CVE-2004-1307 (CNNVD-200412-081)

HIGH
中文标题:
LibTIFF Heap Corruption整数溢出漏洞
英文标题:
Integer overflow in the TIFFFetchStripThing function in tif_dirread.c for libtiff 3.6.1 allows remot...
CVSS分数: 7.5
发布时间: 2005-05-04 04:00:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

libtiff 3.6.1版本中tif_dirread.c的TIFFFetchStripThing函数存在整数溢出漏洞。远程攻击者借助一个带有STRIPOFFSETS标志和大量strips的TIFF文件执行任意代码,引发分配零字节缓冲区,并导致基于堆的缓冲区溢出。

英文描述:

Integer overflow in the TIFFFetchStripThing function in tif_dirread.c for libtiff 3.6.1 allows remote attackers to execute arbitrary code via a TIFF file with the STRIPOFFSETS flag and a large number of strips, which causes a zero byte buffer to be allocated and leads to a heap-based buffer overflow.

CWE类型:
(暂无数据)
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
avaya call_management_system_server 8.0 - - cpe:2.3:a:avaya:call_management_system_server:8.0:*:*:*:*:*:*:*
avaya call_management_system_server 9.0 - - cpe:2.3:a:avaya:call_management_system_server:9.0:*:*:*:*:*:*:*
avaya call_management_system_server 11.0 - - cpe:2.3:a:avaya:call_management_system_server:11.0:*:*:*:*:*:*:*
avaya call_management_system_server 12.0 - - cpe:2.3:a:avaya:call_management_system_server:12.0:*:*:*:*:*:*:*
avaya call_management_system_server 13.0 - - cpe:2.3:a:avaya:call_management_system_server:13.0:*:*:*:*:*:*:*
avaya cvlan * - - cpe:2.3:a:avaya:cvlan:*:*:*:*:*:*:*:*
avaya integrated_management * - - cpe:2.3:a:avaya:integrated_management:*:*:*:*:*:*:*:*
avaya interactive_response * - - cpe:2.3:a:avaya:interactive_response:*:*:*:*:*:*:*:*
avaya interactive_response 1.2.1 - - cpe:2.3:a:avaya:interactive_response:1.2.1:*:*:*:*:*:*:*
avaya interactive_response 1.3 - - cpe:2.3:a:avaya:interactive_response:1.3:*:*:*:*:*:*:*
avaya intuity_audix_lx * - - cpe:2.3:a:avaya:intuity_audix_lx:*:*:*:*:*:*:*:*
f5 icontrol_service_manager 1.3 - - cpe:2.3:a:f5:icontrol_service_manager:1.3:*:*:*:*:*:*:*
f5 icontrol_service_manager 1.3.4 - - cpe:2.3:a:f5:icontrol_service_manager:1.3.4:*:*:*:*:*:*:*
f5 icontrol_service_manager 1.3.5 - - cpe:2.3:a:f5:icontrol_service_manager:1.3.5:*:*:*:*:*:*:*
f5 icontrol_service_manager 1.3.6 - - cpe:2.3:a:f5:icontrol_service_manager:1.3.6:*:*:*:*:*:*:*
libtiff libtiff 3.4 - - cpe:2.3:a:libtiff:libtiff:3.4:*:*:*:*:*:*:*
libtiff libtiff 3.5.1 - - cpe:2.3:a:libtiff:libtiff:3.5.1:*:*:*:*:*:*:*
libtiff libtiff 3.5.2 - - cpe:2.3:a:libtiff:libtiff:3.5.2:*:*:*:*:*:*:*
libtiff libtiff 3.5.3 - - cpe:2.3:a:libtiff:libtiff:3.5.3:*:*:*:*:*:*:*
libtiff libtiff 3.5.4 - - cpe:2.3:a:libtiff:libtiff:3.5.4:*:*:*:*:*:*:*
libtiff libtiff 3.5.5 - - cpe:2.3:a:libtiff:libtiff:3.5.5:*:*:*:*:*:*:*
libtiff libtiff 3.5.7 - - cpe:2.3:a:libtiff:libtiff:3.5.7:*:*:*:*:*:*:*
libtiff libtiff 3.6.0 - - cpe:2.3:a:libtiff:libtiff:3.6.0:*:*:*:*:*:*:*
libtiff libtiff 3.6.1 - - cpe:2.3:a:libtiff:libtiff:3.6.1:*:*:*:*:*:*:*
libtiff libtiff 3.7.0 - - cpe:2.3:a:libtiff:libtiff:3.7.0:*:*:*:*:*:*:*
sgi propack 3.0 - - cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*
conectiva linux 9.0 - - cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*
conectiva linux 10.0 - - cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
avaya mn100 * - - cpe:2.3:a:avaya:mn100:*:*:*:*:*:*:*:*
apple mac_os_x 10.3 - - cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*
apple mac_os_x 10.3.1 - - cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*
apple mac_os_x 10.3.2 - - cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*
apple mac_os_x 10.3.3 - - cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*
apple mac_os_x 10.3.4 - - cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*
apple mac_os_x 10.3.5 - - cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*
apple mac_os_x 10.3.6 - - cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*
apple mac_os_x 10.3.7 - - cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*
apple mac_os_x 10.3.8 - - cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*
apple mac_os_x 10.3.9 - - cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*
apple mac_os_x_server 10.3 - - cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*
apple mac_os_x_server 10.3.1 - - cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*
apple mac_os_x_server 10.3.2 - - cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*
apple mac_os_x_server 10.3.3 - - cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*
apple mac_os_x_server 10.3.4 - - cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*
apple mac_os_x_server 10.3.5 - - cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*
apple mac_os_x_server 10.3.6 - - cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*
apple mac_os_x_server 10.3.7 - - cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:*
apple mac_os_x_server 10.3.8 - - cpe:2.3:o:apple:mac_os_x_server:10.3.8:*:*:*:*:*:*:*
apple mac_os_x_server 10.3.9 - - cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*
avaya modular_messaging_message_storage_server 1.1 - - cpe:2.3:o:avaya:modular_messaging_message_storage_server:1.1:*:*:*:*:*:*:*
avaya modular_messaging_message_storage_server 2.0 - - cpe:2.3:o:avaya:modular_messaging_message_storage_server:2.0:*:*:*:*:*:*:*
gentoo linux * - - cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
mandrakesoft mandrake_linux 10.0 - - cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
mandrakesoft mandrake_linux 10.1 - - cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
mandrakesoft mandrake_linux_corporate_server 3.0 - - cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
sco unixware 7.1.4 - - cpe:2.3:o:sco:unixware:7.1.4:*:*:*:*:*:*:*
sun solaris 7.0 - - cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*
sun solaris 8.0 - - cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*
sun solaris 9.0 - - cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*
sun solaris 10.0 - - cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*
sun sunos 5.7 - - cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*
sun sunos 5.8 - - cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
TA05-136A third-party-advisory
cve.org
访问
VU#539110 third-party-advisory
cve.org
访问
201072 vendor-advisory
cve.org
访问
101677 vendor-advisory
cve.org
访问
20041221 libtiff STRIPOFFSETS Integer Overflow Vulnerability third-party-advisory
cve.org
访问
APPLE-SA-2005-05-03 vendor-advisory
cve.org
访问
oval:org.mitre.oval:def:11175 vdb-entry
cve.org
访问
CVSS评分详情
7.5
HIGH
CVSS向量: AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS版本: 2.0
机密性
PARTIAL
完整性
PARTIAL
可用性
PARTIAL
时间信息
发布时间:
2005-05-04 04:00:00
修改时间:
2024-08-08 00:46:12
创建时间:
2025-11-11 15:32:22
更新时间:
2025-11-11 15:48:54
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2004-1307 2025-11-11 15:17:30 2025-11-11 07:32:22
NVD nvd_CVE-2004-1307 2025-11-11 14:50:55 2025-11-11 07:41:08
CNNVD cnnvd_CNNVD-200412-081 2025-11-11 15:08:45 2025-11-11 07:48:54
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:48:54
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-200412-081; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-200412-081
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:08
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.5; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:P/I:P/A:P; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 62; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.5
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:P/I:P/A:P
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 62
  • data_sources: ['cve'] -> ['cve', 'nvd']