{"vuid":"VU#555304","idnumber":"555304","name":"LibTIFF vulnerable to denial-of-service condition","keywords":["LibTIFF","tif_dirread.c","DoS","denial-of-service","TIFF image","divide by zero"],"overview":"An Integer overflow in the LibTIFF library may allow a remote attacker to cause a divide-by-zero error that results in a denial-of-service condition.","clean_desc":"LibTIFF is a library used to encode and decode images in Tag Image File Format (TIFF) format. An integer overflow in the tif_dirread.c file may allow an attacker to cause a divide-by-zero error. If a remote attacker can persuade a user to access a specially crafted TIFF image with the row bytes field set to zero, that attacker may cause the divide-by-zero error and crash the process that linked to the LibTIFF library. Any program that uses the LibTIFF library may be affected by this issue. Users are encouraged to contact their vendors to determine if they are vulnerable.","impact":"A remote attacker may be able to cause a divide-by-zero error and crash the process linked to the LibTIFF library.","resolution":"Apply Patch Patch or upgrade as specified by your vendor. Users who suspect they are vulnerable are encouraged to check with their vendor to determine the appropriate action to take.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported in Secunia Security Advisory SA12818. Secunia credits Chris Evans and Dmitry V. Levin for providing information regarding this vulnerability.","author":"This document was written by Jeff Gennari.","public":["http://www.ciac.org/ciac/bulletins/p-015.shtml","http://www.securitytracker.com/alerts/2004/Oct/1011724.html","http://www.osvdb.org/displayvuln.php?osvdb_id=10909","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0804","http://secunia.com/advisories/14791/"],"cveids":["CVE-2004-0804"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-10-21T15:07:48Z","publicdate":"2004-08-25T00:00:00Z","datefirstpublished":"2004-12-01T14:25:09Z","dateupdated":"2005-05-17T20:41:17Z","revision":79,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"5","cam_impact":"3","cam_easeofexploitation":"13","cam_attackeraccessrequired":"10","cam_scorecurrent":"0.6946875","cam_scorecurrentwidelyknown":"0.8775","cam_scorecurrentwidelyknownexploited":"1.60875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.6946875,"vulnote":null}