Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2004-0803
Multiple vulnerabilities in the RLE (run length encoding) decoders for libtiff 3.6.1 and earlier, related to buffer overflows and integer overflows, allow remote attackers to execute arbitrary code via TIFF files.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.179
EPSS Ranking
94.7%
CVSS Severity
CVSS v2 Score
7.5
References
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000888
http://marc.info/?l=bugtraq&m=109778785107450&w=2
http://scary.beasts.org/security/CESA-2004-006.txt
http://secunia.com/advisories/12818
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1
http://www.debian.org/security/2004/dsa-567
http://www.gentoo.org/security/en/glsa/glsa-200410-11.xml
http://www.kb.cert.org/vuls/id/948752
http://www.kde.org/info/security/advisory-20041209-2.txt
http://www.mandriva.com/security/advisories?name=MDKSA-2004:109
http://www.mandriva.com/security/advisories?name=MDKSA-2005:052
http://www.novell.com/linux/security/advisories/2004_38_libtiff.html
http://www.redhat.com/support/errata/RHSA-2004-577.html
http://www.redhat.com/support/errata/RHSA-2005-021.html
http://www.redhat.com/support/errata/RHSA-2005-354.html
http://www.securityfocus.com/bid/11406
https://exchange.xforce.ibmcloud.com/vulnerabilities/17703
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100114
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8896
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000888
http://marc.info/?l=bugtraq&m=109778785107450&w=2
http://scary.beasts.org/security/CESA-2004-006.txt
http://secunia.com/advisories/12818
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1
http://www.debian.org/security/2004/dsa-567
http://www.gentoo.org/security/en/glsa/glsa-200410-11.xml
http://www.kb.cert.org/vuls/id/948752
http://www.kde.org/info/security/advisory-20041209-2.txt
http://www.mandriva.com/security/advisories?name=MDKSA-2004:109
http://www.mandriva.com/security/advisories?name=MDKSA-2005:052
http://www.novell.com/linux/security/advisories/2004_38_libtiff.html
http://www.redhat.com/support/errata/RHSA-2004-577.html
http://www.redhat.com/support/errata/RHSA-2005-021.html
http://www.redhat.com/support/errata/RHSA-2005-354.html
http://www.securityfocus.com/bid/11406
https://exchange.xforce.ibmcloud.com/vulnerabilities/17703
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100114
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8896
Products affected by CVE-2004-0803
Libtiff
»
Libtiff
»
Version:
3.4
cpe:2.3:a:libtiff:libtiff:3.4
Libtiff
»
Libtiff
»
Version:
3.5.1
cpe:2.3:a:libtiff:libtiff:3.5.1
Libtiff
»
Libtiff
»
Version:
3.5.2
cpe:2.3:a:libtiff:libtiff:3.5.2
Libtiff
»
Libtiff
»
Version:
3.5.3
cpe:2.3:a:libtiff:libtiff:3.5.3
Libtiff
»
Libtiff
»
Version:
3.5.4
cpe:2.3:a:libtiff:libtiff:3.5.4
Libtiff
»
Libtiff
»
Version:
3.5.5
cpe:2.3:a:libtiff:libtiff:3.5.5
Libtiff
»
Libtiff
»
Version:
3.5.7
cpe:2.3:a:libtiff:libtiff:3.5.7
Libtiff
»
Libtiff
»
Version:
3.6.0
cpe:2.3:a:libtiff:libtiff:3.6.0
Libtiff
»
Libtiff
»
Version:
3.6.1
cpe:2.3:a:libtiff:libtiff:3.6.1
Pdflib
»
Pdf Library
»
Version:
5.0.2
cpe:2.3:a:pdflib:pdf_library:5.0.2
Wxgtk2
»
Wxgtk2
»
Version:
2.5_.0
cpe:2.3:a:wxgtk2:wxgtk2:2.5_.0
Apple
»
Mac Os X
»
Version:
10.2
cpe:2.3:o:apple:mac_os_x:10.2
Apple
»
Mac Os X
»
Version:
10.2.1
cpe:2.3:o:apple:mac_os_x:10.2.1
Apple
»
Mac Os X
»
Version:
10.2.2
cpe:2.3:o:apple:mac_os_x:10.2.2
Apple
»
Mac Os X
»
Version:
10.2.3
cpe:2.3:o:apple:mac_os_x:10.2.3
Apple
»
Mac Os X
»
Version:
10.2.4
cpe:2.3:o:apple:mac_os_x:10.2.4
Apple
»
Mac Os X
»
Version:
10.2.5
cpe:2.3:o:apple:mac_os_x:10.2.5
Apple
»
Mac Os X
»
Version:
10.2.6
cpe:2.3:o:apple:mac_os_x:10.2.6
Apple
»
Mac Os X
»
Version:
10.2.7
cpe:2.3:o:apple:mac_os_x:10.2.7
Apple
»
Mac Os X
»
Version:
10.2.8
cpe:2.3:o:apple:mac_os_x:10.2.8
Apple
»
Mac Os X
»
Version:
10.3
cpe:2.3:o:apple:mac_os_x:10.3
Apple
»
Mac Os X
»
Version:
10.3.1
cpe:2.3:o:apple:mac_os_x:10.3.1
Apple
»
Mac Os X
»
Version:
10.3.2
cpe:2.3:o:apple:mac_os_x:10.3.2
Apple
»
Mac Os X
»
Version:
10.3.3
cpe:2.3:o:apple:mac_os_x:10.3.3
Apple
»
Mac Os X
»
Version:
10.3.4
cpe:2.3:o:apple:mac_os_x:10.3.4
Apple
»
Mac Os X
»
Version:
10.3.5
cpe:2.3:o:apple:mac_os_x:10.3.5
Apple
»
Mac Os X
»
Version:
10.3.6
cpe:2.3:o:apple:mac_os_x:10.3.6
Apple
»
Mac Os X Server
»
Version:
10.2
cpe:2.3:o:apple:mac_os_x_server:10.2
Apple
»
Mac Os X Server
»
Version:
10.2.1
cpe:2.3:o:apple:mac_os_x_server:10.2.1
Apple
»
Mac Os X Server
»
Version:
10.2.2
cpe:2.3:o:apple:mac_os_x_server:10.2.2
Apple
»
Mac Os X Server
»
Version:
10.2.3
cpe:2.3:o:apple:mac_os_x_server:10.2.3
Apple
»
Mac Os X Server
»
Version:
10.2.4
cpe:2.3:o:apple:mac_os_x_server:10.2.4
Apple
»
Mac Os X Server
»
Version:
10.2.5
cpe:2.3:o:apple:mac_os_x_server:10.2.5
Apple
»
Mac Os X Server
»
Version:
10.2.6
cpe:2.3:o:apple:mac_os_x_server:10.2.6
Apple
»
Mac Os X Server
»
Version:
10.2.7
cpe:2.3:o:apple:mac_os_x_server:10.2.7
Apple
»
Mac Os X Server
»
Version:
10.2.8
cpe:2.3:o:apple:mac_os_x_server:10.2.8
Apple
»
Mac Os X Server
»
Version:
10.3
cpe:2.3:o:apple:mac_os_x_server:10.3
Apple
»
Mac Os X Server
»
Version:
10.3.1
cpe:2.3:o:apple:mac_os_x_server:10.3.1
Apple
»
Mac Os X Server
»
Version:
10.3.2
cpe:2.3:o:apple:mac_os_x_server:10.3.2
Apple
»
Mac Os X Server
»
Version:
10.3.3
cpe:2.3:o:apple:mac_os_x_server:10.3.3
Apple
»
Mac Os X Server
»
Version:
10.3.4
cpe:2.3:o:apple:mac_os_x_server:10.3.4
Apple
»
Mac Os X Server
»
Version:
10.3.5
cpe:2.3:o:apple:mac_os_x_server:10.3.5
Apple
»
Mac Os X Server
»
Version:
10.3.6
cpe:2.3:o:apple:mac_os_x_server:10.3.6
Kde
»
Kde
»
Version:
3.2
cpe:2.3:o:kde:kde:3.2
Kde
»
Kde
»
Version:
3.2.1
cpe:2.3:o:kde:kde:3.2.1
Kde
»
Kde
»
Version:
3.2.2
cpe:2.3:o:kde:kde:3.2.2
Kde
»
Kde
»
Version:
3.2.3
cpe:2.3:o:kde:kde:3.2.3
Kde
»
Kde
»
Version:
3.3
cpe:2.3:o:kde:kde:3.3
Kde
»
Kde
»
Version:
3.3.1
cpe:2.3:o:kde:kde:3.3.1
Mandrakesoft
»
Mandrake Linux
»
Version:
10.0
cpe:2.3:o:mandrakesoft:mandrake_linux:10.0
Redhat
»
Enterprise Linux
»
Version:
2.1
cpe:2.3:o:redhat:enterprise_linux:2.1
Redhat
»
Enterprise Linux
»
Version:
3.0
cpe:2.3:o:redhat:enterprise_linux:3.0
Redhat
»
Enterprise Linux Desktop
»
Version:
3.0
cpe:2.3:o:redhat:enterprise_linux_desktop:3.0
Redhat
»
Fedora Core
»
Version:
core_2.0
cpe:2.3:o:redhat:fedora_core:core_2.0
Redhat
»
Linux Advanced Workstation
»
Version:
2.1
cpe:2.3:o:redhat:linux_advanced_workstation:2.1
Suse
»
Suse Linux
»
Version:
1.0
cpe:2.3:o:suse:suse_linux:1.0
Suse
»
Suse Linux
»
Version:
8
cpe:2.3:o:suse:suse_linux:8
Suse
»
Suse Linux
»
Version:
8.1
cpe:2.3:o:suse:suse_linux:8.1
Suse
»
Suse Linux
»
Version:
8.2
cpe:2.3:o:suse:suse_linux:8.2
Suse
»
Suse Linux
»
Version:
9.0
cpe:2.3:o:suse:suse_linux:9.0
Suse
»
Suse Linux
»
Version:
9.1
cpe:2.3:o:suse:suse_linux:9.1
Trustix
»
Secure Linux
»
Version:
1.5
cpe:2.3:o:trustix:secure_linux:1.5
Trustix
»
Secure Linux
»
Version:
2.0
cpe:2.3:o:trustix:secure_linux:2.0
Trustix
»
Secure Linux
»
Version:
2.1
cpe:2.3:o:trustix:secure_linux:2.1
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved