ID

VAR-200509-0284


CVE

CVE-2005-3084


TITLE

Sony PSP firmware TIFF Denial of service vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200509-252

DESCRIPTION

Buffer overflow in the TIFF library in the Photo Viewer for Sony PSP 2.0 firmware allows remote attackers to cause a denial of service via a crafted TIFF image. PSP is prone to a denial-of-service vulnerability. The full name of PSP is PlayStation Portable, which is a new handheld game console developed by SONY. ---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Sony PSP Photo Viewer TIFF File Handling Buffer Overflow SECUNIA ADVISORY ID: SA16922 VERIFY ADVISORY: http://secunia.com/advisories/16922/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: Sony PSP (PlayStation Portable) http://secunia.com/product/5764/ DESCRIPTION: A vulnerability has been reported in Sony PSP, which potentially can be exploited by malicious people to compromise a user's system. This may be related to: SA15320 The vulnerability has been reported in firmware version 2.0. Other versions may also be affected. SOLUTION: Do not open untrusted TIFF files. ORIGINAL ADVISORY: http://pspupdates.qj.net/2005/09/20-overflow-found-and-working.html OTHER REFERENCES: SA15320 http://secunia.com/advisories/15320/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.35

sources: NVD: CVE-2005-3084 // BID: 89283 // VULHUB: VHN-14293 // PACKETSTORM: 40273

AFFECTED PRODUCTS

vendor:sonymodel:playstation portablescope:eqversion:2.0_firmware

Trust: 1.6

sources: CNNVD: CNNVD-200509-252 // NVD: CVE-2005-3084

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-3084
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200509-252
value: MEDIUM

Trust: 0.6

VULHUB: VHN-14293
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2005-3084
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-14293
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-14293 // CNNVD: CNNVD-200509-252 // NVD: CVE-2005-3084

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-3084

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200509-252

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200509-252

EXTERNAL IDS

db:NVDid:CVE-2005-3084

Trust: 2.0

db:SECUNIAid:16922

Trust: 1.8

db:CNNVDid:CNNVD-200509-252

Trust: 0.7

db:BIDid:89283

Trust: 0.4

db:VULHUBid:VHN-14293

Trust: 0.1

db:PACKETSTORMid:40273

Trust: 0.1

sources: VULHUB: VHN-14293 // BID: 89283 // PACKETSTORM: 40273 // CNNVD: CNNVD-200509-252 // NVD: CVE-2005-3084

REFERENCES

url:http://pspupdates.qj.net/2005/09/20-overflow-found-and-working.html

Trust: 2.1

url:http://secunia.com/advisories/16922

Trust: 1.7

url:http://secunia.com/advisories/16922/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/secunia_vacancies/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/15320/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/5764/

Trust: 0.1

sources: VULHUB: VHN-14293 // BID: 89283 // PACKETSTORM: 40273 // CNNVD: CNNVD-200509-252 // NVD: CVE-2005-3084

CREDITS

Unknown

Trust: 0.3

sources: BID: 89283

SOURCES

db:VULHUBid:VHN-14293
db:BIDid:89283
db:PACKETSTORMid:40273
db:CNNVDid:CNNVD-200509-252
db:NVDid:CVE-2005-3084

LAST UPDATE DATE

2024-08-14T15:36:00.514000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-14293date:2008-09-05T00:00:00
db:BIDid:89283date:2005-09-27T00:00:00
db:CNNVDid:CNNVD-200509-252date:2005-10-20T00:00:00
db:NVDid:CVE-2005-3084date:2008-09-05T20:53:25.357

SOURCES RELEASE DATE

db:VULHUBid:VHN-14293date:2005-09-27T00:00:00
db:BIDid:89283date:2005-09-27T00:00:00
db:PACKETSTORMid:40273date:2005-09-27T00:49:09
db:CNNVDid:CNNVD-200509-252date:2005-09-27T00:00:00
db:NVDid:CVE-2005-3084date:2005-09-27T20:03:00