Unrated severityNVD Advisory· Published Jan 27, 2005· Updated Apr 16, 2026
CVE-2004-0886
CVE-2004-0886
Description
Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls.
Affected products
75cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*+ 15 more
- cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2.7:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*+ 8 more
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
- cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*+ 6 more
- cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.4:*:*:*:*:*:*:*+ 8 more
- cpe:2.3:a:libtiff:libtiff:3.4:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:pdflib:pdf_library:5.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*+ 15 more
- cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
- cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
- cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
21- www.redhat.com/support/errata/RHSA-2004-577.htmlnvdPatchVendor Advisory
- www.securityfocus.com/bid/11406nvdExploitPatchVendor Advisory
- www.kb.cert.org/vuls/id/687568nvdUS Government Resource
- distro.conectiva.com.br/atualizacoes/index.phpnvd
- marc.infonvd
- secunia.com/advisories/12818nvd
- securitytracker.com/idnvd
- sunsolve.sun.com/search/document.donvd
- sunsolve.sun.com/search/document.donvd
- www.ciac.org/ciac/bulletins/p-015.shtmlnvd
- www.debian.org/security/2004/dsa-567nvd
- www.kde.org/info/security/advisory-20041209-2.txtnvd
- www.mandriva.com/security/advisoriesnvd
- www.mandriva.com/security/advisoriesnvd
- www.novell.com/linux/security/advisories/2004_38_libtiff.htmlnvd
- www.redhat.com/support/errata/RHSA-2005-021.htmlnvd
- www.redhat.com/support/errata/RHSA-2005-354.htmlnvd
- www.trustix.org/errata/2004/0054/nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/17715nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100116nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9907nvd
News mentions
0No linked articles in our index yet.