Search This Blog

Wednesday, September 26, 2012

[SECURITY] [DSA 2552-1] tiff security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2552-1 security@debian.org
http://www.debian.org/security/ Luciano Bello
September 26, 2012 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : tiff
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE ID : CVE-2010-2482 CVE-2010-2595 CVE-2010-2597 CVE-2010-2630
CVE-2010-4665 CVE-2012-2113 CVE-2012-3401
Debian Bug : 678140

Several vulnerabilities were discovered in Tiff, a library set and tools
to support the Tag Image File Format (TIFF), allowing denial of service and
potential privilege escalation.

These vulnerabilities can be exploited via a specially crafted TIFF image.

CVE-2012-2113
The tiff2pdf utility has an integer overflow error when parsing images.

CVE-2012-3401
Huzaifa Sidhpurwala discovered heap-based buffer overflow in the
t2p_read_tiff_init() function.

CVE-2010-2482
An invalid td_stripbytecount field is not properly handle and can trigger a
NULL pointer dereference.

CVE-2010-2595
An array index error, related to "downsampled OJPEG input." in the
TIFFYCbCrtoRGB function causes an unexpected crash.

CVE-2010-2597
Also related to "downsampled OJPEG input", the TIFFVStripSize function crash
unexpectly.

CVE-2010-2630
The TIFFReadDirectory function does not properly validate the data types of
codec-specific tags that have an out-of-order position in a TIFF file.

CVE-2010-4665
The tiffdump utility has an integer overflow in the ReadDirectory function.

For the stable distribution (squeeze), these problems have been fixed in
version 3.9.4-5+squeeze5.

For the testing distribution (wheezy), these problems have been fixed in
version 4.0.2-2.

For the unstable distribution (sid), these problems have been fixed in
version 4.0.2-2.

We recommend that you upgrade your tiff packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAlBjdswACgkQQWTRs4lLtHliFwCfSSHP0HDK4SqjmYYBZMEIKjnt
WB0An3bjQgsJoFMjILJMzqOSLWuel4Dc
=xFhO
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: http://lists.debian.org/20120926215526.91A491501E1@nube.usla.org.ar

2 comments:

sophia said...

You have actually provided the best blogs that are easy to understand..
Aluminium Shop Fronts Birmingham
Aluminium Shop Fronts
Roller Shutters yorkshire

Unknown said...
This comment has been removed by the author.