CVE-2008-2327

N/A Unknown
Published: August 27, 2008 Modified: April 23, 2026
View on NVD

Description

Multiple buffer underflows in the (1) LZWDecode, (2) LZWDecodeCompat, and (3) LZWDecodeVector functions in tif_lzw.c in the LZW decoder in LibTIFF 3.8.2 and earlier allow context-dependent attackers to execute arbitrary code via a crafted TIFF file, related to improper handling of the CODE_CLEAR code.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/31610
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/31623
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/31668
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/31670
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/31698
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/31838
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/31882
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/32756
Source: cve@mitre.org
Vendor Advisory
http://www.us-cert.gov/cas/techalerts/TA08-260A.html
Source: cve@mitre.org
US Government Resource
http://www.vupen.com/english/advisories/2008/2438
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2008/2584
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2008/2776
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2008/2971
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2008/3107
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2009/2143
Source: cve@mitre.org
Vendor Advisory
http://bugs.gentoo.org/show_bug.cgi?id=234080
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/31610
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/31623
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/31668
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/31670
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/31698
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/31838
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/31882
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/31982
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/32706
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/32756
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://security-tracker.debian.net/tracker/CVE-2008-2327
Source: af854a3a-2127-422b-91ae-364da2661108
http://security-tracker.debian.net/tracker/DSA-1632-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://security-tracker.debian.net/tracker/DTSA-160-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-200809-07.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-26-265030-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.apple.com/kb/HT3276
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.apple.com/kb/HT3298
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.apple.com/kb/HT3318
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2008/dsa-1632
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.mandriva.com/security/advisories?name=MDVSA-2008:184
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2008-0847.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2008-0848.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2008-0863.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/archive/1/496033/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/497962/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/30832
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1020750
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-639-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.us-cert.gov/cas/techalerts/TA08-260A.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.vmware.com/security/advisories/VMSA-2008-0017.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/2438
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2008/2584
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2008/2776
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2008/2971
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2008/3107
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2008/3232
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/2143
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=458674
Source: af854a3a-2127-422b-91ae-364da2661108

94 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

libtiff