Vulnerability Details : CVE-2004-1307
Integer overflow in the TIFFFetchStripThing function in tif_dirread.c for libtiff 3.6.1 allows remote attackers to execute arbitrary code via a TIFF file with the STRIPOFFSETS flag and a large number of strips, which causes a zero byte buffer to be allocated and leads to a heap-based buffer overflow.
Vulnerability category: OverflowExecute code
Threat overview for CVE-2004-1307
Top countries where our scanners detected CVE-2004-1307
Top open port discovered on systems with this issue
80
IPs affected by CVE-2004-1307 7
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2004-1307!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2004-1307
Probability of exploitation activity in the next 30 days: 4.81%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 92 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2004-1307
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
Vendor statements for CVE-2004-1307
-
Red Hat 2008-08-12This issue was resolved in all affected libtiff versions as shipped with Red Hat Enterprise Linux 2.1, 3, and 4 via a patch for CVE-2004-0886. For updates containing patches for CVE-2004-0886, see: https://rhn.redhat.com/errata/CVE-2004-0886.html
-
http://www.kb.cert.org/vuls/id/539110
Patch;Third Party Advisory;US Government Resource
-
http://www.idefense.com/application/poi/display?id=173&type=vulnerabilities&flashstatus=true
Patch;Vendor Advisory
-
http://lists.apple.com/archives/security-announce/2005/May/msg00001.html
Patch;Vendor Advisory
-
http://www.us-cert.gov/cas/techalerts/TA05-136A.html
US Government Resource
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11175
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1
- cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*
- cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
- cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*
- cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*
- cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*
- cpe:2.3:o:sun:solaris:9.0:x86_update_2:*:*:*:*:*:*
- cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*
- cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*
- cpe:2.3:o:sun:solaris:10.0:*:x86:*:*:*:*:*
- cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*
- cpe:2.3:o:sco:unixware:7.1.4:*:*:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.3.8:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:f5:icontrol_service_manager:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:f5:icontrol_service_manager:1.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:f5:icontrol_service_manager:1.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:f5:icontrol_service_manager:1.3.6:*:*:*:*:*:*:*
- cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:intuity_audix_lx:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:mn100:*:*:*:*:*:*:*:*
- cpe:2.3:o:avaya:modular_messaging_message_storage_server:1.1:*:*:*:*:*:*:*
- cpe:2.3:o:avaya:modular_messaging_message_storage_server:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:integrated_management:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:call_management_system_server:11.0:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:call_management_system_server:12.0:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:call_management_system_server:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:call_management_system_server:13.0:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:call_management_system_server:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:cvlan:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:interactive_response:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:interactive_response:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:interactive_response:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.4:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.7.0:*:*:*:*:*:*:*