Medium: libtiff

2014-09-17T22:52:00
ID ALAS-2014-307
Type amazon
Reporter Amazon
Modified 2014-09-17T22:52:00

Description

Issue Overview:

A heap-based buffer overflow and a use-after-free flaw were found in the tiff2pdf tool. An attacker could use these flaws to create a specially crafted TIFF file that would cause tiff2pdf to crash or, possibly, execute arbitrary code. (CVE-2013-1960 __, CVE-2013-4232 __)

Multiple buffer overflow flaws were found in the gif2tiff tool. An attacker could use these flaws to create a specially crafted GIF file that could cause gif2tiff to crash or, possibly, execute arbitrary code. (CVE-2013-4231 __, CVE-2013-4243 __, CVE-2013-4244 __)

A flaw was found in the way libtiff handled OJPEG-encoded TIFF images. An attacker could use this flaw to create a specially crafted TIFF file that would cause an application using libtiff to crash. (CVE-2010-2596 __)

Multiple buffer overflow flaws were found in the tiff2pdf tool. An attacker could use these flaws to create a specially crafted TIFF file that would cause tiff2pdf to crash. (CVE-2013-1961 __)

Affected Packages:

libtiff

Issue Correction:
Run yum update libtiff to update your system.

New Packages:

i686:  
    libtiff-3.9.4-10.12.amzn1.i686  
    libtiff-static-3.9.4-10.12.amzn1.i686  
    libtiff-debuginfo-3.9.4-10.12.amzn1.i686  
    libtiff-devel-3.9.4-10.12.amzn1.i686

src:  
    libtiff-3.9.4-10.12.amzn1.src

x86_64:  
    libtiff-debuginfo-3.9.4-10.12.amzn1.x86_64  
    libtiff-devel-3.9.4-10.12.amzn1.x86_64  
    libtiff-3.9.4-10.12.amzn1.x86_64  
    libtiff-static-3.9.4-10.12.amzn1.x86_64