Vulnerability Details CVE-2012-4564
ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.265
EPSS Ranking 96.0%
CVSS Severity
CVSS v2 Score 6.8
Products affected by CVE-2012-4564
-
cpe:2.3:a:libtiff:libtiff:-
-
cpe:2.3:a:libtiff:libtiff:3.4
-
cpe:2.3:a:libtiff:libtiff:3.5.1
-
cpe:2.3:a:libtiff:libtiff:3.5.2
-
cpe:2.3:a:libtiff:libtiff:3.5.3
-
cpe:2.3:a:libtiff:libtiff:3.5.4
-
cpe:2.3:a:libtiff:libtiff:3.5.5
-
cpe:2.3:a:libtiff:libtiff:3.5.6
-
cpe:2.3:a:libtiff:libtiff:3.5.7
-
cpe:2.3:a:libtiff:libtiff:3.6.0
-
cpe:2.3:a:libtiff:libtiff:3.6.1
-
cpe:2.3:a:libtiff:libtiff:3.7.0
-
cpe:2.3:a:libtiff:libtiff:3.7.1
-
cpe:2.3:a:libtiff:libtiff:3.7.2
-
cpe:2.3:a:libtiff:libtiff:3.7.3
-
cpe:2.3:a:libtiff:libtiff:3.7.4
-
cpe:2.3:a:libtiff:libtiff:3.8.0
-
cpe:2.3:a:libtiff:libtiff:3.8.1
-
cpe:2.3:a:libtiff:libtiff:3.8.2
-
cpe:2.3:a:libtiff:libtiff:3.9
-
cpe:2.3:a:libtiff:libtiff:3.9.0
-
cpe:2.3:a:libtiff:libtiff:3.9.1
-
cpe:2.3:a:libtiff:libtiff:3.9.2
-
cpe:2.3:a:libtiff:libtiff:3.9.2-5.2.1
-
cpe:2.3:a:libtiff:libtiff:3.9.3
-
cpe:2.3:a:libtiff:libtiff:3.9.4
-
cpe:2.3:a:libtiff:libtiff:3.9.5
-
cpe:2.3:a:libtiff:libtiff:3.9.6
-
cpe:2.3:a:libtiff:libtiff:3.9.7
-
cpe:2.3:a:libtiff:libtiff:4.0
-
cpe:2.3:a:libtiff:libtiff:4.0.0
-
cpe:2.3:a:libtiff:libtiff:4.0.1
-
cpe:2.3:a:libtiff:libtiff:4.0.2
-
cpe:2.3:a:libtiff:libtiff:4.0.3
-
cpe:2.3:o:canonical:ubuntu_linux:10.04
-
cpe:2.3:o:canonical:ubuntu_linux:11.10
-
cpe:2.3:o:canonical:ubuntu_linux:12.04
-
cpe:2.3:o:canonical:ubuntu_linux:12.10
-
cpe:2.3:o:canonical:ubuntu_linux:8.04
-
cpe:2.3:o:debian:debian_linux:6.0
-
cpe:2.3:o:debian:debian_linux:7.0
-
cpe:2.3:o:opensuse:opensuse:11.4
-
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0
-
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0
-
cpe:2.3:o:redhat:enterprise_linux_eus:6.3
-
cpe:2.3:o:redhat:enterprise_linux_server:5.0
-
cpe:2.3:o:redhat:enterprise_linux_server:6.0
-
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0
-
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0