Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2004-0886
Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.11
EPSS Ranking
93.0%
CVSS Severity
CVSS v2 Score
5.0
References
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000888
http://marc.info/?l=bugtraq&m=109779465621929&w=2
http://secunia.com/advisories/12818
http://securitytracker.com/id?1011674
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1
http://www.ciac.org/ciac/bulletins/p-015.shtml
http://www.debian.org/security/2004/dsa-567
http://www.kb.cert.org/vuls/id/687568
http://www.kde.org/info/security/advisory-20041209-2.txt
http://www.mandriva.com/security/advisories?name=MDKSA-2004:109
http://www.mandriva.com/security/advisories?name=MDKSA-2005:052
http://www.novell.com/linux/security/advisories/2004_38_libtiff.html
http://www.redhat.com/support/errata/RHSA-2004-577.html
http://www.redhat.com/support/errata/RHSA-2005-021.html
http://www.redhat.com/support/errata/RHSA-2005-354.html
http://www.securityfocus.com/bid/11406
http://www.trustix.org/errata/2004/0054/
https://exchange.xforce.ibmcloud.com/vulnerabilities/17715
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100116
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9907
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000888
http://marc.info/?l=bugtraq&m=109779465621929&w=2
http://secunia.com/advisories/12818
http://securitytracker.com/id?1011674
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1
http://www.ciac.org/ciac/bulletins/p-015.shtml
http://www.debian.org/security/2004/dsa-567
http://www.kb.cert.org/vuls/id/687568
http://www.kde.org/info/security/advisory-20041209-2.txt
http://www.mandriva.com/security/advisories?name=MDKSA-2004:109
http://www.mandriva.com/security/advisories?name=MDKSA-2005:052
http://www.novell.com/linux/security/advisories/2004_38_libtiff.html
http://www.redhat.com/support/errata/RHSA-2004-577.html
http://www.redhat.com/support/errata/RHSA-2005-021.html
http://www.redhat.com/support/errata/RHSA-2005-354.html
http://www.securityfocus.com/bid/11406
http://www.trustix.org/errata/2004/0054/
https://exchange.xforce.ibmcloud.com/vulnerabilities/17715
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100116
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9907
Products affected by CVE-2004-0886
Libtiff
»
Libtiff
»
Version:
3.4
cpe:2.3:a:libtiff:libtiff:3.4
Libtiff
»
Libtiff
»
Version:
3.5.1
cpe:2.3:a:libtiff:libtiff:3.5.1
Libtiff
»
Libtiff
»
Version:
3.5.2
cpe:2.3:a:libtiff:libtiff:3.5.2
Libtiff
»
Libtiff
»
Version:
3.5.3
cpe:2.3:a:libtiff:libtiff:3.5.3
Libtiff
»
Libtiff
»
Version:
3.5.4
cpe:2.3:a:libtiff:libtiff:3.5.4
Libtiff
»
Libtiff
»
Version:
3.5.5
cpe:2.3:a:libtiff:libtiff:3.5.5
Libtiff
»
Libtiff
»
Version:
3.5.7
cpe:2.3:a:libtiff:libtiff:3.5.7
Libtiff
»
Libtiff
»
Version:
3.6.0
cpe:2.3:a:libtiff:libtiff:3.6.0
Libtiff
»
Libtiff
»
Version:
3.6.1
cpe:2.3:a:libtiff:libtiff:3.6.1
Pdflib
»
Pdf Library
»
Version:
5.0.2
cpe:2.3:a:pdflib:pdf_library:5.0.2
Wxgtk2
»
Wxgtk2
»
Version:
Any
cpe:2.3:a:wxgtk2:wxgtk2:*
Wxgtk2
»
Wxgtk2
»
Version:
2.5_.0
cpe:2.3:a:wxgtk2:wxgtk2:2.5_.0
Apple
»
Mac Os X
»
Version:
10.2
cpe:2.3:o:apple:mac_os_x:10.2
Apple
»
Mac Os X
»
Version:
10.2.1
cpe:2.3:o:apple:mac_os_x:10.2.1
Apple
»
Mac Os X
»
Version:
10.2.2
cpe:2.3:o:apple:mac_os_x:10.2.2
Apple
»
Mac Os X
»
Version:
10.2.3
cpe:2.3:o:apple:mac_os_x:10.2.3
Apple
»
Mac Os X
»
Version:
10.2.4
cpe:2.3:o:apple:mac_os_x:10.2.4
Apple
»
Mac Os X
»
Version:
10.2.5
cpe:2.3:o:apple:mac_os_x:10.2.5
Apple
»
Mac Os X
»
Version:
10.2.6
cpe:2.3:o:apple:mac_os_x:10.2.6
Apple
»
Mac Os X
»
Version:
10.2.7
cpe:2.3:o:apple:mac_os_x:10.2.7
Apple
»
Mac Os X
»
Version:
10.2.8
cpe:2.3:o:apple:mac_os_x:10.2.8
Apple
»
Mac Os X
»
Version:
10.3
cpe:2.3:o:apple:mac_os_x:10.3
Apple
»
Mac Os X
»
Version:
10.3.1
cpe:2.3:o:apple:mac_os_x:10.3.1
Apple
»
Mac Os X
»
Version:
10.3.2
cpe:2.3:o:apple:mac_os_x:10.3.2
Apple
»
Mac Os X
»
Version:
10.3.3
cpe:2.3:o:apple:mac_os_x:10.3.3
Apple
»
Mac Os X
»
Version:
10.3.4
cpe:2.3:o:apple:mac_os_x:10.3.4
Apple
»
Mac Os X
»
Version:
10.3.5
cpe:2.3:o:apple:mac_os_x:10.3.5
Apple
»
Mac Os X
»
Version:
10.3.6
cpe:2.3:o:apple:mac_os_x:10.3.6
Apple
»
Mac Os X Server
»
Version:
10.2
cpe:2.3:o:apple:mac_os_x_server:10.2
Apple
»
Mac Os X Server
»
Version:
10.2.1
cpe:2.3:o:apple:mac_os_x_server:10.2.1
Apple
»
Mac Os X Server
»
Version:
10.2.2
cpe:2.3:o:apple:mac_os_x_server:10.2.2
Apple
»
Mac Os X Server
»
Version:
10.2.3
cpe:2.3:o:apple:mac_os_x_server:10.2.3
Apple
»
Mac Os X Server
»
Version:
10.2.4
cpe:2.3:o:apple:mac_os_x_server:10.2.4
Apple
»
Mac Os X Server
»
Version:
10.2.5
cpe:2.3:o:apple:mac_os_x_server:10.2.5
Apple
»
Mac Os X Server
»
Version:
10.2.6
cpe:2.3:o:apple:mac_os_x_server:10.2.6
Apple
»
Mac Os X Server
»
Version:
10.2.7
cpe:2.3:o:apple:mac_os_x_server:10.2.7
Apple
»
Mac Os X Server
»
Version:
10.2.8
cpe:2.3:o:apple:mac_os_x_server:10.2.8
Apple
»
Mac Os X Server
»
Version:
10.3
cpe:2.3:o:apple:mac_os_x_server:10.3
Apple
»
Mac Os X Server
»
Version:
10.3.1
cpe:2.3:o:apple:mac_os_x_server:10.3.1
Apple
»
Mac Os X Server
»
Version:
10.3.2
cpe:2.3:o:apple:mac_os_x_server:10.3.2
Apple
»
Mac Os X Server
»
Version:
10.3.3
cpe:2.3:o:apple:mac_os_x_server:10.3.3
Apple
»
Mac Os X Server
»
Version:
10.3.4
cpe:2.3:o:apple:mac_os_x_server:10.3.4
Apple
»
Mac Os X Server
»
Version:
10.3.5
cpe:2.3:o:apple:mac_os_x_server:10.3.5
Apple
»
Mac Os X Server
»
Version:
10.3.6
cpe:2.3:o:apple:mac_os_x_server:10.3.6
Kde
»
Kde
»
Version:
3.2
cpe:2.3:o:kde:kde:3.2
Kde
»
Kde
»
Version:
3.2.1
cpe:2.3:o:kde:kde:3.2.1
Kde
»
Kde
»
Version:
3.2.2
cpe:2.3:o:kde:kde:3.2.2
Kde
»
Kde
»
Version:
3.2.3
cpe:2.3:o:kde:kde:3.2.3
Kde
»
Kde
»
Version:
3.3
cpe:2.3:o:kde:kde:3.3
Kde
»
Kde
»
Version:
3.3.1
cpe:2.3:o:kde:kde:3.3.1
Mandrakesoft
»
Mandrake Linux
»
Version:
10.0
cpe:2.3:o:mandrakesoft:mandrake_linux:10.0
Redhat
»
Enterprise Linux
»
Version:
2.1
cpe:2.3:o:redhat:enterprise_linux:2.1
Redhat
»
Enterprise Linux
»
Version:
3.0
cpe:2.3:o:redhat:enterprise_linux:3.0
Redhat
»
Enterprise Linux Desktop
»
Version:
3.0
cpe:2.3:o:redhat:enterprise_linux_desktop:3.0
Redhat
»
Fedora Core
»
Version:
core_2.0
cpe:2.3:o:redhat:fedora_core:core_2.0
Redhat
»
Linux Advanced Workstation
»
Version:
2.1
cpe:2.3:o:redhat:linux_advanced_workstation:2.1
Suse
»
Suse Linux
»
Version:
1.0
cpe:2.3:o:suse:suse_linux:1.0
Suse
»
Suse Linux
»
Version:
8
cpe:2.3:o:suse:suse_linux:8
Suse
»
Suse Linux
»
Version:
8.1
cpe:2.3:o:suse:suse_linux:8.1
Suse
»
Suse Linux
»
Version:
8.2
cpe:2.3:o:suse:suse_linux:8.2
Suse
»
Suse Linux
»
Version:
9.0
cpe:2.3:o:suse:suse_linux:9.0
Suse
»
Suse Linux
»
Version:
9.1
cpe:2.3:o:suse:suse_linux:9.1
Trustix
»
Secure Linux
»
Version:
1.5
cpe:2.3:o:trustix:secure_linux:1.5
Trustix
»
Secure Linux
»
Version:
2.0
cpe:2.3:o:trustix:secure_linux:2.0
Trustix
»
Secure Linux
»
Version:
2.1
cpe:2.3:o:trustix:secure_linux:2.1
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved