CVE-2012-3401Improper Restriction of Operations within the Bounds of a Memory Buffer in Tiff

Severity
6.8MEDIUMNVD
EPSS
0.9%
top 24.07%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 13
Latest updateMay 17

Description

The t2p_read_tiff_init function in tiff2pdf (tools/tiff2pdf.c) in LibTIFF 4.0.2 and earlier does not properly initialize the T2P context struct pointer in certain error conditions, which allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image that triggers a heap-based buffer overflow.

CVSS vector

AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4

Affected Packages2 packages

NVDlibtiff/libtiff4.0.2+27
debiandebian/tiff< tiff 4.0.2-2 (bookworm)

🔴Vulnerability Details

2
GHSA
GHSA-j3j5-3pcx-xp73: The t2p_read_tiff_init function in tiff2pdf (tools/tiff2pdf2022-05-17
OSV
CVE-2012-3401: The t2p_read_tiff_init function in tiff2pdf (tools/tiff2pdf2012-08-13

📋Vendor Advisories

3
Ubuntu
tiff vulnerability2012-07-19
Red Hat
(tiff2pdf): Heap-based buffer overflow due to improper initialization of T2P context struct pointer2012-07-18
Debian
CVE-2012-3401: tiff - The t2p_read_tiff_init function in tiff2pdf (tools/tiff2pdf.c) in LibTIFF 4.0.2 ...2012

💬Community

3
Bugzilla
CVE-2012-4447 CVE-2012-3401 CVE-2012-5581 CVE-2012-4564 libtiff various flaws [fedora-all]2012-11-28
Bugzilla
CVE-2012-3401 libtiff (tiff2pdf): Heap-based buffer overflow due to improper initialization of T2P context struct pointer [fedora-all]2012-07-20
Bugzilla
CVE-2012-3401 libtiff (tiff2pdf): Heap-based buffer overflow due to improper initialization of T2P context struct pointer2012-07-04