|
Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200608-07] libTIFF: Multiple vulnerabilities Vulnerability Scan
Vulnerability Scan Summary libTIFF: Multiple vulnerabilities
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200608-07
(libTIFF: Multiple vulnerabilities)
Tavis Ormandy of the Google Security Team discovered several heap and
stack buffer overflows and other flaws in libTIFF. The affected parts
include the TIFFFetchShortPair(), TIFFScanLineSize() and
EstimateStripByteCounts() functions, and the PixarLog and NeXT RLE
decoders.
Impact
A remote attacker could entice a user to open a specially crafted TIFF
file, resulting in the possible execution of arbitrary code.
Workaround
There is no known workaround at this time.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3459
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3460
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3461
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3462
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3463
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3464
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3465
Solution:
All libTIFF users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/tiff-3.8.2-r2"
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.
|