Lucene search

K
gentooGentoo FoundationGLSA-201209-02
HistorySep 23, 2012 - 12:00 a.m.

libTIFF: Multiple vulnerabilities

2012-09-2300:00:00
Gentoo Foundation
security.gentoo.org
19

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.268 Low

EPSS

Percentile

96.7%

Background

libTIFF provides support for reading and manipulating TIFF (Tagged Image File Format) images.

Description

Multiple vulnerabilities have been discovered in libTIFF. Please review the CVE identifiers referenced below for details.

Impact

A remote attacker could entice a user to open a specially crafted TIFF file with an application making use of libTIFF, possibly resulting in execution of arbitrary code with the privileges of the user running the application or a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All libTIFF 4.0 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-libs/tiff-4.0.2-r1"

All libTIFF 3.9 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-libs/tiff-3.9.5-r2"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-libs/tiff< 4.0.2-r1UNKNOWN

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.268 Low

EPSS

Percentile

96.7%