Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2004-0886

CVE information

Published

17 years ago

Last Modified

4 years ago

CVSSv2.0 Severity

Medium

Impact Analysis

Description

Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls..

CVSSv2.0 Score

Severity
Medium
Base Score
5/10
Exploit Score
10/10
Access Vector
Network
Access Complexity
Low
Authentication Required
None
Impact Score
2.9/10
Confidentiality Impact
None
Availability Impact
Partial
Integrity Impact
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:a:libtiff:libtiff:3.6.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:wxgtk2:wxgtk2:*:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:pdflib:pdf_library:5.0.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:wxgtk2:wxgtk2:2.5_.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:libtiff:libtiff:3.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:libtiff:libtiff:3.5.7:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:libtiff:libtiff:3.6.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:libtiff:libtiff:3.5.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:libtiff:libtiff:3.5.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:libtiff:libtiff:3.5.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:libtiff:libtiff:3.5.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:libtiff:libtiff:3.5.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64
  Yes
- -
cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*
  Yes
- -
cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:
  Yes
- -
cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:
  Yes
- -
cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x_server:10.2.7:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia
  Yes
- -
cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*
  Yes
- -
cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_pr
  Yes
- -
cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
  Yes
- -