Two tiff issues: CVE-2012-2113 / CVE-2012-2088
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
tiff (Debian) |
Fix Released
|
Unknown
|
|||
tiff (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
From secunia security advisory at URL [1]:
Description
A vulnerability has been reported in LibTIFF, which can be exploited by malicious people to compromise an application using the library.
The vulnerability is caused due to an integer overflow error in the "tiff2pdf" utility when parsing images and can be exploited to cause a buffer overflow via a specially crafted TIFF image.
Successful exploitation may allow execution of arbitrary code, but requires tricking a user into converting a malicious image.
The vulnerability is reported in versions prior to 4.0.2.
Solution
Update to version 4.0.2.
[1] https:/
Two new tiff issues have been repored to Red Hat bugzilla, please see these bugs for details:
https:/
https:/
visibility: | private → public |
Changed in tiff (Debian): | |
status: | Unknown → New |
security vulnerability: | no → yes |
visibility: | public → private |
visibility: | private → public |
Changed in tiff (Ubuntu): | |
status: | New → Triaged |
Changed in tiff (Debian): | |
status: | New → Fix Released |
This bug was fixed in the package tiff - 3.9.5-2ubuntu2
---------------
tiff (3.9.5-2ubuntu2) quantal; urgency=low
* SECURITY UPDATE: possible arbitrary code execution via buffer overflow patches/ CVE-2012- 2088.patch: check for overflows in tif_strip. c and libtiff/tif_tile.c. patches/ CVE-2012- 2113.patch: check for overflows in tiff2pdf. c.
due to type-conversion flaw (LP: #1016324)
- debian/
libtiff/
- CVE-2012-2088
* SECURITY UPDATE: possible arbitrary code execution via integer
overflows in tiff2pdf (LP: #1016324)
- debian/
tools/
- CVE-2012-2113
-- Marc Deslauriers <email address hidden> Thu, 05 Jul 2012 09:13:37 -0400