Heap-based buffer overflow in the readgifimage function in the gif2tiff tool in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted height and width values in a GIF image.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libtiff-doc", "binary_version": "4.0.3-7ubuntu0.1" }, { "binary_name": "libtiff-opengl", "binary_version": "4.0.3-7ubuntu0.1" }, { "binary_name": "libtiff-tools", "binary_version": "4.0.3-7ubuntu0.1" }, { "binary_name": "libtiff4-dev", "binary_version": "4.0.3-7ubuntu0.1" }, { "binary_name": "libtiff5", "binary_version": "4.0.3-7ubuntu0.1" }, { "binary_name": "libtiff5-alt-dev", "binary_version": "4.0.3-7ubuntu0.1" }, { "binary_name": "libtiff5-dev", "binary_version": "4.0.3-7ubuntu0.1" }, { "binary_name": "libtiffxx5", "binary_version": "4.0.3-7ubuntu0.1" } ], "ubuntu_priority": "medium" }