Lucene search

K
centosCentOS ProjectCESA-2012:0468
HistoryApr 10, 2012 - 9:10 p.m.

libtiff security update

2012-04-1021:10:32
CentOS Project
lists.centos.org
51

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.092 Low

EPSS

Percentile

94.6%

CentOS Errata and Security Advisory CESA-2012:0468

The libtiff packages contain a library of functions for manipulating Tagged
Image File Format (TIFF) files.

Two integer overflow flaws, leading to heap-based buffer overflows, were
found in the way libtiff attempted to allocate space for a tile in a TIFF
image file. An attacker could use these flaws to create a specially-crafted
TIFF file that, when opened, would cause an application linked against
libtiff to crash or, possibly, execute arbitrary code. (CVE-2012-1173)

All libtiff users should upgrade to these updated packages, which contain a
backported patch to resolve these issues. All running applications linked
against libtiff must be restarted for this update to take effect.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2012-April/080722.html
https://lists.centos.org/pipermail/centos-announce/2012-April/080726.html

Affected packages:
libtiff
libtiff-devel
libtiff-static

Upstream details at:
https://access.redhat.com/errata/RHSA-2012:0468

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.092 Low

EPSS

Percentile

94.6%