Lucene search

K
centosCentOS ProjectCESA-2008:0847
HistoryOct 03, 2008 - 6:34 p.m.

libtiff security update

2008-10-0318:34:01
CentOS Project
lists.centos.org
41

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.008 Low

EPSS

Percentile

81.6%

CentOS Errata and Security Advisory CESA-2008:0847

The libtiff packages contain a library of functions for manipulating Tagged
Image File Format (TIFF) files.

Multiple uses of uninitialized values were discovered in libtiff’s
Lempel-Ziv-Welch (LZW) compression algorithm decoder. An attacker could
create a carefully crafted LZW-encoded TIFF file that would cause an
application linked with libtiff to crash or, possibly, execute arbitrary
code. (CVE-2008-2327)

Red Hat would like to thank Drew Yao of the Apple Product Security team for
reporting this issue.

Additionally, these updated packages fix the following bug:

  • the libtiff packages included manual pages for the sgi2tiff and tiffsv
    commands, which are not included in these packages. These extraneous manual
    pages were removed.

All libtiff users are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2008-October/077448.html
https://lists.centos.org/pipermail/centos-announce/2008-October/077449.html

Affected packages:
libtiff
libtiff-devel

Upstream details at:
https://access.redhat.com/errata/RHSA-2008:0847

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.008 Low

EPSS

Percentile

81.6%