The remote host is affected by the vulnerability described in GLSA-200501-06 (tiff: New overflows in image decoding)
infamous41md found a potential integer overflow in the directory entry count routines of the TIFF library (CAN-2004-1308). Dmitry V.
Levin found another similar issue in the tiffdump utility (CAN-2004-1183).
Impact :
A remote attacker could entice a user to view a carefully crafted TIFF image file, which would potentially lead to execution of arbitrary code with the rights of the user viewing the image. This affects any program that makes use of the TIFF library, including many web browsers or mail readers.
Workaround :
There is no known workaround at this time.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Gentoo Linux Security Advisory GLSA 200501-06.
#
# The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.
# and licensed under the Creative Commons - Attribution / Share Alike
# license. See http://creativecommons.org/licenses/by-sa/3.0/
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(16397);
script_version("1.21");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");
script_cve_id("CVE-2004-1183", "CVE-2004-1308");
script_xref(name:"GLSA", value:"200501-06");
script_name(english:"GLSA-200501-06 : tiff: New overflows in image decoding");
script_summary(english:"Checks for updated package(s) in /var/db/pkg");
script_set_attribute(
attribute:"synopsis",
value:
"The remote Gentoo host is missing one or more security-related
patches."
);
script_set_attribute(
attribute:"description",
value:
"The remote host is affected by the vulnerability described in GLSA-200501-06
(tiff: New overflows in image decoding)
infamous41md found a potential integer overflow in the directory
entry count routines of the TIFF library (CAN-2004-1308). Dmitry V.
Levin found another similar issue in the tiffdump utility
(CAN-2004-1183).
Impact :
A remote attacker could entice a user to view a carefully crafted
TIFF image file, which would potentially lead to execution of arbitrary
code with the rights of the user viewing the image. This affects any
program that makes use of the TIFF library, including many web browsers
or mail readers.
Workaround :
There is no known workaround at this time."
);
# http://www.idefense.com/application/poi/display?id=174&type=vulnerabilities
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?4583297c"
);
script_set_attribute(
attribute:"see_also",
value:"https://security.gentoo.org/glsa/200501-06"
);
script_set_attribute(
attribute:"solution",
value:
"All TIFF library users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=media-libs/tiff-3.7.1-r1'"
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:tiff");
script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");
script_set_attribute(attribute:"patch_publication_date", value:"2005/01/05");
script_set_attribute(attribute:"plugin_publication_date", value:"2005/02/14");
script_set_attribute(attribute:"vuln_publication_date", value:"2005/01/06");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.");
script_family(english:"Gentoo Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("qpkg.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
flag = 0;
if (qpkg_check(package:"media-libs/tiff", unaffected:make_list("ge 3.7.1-r1"), vulnerable:make_list("lt 3.7.1-r1"))) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = qpkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "tiff");
}