Lucene search

K
gentooGentoo FoundationGLSA-200908-03
HistoryAug 07, 2009 - 12:00 a.m.

libTIFF: User-assisted execution of arbitrary code

2009-08-0700:00:00
Gentoo Foundation
security.gentoo.org
28

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

AI Score

8.7

Confidence

High

EPSS

0.006

Percentile

78.4%

Background

libTIFF provides support for reading and manipulating TIFF (Tagged Image File Format) images.

Description

Two vulnerabilities have been reported in libTIFF:

  • wololo reported a buffer underflow in the LZWDecodeCompat() function (CVE-2009-2285).
  • Tielei Wang of ICST-ERCIS, Peking University reported two integer overflows leading to heap-based buffer overflows in the tiff2rgba and rgb2ycbcr tools (CVE-2009-2347).

Impact

A remote attacker could entice a user to open a specially crafted TIFF file with an application making use of libTIFF or the tiff2rgba and rgb2ycbcr tools, possibly resulting in the execution of arbitrary code with the privileges of the user running the application.

Workaround

There is no known workaround at this time.

Resolution

All libTIFF users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-libs/tiff-3.8.2-r8"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-libs/tiff< 3.8.2-r8UNKNOWN

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

AI Score

8.7

Confidence

High

EPSS

0.006

Percentile

78.4%