CVE-2011-0192

CVSS V2 High 9.3 CVSS V3 None
Description
Buffer overflow in Fax4Decode in LibTIFF 3.9.4 and possibly other versions, as used in ImageIO in Apple iTunes before 10.2 on Windows and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF Internet Fax image file that has been compressed using CCITT Group 4 encoding, related to the EXPAND2D macro in libtiff/tif_fax3.h. NOTE: some of these details are obtained from third party information.
Overview
  • CVE ID
  • CVE-2011-0192
  • Assigner
  • product-security@apple.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2011-03-03T20:00:02
  • Last Modified Date
  • 2014-02-21T04:39:24
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:* 1 OR 10.1.2
cpe:2.3:a:apple:itunes:4.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:4.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:4.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:4.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:4.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:4.5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:4.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:4.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:4.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:4.7.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:4.7.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:4.7.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:4.8.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:4.9.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:5.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:5.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:6.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:6.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:6.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:6.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:6.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:6.0.4.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:6.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:7.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:7.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:7.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:7.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:7.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:7.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:7.3.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:7.3.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:7.3.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:7.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:7.4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:7.4.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:7.4.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:7.4.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:7.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:7.5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:7.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:7.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:7.6.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:7.6.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:7.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:7.7.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:7.7.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:8.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:8.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:8.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:8.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:8.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:8.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:8.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:9.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:9.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:9.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:9.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:9.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:9.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:10.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:10.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:10.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:itunes:10.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* 0 OR
cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:* 0 OR
cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:* 0 OR
cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:* 0 OR
cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:* 0 OR
cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:* 0 OR
cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:C/I:C/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 9.3
  • Severity
  • HIGH
  • Exploitability Score
  • 8.6
  • Impact Score
  • 10
References
Reference URL Reference Tags
http://support.apple.com/kb/HT4554 Vendor Advisory
http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html Patch Vendor Advisory
http://support.apple.com/kb/HT4564
http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html
http://www.vupen.com/english/advisories/2011/0621
http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html
http://support.apple.com/kb/HT4565
http://support.apple.com/kb/HT4566
http://www.mandriva.com/security/advisories?name=MDVSA-2011:043
http://lists.apple.com/archives/security-announce/2011//Mar/msg00005.html
http://support.apple.com/kb/HT4581
http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
http://www.securitytracker.com/id?1025153
http://www.redhat.com/support/errata/RHSA-2011-0318.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055683.html
http://secunia.com/advisories/43664
http://secunia.com/advisories/43593
http://www.securityfocus.com/bid/46658
https://bugzilla.redhat.com/show_bug.cgi?id=678635
http://www.vupen.com/english/advisories/2011/0599
http://www.vupen.com/english/advisories/2011/0551
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055240.html
http://secunia.com/advisories/43585
http://www.vupen.com/english/advisories/2011/0845
http://secunia.com/advisories/43934
http://www.vupen.com/english/advisories/2011/0930
http://www.debian.org/security/2011/dsa-2210
http://www.vupen.com/english/advisories/2011/0905
http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057763.html
http://www.vupen.com/english/advisories/2011/0960
http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.587820
http://secunia.com/advisories/44135
http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057840.html
http://secunia.com/advisories/44117
http://blackberry.com/btsc/KB27244
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://secunia.com/advisories/50726
http://security.gentoo.org/glsa/glsa-201209-02.xml
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
History
Created Old Value New Value Data Type Notes
2022-05-10 10:38:00 Added to TrackCVE