CVE-2004-1307 (CNNVD-200412-081)
HIGH
中文标题:
LibTIFF Heap Corruption整数溢出漏洞
英文标题:
Integer overflow in the TIFFFetchStripThing function in tif_dirread.c for libtiff 3.6.1 allows remot...
CVSS分数:
7.5
发布时间:
2005-05-04 04:00:00
漏洞类型:
授权问题
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v3
漏洞描述
中文描述:
libtiff 3.6.1版本中tif_dirread.c的TIFFFetchStripThing函数存在整数溢出漏洞。远程攻击者借助一个带有STRIPOFFSETS标志和大量strips的TIFF文件执行任意代码,引发分配零字节缓冲区,并导致基于堆的缓冲区溢出。
英文描述:
Integer overflow in the TIFFFetchStripThing function in tif_dirread.c for libtiff 3.6.1 allows remote attackers to execute arbitrary code via a TIFF file with the STRIPOFFSETS flag and a large number of strips, which causes a zero byte buffer to be allocated and leads to a heap-based buffer overflow.
CWE类型:
(暂无数据)
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| avaya | call_management_system_server | 8.0 | - | - |
cpe:2.3:a:avaya:call_management_system_server:8.0:*:*:*:*:*:*:*
|
| avaya | call_management_system_server | 9.0 | - | - |
cpe:2.3:a:avaya:call_management_system_server:9.0:*:*:*:*:*:*:*
|
| avaya | call_management_system_server | 11.0 | - | - |
cpe:2.3:a:avaya:call_management_system_server:11.0:*:*:*:*:*:*:*
|
| avaya | call_management_system_server | 12.0 | - | - |
cpe:2.3:a:avaya:call_management_system_server:12.0:*:*:*:*:*:*:*
|
| avaya | call_management_system_server | 13.0 | - | - |
cpe:2.3:a:avaya:call_management_system_server:13.0:*:*:*:*:*:*:*
|
| avaya | cvlan | * | - | - |
cpe:2.3:a:avaya:cvlan:*:*:*:*:*:*:*:*
|
| avaya | integrated_management | * | - | - |
cpe:2.3:a:avaya:integrated_management:*:*:*:*:*:*:*:*
|
| avaya | interactive_response | * | - | - |
cpe:2.3:a:avaya:interactive_response:*:*:*:*:*:*:*:*
|
| avaya | interactive_response | 1.2.1 | - | - |
cpe:2.3:a:avaya:interactive_response:1.2.1:*:*:*:*:*:*:*
|
| avaya | interactive_response | 1.3 | - | - |
cpe:2.3:a:avaya:interactive_response:1.3:*:*:*:*:*:*:*
|
| avaya | intuity_audix_lx | * | - | - |
cpe:2.3:a:avaya:intuity_audix_lx:*:*:*:*:*:*:*:*
|
| f5 | icontrol_service_manager | 1.3 | - | - |
cpe:2.3:a:f5:icontrol_service_manager:1.3:*:*:*:*:*:*:*
|
| f5 | icontrol_service_manager | 1.3.4 | - | - |
cpe:2.3:a:f5:icontrol_service_manager:1.3.4:*:*:*:*:*:*:*
|
| f5 | icontrol_service_manager | 1.3.5 | - | - |
cpe:2.3:a:f5:icontrol_service_manager:1.3.5:*:*:*:*:*:*:*
|
| f5 | icontrol_service_manager | 1.3.6 | - | - |
cpe:2.3:a:f5:icontrol_service_manager:1.3.6:*:*:*:*:*:*:*
|
| libtiff | libtiff | 3.4 | - | - |
cpe:2.3:a:libtiff:libtiff:3.4:*:*:*:*:*:*:*
|
| libtiff | libtiff | 3.5.1 | - | - |
cpe:2.3:a:libtiff:libtiff:3.5.1:*:*:*:*:*:*:*
|
| libtiff | libtiff | 3.5.2 | - | - |
cpe:2.3:a:libtiff:libtiff:3.5.2:*:*:*:*:*:*:*
|
| libtiff | libtiff | 3.5.3 | - | - |
cpe:2.3:a:libtiff:libtiff:3.5.3:*:*:*:*:*:*:*
|
| libtiff | libtiff | 3.5.4 | - | - |
cpe:2.3:a:libtiff:libtiff:3.5.4:*:*:*:*:*:*:*
|
| libtiff | libtiff | 3.5.5 | - | - |
cpe:2.3:a:libtiff:libtiff:3.5.5:*:*:*:*:*:*:*
|
| libtiff | libtiff | 3.5.7 | - | - |
cpe:2.3:a:libtiff:libtiff:3.5.7:*:*:*:*:*:*:*
|
| libtiff | libtiff | 3.6.0 | - | - |
cpe:2.3:a:libtiff:libtiff:3.6.0:*:*:*:*:*:*:*
|
| libtiff | libtiff | 3.6.1 | - | - |
cpe:2.3:a:libtiff:libtiff:3.6.1:*:*:*:*:*:*:*
|
| libtiff | libtiff | 3.7.0 | - | - |
cpe:2.3:a:libtiff:libtiff:3.7.0:*:*:*:*:*:*:*
|
| sgi | propack | 3.0 | - | - |
cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*
|
| conectiva | linux | 9.0 | - | - |
cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*
|
| conectiva | linux | 10.0 | - | - |
cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
|
| avaya | mn100 | * | - | - |
cpe:2.3:a:avaya:mn100:*:*:*:*:*:*:*:*
|
| apple | mac_os_x | 10.3 | - | - |
cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*
|
| apple | mac_os_x | 10.3.1 | - | - |
cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*
|
| apple | mac_os_x | 10.3.2 | - | - |
cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*
|
| apple | mac_os_x | 10.3.3 | - | - |
cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*
|
| apple | mac_os_x | 10.3.4 | - | - |
cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*
|
| apple | mac_os_x | 10.3.5 | - | - |
cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*
|
| apple | mac_os_x | 10.3.6 | - | - |
cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*
|
| apple | mac_os_x | 10.3.7 | - | - |
cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*
|
| apple | mac_os_x | 10.3.8 | - | - |
cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*
|
| apple | mac_os_x | 10.3.9 | - | - |
cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*
|
| apple | mac_os_x_server | 10.3 | - | - |
cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*
|
| apple | mac_os_x_server | 10.3.1 | - | - |
cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*
|
| apple | mac_os_x_server | 10.3.2 | - | - |
cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*
|
| apple | mac_os_x_server | 10.3.3 | - | - |
cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*
|
| apple | mac_os_x_server | 10.3.4 | - | - |
cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*
|
| apple | mac_os_x_server | 10.3.5 | - | - |
cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*
|
| apple | mac_os_x_server | 10.3.6 | - | - |
cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*
|
| apple | mac_os_x_server | 10.3.7 | - | - |
cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:*
|
| apple | mac_os_x_server | 10.3.8 | - | - |
cpe:2.3:o:apple:mac_os_x_server:10.3.8:*:*:*:*:*:*:*
|
| apple | mac_os_x_server | 10.3.9 | - | - |
cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*
|
| avaya | modular_messaging_message_storage_server | 1.1 | - | - |
cpe:2.3:o:avaya:modular_messaging_message_storage_server:1.1:*:*:*:*:*:*:*
|
| avaya | modular_messaging_message_storage_server | 2.0 | - | - |
cpe:2.3:o:avaya:modular_messaging_message_storage_server:2.0:*:*:*:*:*:*:*
|
| gentoo | linux | * | - | - |
cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
|
| mandrakesoft | mandrake_linux | 10.0 | - | - |
cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
|
| mandrakesoft | mandrake_linux | 10.1 | - | - |
cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
|
| mandrakesoft | mandrake_linux_corporate_server | 3.0 | - | - |
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
|
| sco | unixware | 7.1.4 | - | - |
cpe:2.3:o:sco:unixware:7.1.4:*:*:*:*:*:*:*
|
| sun | solaris | 7.0 | - | - |
cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*
|
| sun | solaris | 8.0 | - | - |
cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*
|
| sun | solaris | 9.0 | - | - |
cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*
|
| sun | solaris | 10.0 | - | - |
cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*
|
| sun | sunos | 5.7 | - | - |
cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*
|
| sun | sunos | 5.8 | - | - |
cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
TA05-136A
third-party-advisory
cve.org
访问
cve.org
VU#539110
third-party-advisory
cve.org
访问
cve.org
201072
vendor-advisory
cve.org
访问
cve.org
101677
vendor-advisory
cve.org
访问
cve.org
20041221 libtiff STRIPOFFSETS Integer Overflow Vulnerability
third-party-advisory
cve.org
访问
cve.org
APPLE-SA-2005-05-03
vendor-advisory
cve.org
访问
cve.org
oval:org.mitre.oval:def:11175
vdb-entry
cve.org
访问
cve.org
CVSS评分详情
7.5
HIGH
CVSS向量:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS版本:
2.0
机密性
PARTIAL
完整性
PARTIAL
可用性
PARTIAL
时间信息
发布时间:
2005-05-04 04:00:00
修改时间:
2024-08-08 00:46:12
创建时间:
2025-11-11 15:32:22
更新时间:
2025-11-11 15:48:54
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2004-1307 |
2025-11-11 15:17:30 | 2025-11-11 07:32:22 |
| NVD | nvd_CVE-2004-1307 |
2025-11-11 14:50:55 | 2025-11-11 07:41:08 |
| CNNVD | cnnvd_CNNVD-200412-081 |
2025-11-11 15:08:45 | 2025-11-11 07:48:54 |
版本与语言
当前版本:
v3
主要语言:
EN
支持语言:
EN
ZH
安全公告
暂无安全公告信息
变更历史
v3
CNNVD
2025-11-11 15:48:54
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-200412-081; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-200412-081
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:41:08
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.5; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:P/I:P/A:P; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 62; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
- cvss_score: 未提取 -> 7.5
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:P/I:P/A:P
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 62
- data_sources: ['cve'] -> ['cve', 'nvd']