Lucene search

K
gentooGentoo FoundationGLSA-201402-21
HistoryFeb 21, 2014 - 12:00 a.m.

libTIFF: Multiple vulnerabilities

2014-02-2100:00:00
Gentoo Foundation
security.gentoo.org
15

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.049 Low

EPSS

Percentile

92.7%

Background

libTIFF provides support for reading and manipulating TIFF (Tagged Image File Format) images.

Description

Multiple vulnerabilities have been discovered in libTIFF. Please review the CVE identifiers referenced below for details.

Impact

A remote attacker could entice a user to open a specially crafted TIFF file with an application making use of libTIFF, possibly resulting in execution of arbitrary code with the privileges of the user running the application or a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All libTIFF 4.* users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-libs/tiff-4.0.3-r6"

All libTIFF 3.* users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-libs/tiff-3.9.7-r1:3"

Packages which depend on this library may need to be recompiled. Tools such as revdep-rebuild may assist in identifying these packages.

OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-libs/tiff< 4.0.3-r6UNKNOWN

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.049 Low

EPSS

Percentile

92.7%