Lucene search

K
centosCentOS ProjectCESA-2010:0519
HistoryJul 14, 2010 - 10:28 p.m.

libtiff security update

2010-07-1422:28:07
CentOS Project
lists.centos.org
41

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.045 Low

EPSS

Percentile

92.5%

CentOS Errata and Security Advisory CESA-2010:0519

The libtiff packages contain a library of functions for manipulating Tagged
Image File Format (TIFF) files.

Multiple integer overflow flaws, leading to a buffer overflow, were
discovered in libtiff. An attacker could use these flaws to create a
specially-crafted TIFF file that, when opened, would cause an application
linked against libtiff to crash or, possibly, execute arbitrary code.
(CVE-2010-1411)

Multiple input validation flaws were discovered in libtiff. An attacker
could use these flaws to create a specially-crafted TIFF file that, when
opened, would cause an application linked against libtiff to crash.
(CVE-2010-2481, CVE-2010-2483, CVE-2010-2595, CVE-2010-2597)

Red Hat would like to thank Apple Product Security for responsibly
reporting the CVE-2010-1411 flaw, who credit Kevin Finisterre of
digitalmunition.com for the discovery of the issue.

All libtiff users are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues. All running
applications linked against libtiff must be restarted for this update to
take effect.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2010-July/078927.html
https://lists.centos.org/pipermail/centos-announce/2010-July/078928.html
https://lists.centos.org/pipermail/centos-announce/2010-July/078969.html
https://lists.centos.org/pipermail/centos-announce/2010-July/078970.html

Affected packages:
libtiff
libtiff-devel

Upstream details at:
https://access.redhat.com/errata/RHSA-2010:0519

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.045 Low

EPSS

Percentile

92.5%