"value":"Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size."
"name":"[tiff] 20130801 Vulnerabilities in libtiff 4.0.3",
"refsource":"MLIST",
"url":"http://www.asmail.be/msg0055359936.html"
},
{
"name":"54628",
"refsource":"SECUNIA",
"url":"http://secunia.com/advisories/54628"
},
{
"name":"[oss-security] 20130809 Re: CVE Request -- Four (stack-based) buffer overflows and one use-after-free in libtiff v4.0.3 reported by Pedro Ribeiro",