Description
Multiple buffer underflows in the (1) LZWDecode, (2) LZWDecodeCompat, and (3) LZWDecodeVector functions in tif_lzw.c in the LZW decoder in LibTIFF 3.8.2 and earlier allow context-dependent attackers to execute arbitrary code via a crafted TIFF file, related to improper handling of the CODE_CLEAR code.
Published: 2008-08-27
Score: 6.8 Medium
EPSS: 1.5% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-1632-1 New tiff packages fix arbitrary code execution
EUVD EUVD EUVD-2008-2323 Multiple buffer underflows in the (1) LZWDecode, (2) LZWDecodeCompat, and (3) LZWDecodeVector functions in tif_lzw.c in the LZW decoder in LibTIFF 3.8.2 and earlier allow context-dependent attackers to execute arbitrary code via a crafted TIFF file, related to improper handling of the CODE_CLEAR code.
Ubuntu USN Ubuntu USN USN-639-1 tiff vulnerability
References
Link Providers
http://bugs.gentoo.org/show_bug.cgi?id=234080 cve-icon cve-icon
http://lists.apple.com/archives/security-announce//2008/Nov/msg00001.html cve-icon cve-icon
http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html cve-icon cve-icon
http://lists.apple.com/archives/security-announce/2008/Nov/msg00002.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html cve-icon cve-icon
http://secunia.com/advisories/31610 cve-icon cve-icon
http://secunia.com/advisories/31623 cve-icon cve-icon
http://secunia.com/advisories/31668 cve-icon cve-icon
http://secunia.com/advisories/31670 cve-icon cve-icon
http://secunia.com/advisories/31698 cve-icon cve-icon
http://secunia.com/advisories/31838 cve-icon cve-icon
http://secunia.com/advisories/31882 cve-icon cve-icon
http://secunia.com/advisories/31982 cve-icon cve-icon
http://secunia.com/advisories/32706 cve-icon cve-icon
http://secunia.com/advisories/32756 cve-icon cve-icon
http://security-tracker.debian.net/tracker/CVE-2008-2327 cve-icon cve-icon
http://security-tracker.debian.net/tracker/DSA-1632-1 cve-icon cve-icon
http://security-tracker.debian.net/tracker/DTSA-160-1 cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-200809-07.xml cve-icon cve-icon
http://sunsolve.sun.com/search/document.do?assetkey=1-26-265030-1 cve-icon cve-icon
http://support.apple.com/kb/HT3276 cve-icon cve-icon
http://support.apple.com/kb/HT3298 cve-icon cve-icon
http://support.apple.com/kb/HT3318 cve-icon cve-icon
http://www.debian.org/security/2008/dsa-1632 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2008:184 cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0847.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0848.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0863.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/496033/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/497962/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/30832 cve-icon cve-icon
http://www.securitytracker.com/id?1020750 cve-icon cve-icon
http://www.ubuntu.com/usn/usn-639-1 cve-icon cve-icon
http://www.us-cert.gov/cas/techalerts/TA08-260A.html cve-icon cve-icon
http://www.vmware.com/security/advisories/VMSA-2008-0017.html cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/2438 cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/2584 cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/2776 cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/2971 cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/3107 cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/3232 cve-icon cve-icon
http://www.vupen.com/english/advisories/2009/2143 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=458674 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2008-2327 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11489 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5514 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2008-2327 cve-icon
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00102.html cve-icon cve-icon
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00121.html cve-icon cve-icon
History

No history.

Subscriptions

Libtiff Libtiff
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T08:58:01.844Z

Reserved: 2008-05-18T00:00:00.000Z

Link: CVE-2008-2327

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2008-08-27T20:41:00.000

Modified: 2026-04-23T00:35:47.467

Link: CVE-2008-2327

cve-icon Redhat

Severity : Important

Publid Date: 2008-08-26T00:00:00Z

Links: CVE-2008-2327 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses