|
Family: Debian Local Security Checks --> Category: infos
[DSA1137] DSA-1137-1 tiff Vulnerability Scan
Vulnerability Scan Summary DSA-1137-1 tiff
Detailed Explanation for this Vulnerability Test
Tavis Ormandy of the Google Security Team discovered several problems
in the TIFF library. The Common Vulnerabilities and Exposures project
identifies the following issues:
Several stack-buffer overflows have been discovered.
A heap overflow vulnerability in the JPEG decoder may overrun a
buffer with more data than expected.
A heap overflow vulnerability in the PixarLog decoder may allow an
attacker to execute arbitrary code.
A heap overflow vulnerability has been discovered in the NeXT RLE
decoder.
An loop was discovered where a 16bit unsigned short was used to
iterate over a 32bit unsigned value so that the loop would never
terminate and continue forever.
Multiple unchecked arithmetic operations were uncovered, including
a number of the range checking operations designed to ensure the
offsets specified in TIFF directories are legitimate.
A flaw was also uncovered in libtiffs custom tag support which may
result in abnormal behaviour, crashes, or potentially arbitrary
code execution.
For the stable distribution (sarge) these problems have been fixed in
version 3.7.2-7.
For the unstable distribution (sid) these problems have been fixed in
version 3.8.2-6.
We recommend that you upgrade your libtiff packages.
Solution : http://www.debian.org/security/2006/dsa-1137
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|