Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2009-5022
Heap-based buffer overflow in tif_ojpeg.c in the OJPEG decoder in LibTIFF before 3.9.5 allows remote attackers to execute arbitrary code via a crafted TIFF file.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.193
EPSS Ranking
95.0%
CVSS Severity
CVSS v2 Score
6.8
References
http://bugzilla.maptools.org/show_bug.cgi?id=1999
http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058478.html
http://openwall.com/lists/oss-security/2011/04/12/10
http://secunia.com/advisories/44271
http://secunia.com/advisories/50726
http://security.gentoo.org/glsa/glsa-201209-02.xml
http://securitytracker.com/id?1025380
http://www.debian.org/security/2011/dsa-2256
http://www.mandriva.com/security/advisories?name=MDVSA-2011:078
http://www.redhat.com/support/errata/RHSA-2011-0452.html
http://www.remotesensing.org/libtiff/v3.9.5.html
http://www.securityfocus.com/bid/47338
http://www.ubuntu.com/usn/USN-1120-1
http://www.vupen.com/english/advisories/2011/1014
http://www.vupen.com/english/advisories/2011/1082
https://bugzilla.redhat.com/show_bug.cgi?id=695885
https://exchange.xforce.ibmcloud.com/vulnerabilities/66774
http://bugzilla.maptools.org/show_bug.cgi?id=1999
http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058478.html
http://openwall.com/lists/oss-security/2011/04/12/10
http://secunia.com/advisories/44271
http://secunia.com/advisories/50726
http://security.gentoo.org/glsa/glsa-201209-02.xml
http://securitytracker.com/id?1025380
http://www.debian.org/security/2011/dsa-2256
http://www.mandriva.com/security/advisories?name=MDVSA-2011:078
http://www.redhat.com/support/errata/RHSA-2011-0452.html
http://www.remotesensing.org/libtiff/v3.9.5.html
http://www.securityfocus.com/bid/47338
http://www.ubuntu.com/usn/USN-1120-1
http://www.vupen.com/english/advisories/2011/1014
http://www.vupen.com/english/advisories/2011/1082
https://bugzilla.redhat.com/show_bug.cgi?id=695885
https://exchange.xforce.ibmcloud.com/vulnerabilities/66774
Products affected by CVE-2009-5022
Libtiff
»
Libtiff
»
Version:
N/A
cpe:2.3:a:libtiff:libtiff:-
Libtiff
»
Libtiff
»
Version:
3.4
cpe:2.3:a:libtiff:libtiff:3.4
Libtiff
»
Libtiff
»
Version:
3.5.1
cpe:2.3:a:libtiff:libtiff:3.5.1
Libtiff
»
Libtiff
»
Version:
3.5.2
cpe:2.3:a:libtiff:libtiff:3.5.2
Libtiff
»
Libtiff
»
Version:
3.5.3
cpe:2.3:a:libtiff:libtiff:3.5.3
Libtiff
»
Libtiff
»
Version:
3.5.4
cpe:2.3:a:libtiff:libtiff:3.5.4
Libtiff
»
Libtiff
»
Version:
3.5.5
cpe:2.3:a:libtiff:libtiff:3.5.5
Libtiff
»
Libtiff
»
Version:
3.5.6
cpe:2.3:a:libtiff:libtiff:3.5.6
Libtiff
»
Libtiff
»
Version:
3.5.7
cpe:2.3:a:libtiff:libtiff:3.5.7
Libtiff
»
Libtiff
»
Version:
3.6.0
cpe:2.3:a:libtiff:libtiff:3.6.0
Libtiff
»
Libtiff
»
Version:
3.6.1
cpe:2.3:a:libtiff:libtiff:3.6.1
Libtiff
»
Libtiff
»
Version:
3.7.0
cpe:2.3:a:libtiff:libtiff:3.7.0
Libtiff
»
Libtiff
»
Version:
3.7.1
cpe:2.3:a:libtiff:libtiff:3.7.1
Libtiff
»
Libtiff
»
Version:
3.7.2
cpe:2.3:a:libtiff:libtiff:3.7.2
Libtiff
»
Libtiff
»
Version:
3.7.3
cpe:2.3:a:libtiff:libtiff:3.7.3
Libtiff
»
Libtiff
»
Version:
3.7.4
cpe:2.3:a:libtiff:libtiff:3.7.4
Libtiff
»
Libtiff
»
Version:
3.8.0
cpe:2.3:a:libtiff:libtiff:3.8.0
Libtiff
»
Libtiff
»
Version:
3.8.1
cpe:2.3:a:libtiff:libtiff:3.8.1
Libtiff
»
Libtiff
»
Version:
3.8.2
cpe:2.3:a:libtiff:libtiff:3.8.2
Libtiff
»
Libtiff
»
Version:
3.9
cpe:2.3:a:libtiff:libtiff:3.9
Libtiff
»
Libtiff
»
Version:
3.9.0
cpe:2.3:a:libtiff:libtiff:3.9.0
Libtiff
»
Libtiff
»
Version:
3.9.1
cpe:2.3:a:libtiff:libtiff:3.9.1
Libtiff
»
Libtiff
»
Version:
3.9.2
cpe:2.3:a:libtiff:libtiff:3.9.2
Libtiff
»
Libtiff
»
Version:
3.9.2-5.2.1
cpe:2.3:a:libtiff:libtiff:3.9.2-5.2.1
Libtiff
»
Libtiff
»
Version:
3.9.3
cpe:2.3:a:libtiff:libtiff:3.9.3
Libtiff
»
Libtiff
»
Version:
3.9.4
cpe:2.3:a:libtiff:libtiff:3.9.4
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved