6 | Impact: 2.9

Affected Packages2 packages

NVDlibtiff/libtiff3.9.0
debiandebian/tiff< tiff 3.9.6-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-r4v9-3hv9-pr4f: The TIFFReadDirectory function in LibTIFF 32022-05-17
OSV
CVE-2010-2630: The TIFFReadDirectory function in LibTIFF 32010-07-06

💥Exploits & PoCs

2
Exploit-DB
LibTIFF 3.9.4 - Out-Of-Order Tag Type Mismatch Remote Denial of Service2010-07-12
Exploit-DB
Symantec Remote Management - Remote Buffer Overflow (Metasploit)2010-05-09

📋Vendor Advisories

4
Ubuntu
tiff regression2011-03-15
Ubuntu
tiff vulnerabilities2011-03-07
Red Hat
libtiff: crash on out-of-order codec-specific tags2010-01-11
Debian
CVE-2010-2630: tiff - The TIFFReadDirectory function in LibTIFF 3.9.0 does not properly validate the d...2010

💬Community

2
Bugzilla
CVE-2010-2631 libtiff: unknown tag handling assertion failure2010-07-06
Bugzilla
CVE-2010-2630 libtiff: crash on out-of-order codec-specific tags2010-07-06