{"id":"UBUNTU-CVE-2013-4231","details":"Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size.","modified":"2026-02-04T03:48:55.983522Z","published":"2014-01-19T00:00:00Z","withdrawn":"2025-07-18T16:42:54Z","related":["USN-2205-1"],"upstream":["CVE-2013-4231"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2013-4231"},{"type":"REPORT","url":"http://www.asmail.be/msg0055359936.html"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2205-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2013-4231"}],"affected":[{"package":{"name":"tiff","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/tiff@4.0.3-5ubuntu1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.0.3-5ubuntu1"}]}],"versions":["4.0.2-4ubuntu3"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.0.3-5ubuntu1","binary_name":"libtiff-doc"},{"binary_version":"4.0.3-5ubuntu1","binary_name":"libtiff-opengl"},{"binary_version":"4.0.3-5ubuntu1","binary_name":"libtiff-tools"},{"binary_version":"4.0.3-5ubuntu1","binary_name":"libtiff5"},{"binary_version":"4.0.3-5ubuntu1","binary_name":"libtiff5-alt-dev"},{"binary_version":"4.0.3-5ubuntu1","binary_name":"libtiff5-dev"},{"binary_version":"4.0.3-5ubuntu1","binary_name":"libtiffxx5"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2013/UBUNTU-CVE-2013-4231.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"low"}]}