Lucene search

K
gentooGentoo FoundationGLSA-200607-03
HistoryJul 09, 2006 - 12:00 a.m.

libTIFF: Multiple buffer overflows

2006-07-0900:00:00
Gentoo Foundation
security.gentoo.org
13

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.029 Low

EPSS

Percentile

90.7%

Background

libTIFF provides support for reading and manipulating TIFF images.

Description

A buffer overflow has been found in the t2p_write_pdf_string function in tiff2pdf, which can been triggered with a TIFF file containing a DocumentName tag with UTF-8 characters. An additional buffer overflow has been found in the handling of the parameters in tiffsplit.

Impact

A remote attacker could entice a user to load a specially crafted TIFF file, resulting in the possible execution of arbitrary code.

Workaround

There is no known workaround at this time.

Resolution

All libTIFF users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-libs/tiff-3.8.2-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-libs/tiff< 3.8.2-r1UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.029 Low

EPSS

Percentile

90.7%