Vulnerability Details : CVE-2008-2327
Multiple buffer underflows in the (1) LZWDecode, (2) LZWDecodeCompat, and (3) LZWDecodeVector functions in tif_lzw.c in the LZW decoder in LibTIFF 3.8.2 and earlier allow context-dependent attackers to execute arbitrary code via a crafted TIFF file, related to improper handling of the CODE_CLEAR code.
Vulnerability category: OverflowExecute code
Products affected by CVE-2008-2327
- cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.4:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.5.6:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.8.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-2327
1.11%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 84 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-2327
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2008-2327
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-2327
-
http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
Apple - Lists.apple.com
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11489
404 Not Found
-
http://security-tracker.debian.net/tracker/DSA-1632-1
-
http://www.securitytracker.com/id?1020750
Access Denied
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-265030-1
-
http://lists.apple.com/archives/security-announce//2008/Nov/msg00001.html
Apple - Lists.apple.com
-
http://www.securityfocus.com/archive/1/497962/100/0/threaded
-
http://www.vupen.com/english/advisories/2008/2438
Site en constructionVendor Advisory
-
http://www.vupen.com/english/advisories/2008/3232
Site en construction
-
http://www.vupen.com/english/advisories/2008/3107
Site en constructionVendor Advisory
-
http://www.vupen.com/english/advisories/2008/2776
Site en constructionVendor Advisory
-
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00121.html
[SECURITY] Fedora 8 Update: libtiff-3.8.2-11.fc8
-
http://www.redhat.com/support/errata/RHSA-2008-0863.html
SupportVendor Advisory
-
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00102.html
[SECURITY] Fedora 9 Update: libtiff-3.8.2-11.fc9
-
http://support.apple.com/kb/HT3298
About the security content of Safari 3.2 - Apple Support
-
http://lists.apple.com/archives/security-announce/2008/Nov/msg00002.html
Apple - Lists.apple.com
-
https://bugzilla.redhat.com/show_bug.cgi?id=458674
458674 – (CVE-2008-2327) CVE-2008-2327 libtiff: use of uninitialized memory in LZW decoder
-
http://www.debian.org/security/2008/dsa-1632
[SECURITY] [DSA 1632-1] New tiff packages fix arbitrary code executionPatch
-
http://security-tracker.debian.net/tracker/DTSA-160-1
-
http://www.vmware.com/security/advisories/VMSA-2008-0017.html
VMSA-2008-0017.2
-
http://www.ubuntu.com/usn/usn-639-1
500: Server error | Ubuntu
-
http://support.apple.com/kb/HT3276
About the security content of iLife Support 8.3.1 - Apple Support
-
http://www.vupen.com/english/advisories/2008/2971
Webmail: access your OVH emails on ovhcloud.com | OVHcloudVendor Advisory
-
http://security.gentoo.org/glsa/glsa-200809-07.xml
libTIFF: User-assisted execution of arbitrary code (GLSA 200809-07) — Gentoo security
-
http://www.vupen.com/english/advisories/2009/2143
Site en constructionVendor Advisory
-
http://www.mandriva.com/security/advisories?name=MDVSA-2008:184
Mandriva
-
http://www.us-cert.gov/cas/techalerts/TA08-260A.html
Page Not Found | CISAUS Government Resource
-
http://www.vupen.com/english/advisories/2008/2584
Site en constructionVendor Advisory
-
http://security-tracker.debian.net/tracker/CVE-2008-2327
-
http://www.securityfocus.com/bid/30832
-
http://bugs.gentoo.org/show_bug.cgi?id=234080
234080 – (CVE-2008-2327) media-libs/tiff <3.8.2-r4 buffer underflow in LZW decoding (CVE-2008-2327)
-
http://www.redhat.com/support/errata/RHSA-2008-0847.html
Support
-
http://www.redhat.com/support/errata/RHSA-2008-0848.html
SupportVendor Advisory
-
http://www.securityfocus.com/archive/1/496033/100/0/threaded
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5514
404 Not Found
-
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2008:018 - openSUSE Security Announce - openSUSE Mailing Lists
-
http://support.apple.com/kb/HT3318
About the security content of iOS 2.2 and iOS for iPod touch 2.2 - Apple Support
Jump to