| Title | LibTIFF の OJPEGReadBufferFill 関数におけるサービス運用妨害 (DoS) の脆弱性 |
|---|---|
| Summary | LibTIFF の tif_ojpeg.c 内にある OJPEGReadBufferFill 関数には、TIFFVGetField 関数の処理に関して不備があるため、サービス運用妨害 (DoS) 状態となる脆弱性が存在します。 |
| Possible impacts | 第三者により、未定義のストリップオフセットが付与されている OJPEG イメージファイルを介して、サービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | June 24, 2010, midnight |
| Registration Date | July 27, 2010, 5:30 p.m. |
| Last Update | Feb. 8, 2011, 3:27 p.m. |
| CVSS2.0 : 警告 | |
| Score | 5 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:N/I:N/A:P |
| オラクル |
| OpenSolaris |
| Oracle Solaris 10 |
| Oracle Solaris 8 |
| Oracle Solaris 9 |
| LibTIFF |
| LibTIFF 3.9.3 未満 |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2010年07月27日] 掲載 [2010年10月29日] 影響を受けるシステム:オラクル (cve_2010_2065_cve_2010) の情報を追加 ベンダ情報:オラクル (cve_2010_2065_cve_2010) を追加 [2011年02月08日] 影響を受けるシステム:オラクル (cve_2010_2065_cve_2010) の情報を追加 |
Feb. 17, 2018, 10:37 a.m. |
| Summary | The OJPEGReadBufferFill function in tif_ojpeg.c in LibTIFF before 3.9.3 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an OJPEG image with undefined strip offsets, related to the TIFFVGetField function. |
|---|---|
| Publication Date | June 25, 2010, 2:30 a.m. |
| Registration Date | Jan. 29, 2021, 11:02 a.m. |
| Last Update | Nov. 21, 2024, 10:16 a.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:libtiff:libtiff:3.4:beta29:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.7.0:beta:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.6.0:beta2:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.4:beta34:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.6.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.6.0:beta:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.8.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.7.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.4:beta32:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.4:beta31:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.8.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.4:beta36:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.4:beta24:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.5.7:alpha4:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.8.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.4:beta28:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.5.7:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.5.7:beta:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.7.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.4:beta37:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.7.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.6.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.5.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.7.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.5.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.5.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.5.7:alpha3:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.7.0:beta2:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.5.7:alpha:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.7.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.7.0:alpha:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.5.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.9.0:beta:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.5.6:beta:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.9.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.5.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.9.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.4:beta18:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.9:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.5.7:alpha2:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:3.5.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:* | 3.9.2 | ||||
| cpe:2.3:a:libtiff:libtiff:3.4:beta35:*:*:*:*:*:* | |||||