Executive Summary

Informations
Name CVE-2009-5022 First vendor Publication 2011-05-03
Vendor Cve Last vendor Modification 2023-02-13

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 6.8 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Heap-based buffer overflow in tif_ojpeg.c in the OJPEG decoder in LibTIFF before 3.9.5 allows remote attackers to execute arbitrary code via a crafted TIFF file.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5022

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:12818
 
Oval ID: oval:org.mitre.oval:def:12818
Title: DSA-2256-1 tiff -- buffer overflow
Description: Tavis Ormandy discovered that the Tag Image File Format library is vulnerable to a buffer overflow triggered by a crafted OJPEG file which allows for a crash and potentially execution of arbitrary code. The oldstable distribution is not affected by this problem.
Family: unix Class: patch
Reference(s): DSA-2256-1
CVE-2009-5022
Version: 5
Platform(s): Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): tiff
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:13752
 
Oval ID: oval:org.mitre.oval:def:13752
Title: USN-1120-1 -- tiff vulnerability
Description: tiff: TIFF manipulation and conversion tools The TIFF library could be made to run programs as your login if it opened a specially crafted file.
Family: unix Class: patch
Reference(s): USN-1120-1
CVE-2009-5022
Version: 5
Platform(s): Ubuntu 10.10
Ubuntu 10.04
Product(s): tiff
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21952
 
Oval ID: oval:org.mitre.oval:def:21952
Title: RHSA-2011:0452: libtiff security update (Important)
Description: Heap-based buffer overflow in tif_ojpeg.c in the OJPEG decoder in LibTIFF before 3.9.5 allows remote attackers to execute arbitrary code via a crafted TIFF file.
Family: unix Class: patch
Reference(s): RHSA-2011:0452-01
CVE-2009-5022
Version: 4
Platform(s): Red Hat Enterprise Linux 6
Product(s): libtiff
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23127
 
Oval ID: oval:org.mitre.oval:def:23127
Title: ELSA-2011:0452: libtiff security update (Important)
Description: Heap-based buffer overflow in tif_ojpeg.c in the OJPEG decoder in LibTIFF before 3.9.5 allows remote attackers to execute arbitrary code via a crafted TIFF file.
Family: unix Class: patch
Reference(s): ELSA-2011:0452-01
CVE-2009-5022
Version: 6
Platform(s): Oracle Linux 6
Product(s): libtiff
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28100
 
Oval ID: oval:org.mitre.oval:def:28100
Title: DEPRECATED: ELSA-2011-0452 -- libtiff security update (important)
Description: [3.9.4-1.el6_0.3] - Add fix for CVE-2009-5022 Resolves: #696143
Family: unix Class: patch
Reference(s): ELSA-2011-0452
CVE-2009-5022
Version: 4
Platform(s): Oracle Linux 6
Product(s): libtiff
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 49

OpenVAS Exploits

Date Description
2012-09-26 Name : Gentoo Security Advisory GLSA 201209-02 (tiff)
File : nvt/glsa_201209_02.nasl
2012-06-06 Name : RedHat Update for libtiff RHSA-2011:0452-01
File : nvt/gb_RHSA-2011_0452-01_libtiff.nasl
2011-08-03 Name : Debian Security Advisory DSA 2256-1 (tiff)
File : nvt/deb_2256_1.nasl
2011-05-10 Name : Ubuntu Update for tiff USN-1120-1
File : nvt/gb_ubuntu_USN_1120_1.nasl
2011-04-29 Name : Mandriva Update for libtiff MDVSA-2011:078 (libtiff)
File : nvt/gb_mandriva_MDVSA_2011_078.nasl
2011-04-22 Name : Fedora Update for libtiff FEDORA-2011-5304
File : nvt/gb_fedora_2011_5304_libtiff_fc14.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
72260 LibTIFF OJPEG Decoder tif_ojpeg.c Crafted TIFF File Handling Overflow

LibTIFF is prone to an overflow condition. The OJPEGReadHeaderInfoSecStreamSof() function fails to properly sanitize user-supplied input resulting in a buffer overflow. With a specially crafted file, a context-dependent attacker can potentially cause arbitrary code execution.

Nessus® Vulnerability Scanner

Date Description
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_3_libtiff-devel-110415.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_4_libtiff-devel-110415.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2011-0452.nasl - Type : ACT_GATHER_INFO
2012-11-27 Name : A graphic viewer installed on the remote host is affected by multiple buffer ...
File : irfanview_435.nasl - Type : ACT_GATHER_INFO
2012-09-24 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201209-02.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20110418_libtiff_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2011-06-13 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-1120-1.nasl - Type : ACT_GATHER_INFO
2011-06-10 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2256.nasl - Type : ACT_GATHER_INFO
2011-04-27 Name : The remote Fedora host is missing a security update.
File : fedora_2011-5336.nasl - Type : ACT_GATHER_INFO
2011-04-25 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2011-078.nasl - Type : ACT_GATHER_INFO
2011-04-20 Name : The remote Fedora host is missing a security update.
File : fedora_2011-5304.nasl - Type : ACT_GATHER_INFO
2011-04-19 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2011-0452.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/47338
CONFIRM http://bugzilla.maptools.org/show_bug.cgi?id=1999
http://www.remotesensing.org/libtiff/v3.9.5.html
https://bugzilla.redhat.com/show_bug.cgi?id=695885
DEBIAN http://www.debian.org/security/2011/dsa-2256
FEDORA http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058478.html
GENTOO http://security.gentoo.org/glsa/glsa-201209-02.xml
MANDRIVA http://www.mandriva.com/security/advisories?name=MDVSA-2011:078
MLIST http://openwall.com/lists/oss-security/2011/04/12/10
REDHAT http://www.redhat.com/support/errata/RHSA-2011-0452.html
SECTRACK http://securitytracker.com/id?1025380
SECUNIA http://secunia.com/advisories/44271
http://secunia.com/advisories/50726
UBUNTU http://www.ubuntu.com/usn/USN-1120-1
VUPEN http://www.vupen.com/english/advisories/2011/1014
http://www.vupen.com/english/advisories/2011/1082
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/66774

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
Date Informations
2023-02-13 09:28:58
  • Multiple Updates
2023-02-02 21:28:48
  • Multiple Updates
2021-05-04 12:10:45
  • Multiple Updates
2021-04-22 01:11:14
  • Multiple Updates
2020-05-23 01:41:20
  • Multiple Updates
2020-05-23 00:24:53
  • Multiple Updates
2017-08-17 09:22:51
  • Multiple Updates
2016-04-26 19:27:55
  • Multiple Updates
2014-06-14 13:28:21
  • Multiple Updates
2014-02-17 10:52:57
  • Multiple Updates
2013-05-16 17:02:36
  • Multiple Updates
2013-05-11 00:05:02
  • Multiple Updates