Lucene search

K
openvasCopyright (C) 2011 Greenbone AGOPENVAS:1361412562310840613
HistoryMar 24, 2011 - 12:00 a.m.

Ubuntu: Security Advisory (USN-1085-2)

2011-03-2400:00:00
Copyright (C) 2011 Greenbone AG
plugins.openvas.org
13

7.3 High

AI Score

Confidence

High

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.111 Low

EPSS

Percentile

95.1%

The remote host is missing an update for the

# SPDX-FileCopyrightText: 2011 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.840613");
  script_cve_id("CVE-2010-2482", "CVE-2010-2595", "CVE-2010-2597", "CVE-2010-2598", "CVE-2010-2630", "CVE-2010-3087", "CVE-2011-0191");
  script_tag(name:"creation_date", value:"2011-03-24 13:29:52 +0000 (Thu, 24 Mar 2011)");
  script_version("2024-02-02T05:06:04+0000");
  script_tag(name:"last_modification", value:"2024-02-02 05:06:04 +0000 (Fri, 02 Feb 2024)");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");

  script_name("Ubuntu: Security Advisory (USN-1085-2)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2011 Greenbone AG");
  script_family("Ubuntu Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/ubuntu_linux", "ssh/login/packages", re:"ssh/login/release=UBUNTU(10\.04\ LTS|10\.10|6\.06\ LTS|8\.04\ LTS|9\.10)");

  script_xref(name:"Advisory-ID", value:"USN-1085-2");
  script_xref(name:"URL", value:"https://ubuntu.com/security/notices/USN-1085-2");
  script_xref(name:"URL", value:"https://launchpad.net/bugs/731540");

  script_tag(name:"summary", value:"The remote host is missing an update for the 'tiff' package(s) announced via the USN-1085-2 advisory.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");

  script_tag(name:"insight", value:"USN-1085-1 fixed vulnerabilities in the system TIFF library. The upstream
fixes were incomplete and created problems for certain CCITTFAX4 files.
This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

 Sauli Pahlman discovered that the TIFF library incorrectly handled invalid
 td_stripbytecount fields. If a user or automated system were tricked into
 opening a specially crafted TIFF image, a remote attacker could crash the
 application, leading to a denial of service. This issue only affected
 Ubuntu 10.04 LTS and 10.10. (CVE-2010-2482)

 Sauli Pahlman discovered that the TIFF library incorrectly handled TIFF
 files with an invalid combination of SamplesPerPixel and Photometric
 values. If a user or automated system were tricked into opening a specially
 crafted TIFF image, a remote attacker could crash the application, leading
 to a denial of service. This issue only affected Ubuntu 10.10.
 (CVE-2010-2482)

 Nicolae Ghimbovschi discovered that the TIFF library incorrectly handled
 invalid ReferenceBlackWhite values. If a user or automated system were
 tricked into opening a specially crafted TIFF image, a remote attacker
 could crash the application, leading to a denial of service.
 (CVE-2010-2595)

 Sauli Pahlman discovered that the TIFF library incorrectly handled certain
 default fields. If a user or automated system were tricked into opening a
 specially crafted TIFF image, a remote attacker could crash the
 application, leading to a denial of service. (CVE-2010-2597, CVE-2010-2598)

 It was discovered that the TIFF library incorrectly validated certain
 data types. If a user or automated system were tricked into opening a
 specially crafted TIFF image, a remote attacker could crash the
 application, leading to a denial of service. (CVE-2010-2630)

 It was discovered that the TIFF library incorrectly handled downsampled
 JPEG data. If a user or automated system were tricked into opening a
 specially crafted TIFF image, a remote attacker could execute arbitrary
 code with user privileges, or crash the application, leading to a denial of
 service. This issue only affected Ubuntu 10.04 LTS and 10.10.
 (CVE-2010-3087)

 It was discovered that the TIFF library incorrectly handled certain JPEG
 data. If a user or automated system were tricked into opening a specially
 crafted TIFF image, a remote attacker could execute arbitrary code with
 user privileges, or crash the application, leading to a denial of service.
 This issue only affected Ubuntu 6.06 LTS, 8.04 LTS and 9.10.
 (CVE-2011-0191)

 It was discovered that the TIFF library incorrectly handled certain TIFF
 FAX images. If a user or automated system were tricked into opening a
 specially crafted TIFF FAX image, a remote attacker could execute arbitrary
 code with user privileges, or crash the application, leading to a denial of
 service. (CVE-2011-0191)");

  script_tag(name:"affected", value:"'tiff' package(s) on Ubuntu 6.06, Ubuntu 8.04, Ubuntu 9.10, Ubuntu 10.04, Ubuntu 10.10.");

  script_tag(name:"solution", value:"Please install the updated package(s).");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"package");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-deb.inc");

release = dpkg_get_ssh_release();
if(!release)
  exit(0);

res = "";
report = "";

if(release == "UBUNTU10.04 LTS") {

  if(!isnull(res = isdpkgvuln(pkg:"libtiff4", ver:"3.9.2-2ubuntu0.5", rls:"UBUNTU10.04 LTS"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

if(release == "UBUNTU10.10") {

  if(!isnull(res = isdpkgvuln(pkg:"libtiff4", ver:"3.9.4-2ubuntu0.2", rls:"UBUNTU10.10"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

if(release == "UBUNTU6.06 LTS") {

  if(!isnull(res = isdpkgvuln(pkg:"libtiff4", ver:"3.7.4-1ubuntu3.10", rls:"UBUNTU6.06 LTS"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

if(release == "UBUNTU8.04 LTS") {

  if(!isnull(res = isdpkgvuln(pkg:"libtiff4", ver:"3.8.2-7ubuntu3.8", rls:"UBUNTU8.04 LTS"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

if(release == "UBUNTU9.10") {

  if(!isnull(res = isdpkgvuln(pkg:"libtiff4", ver:"3.8.2-13ubuntu0.5", rls:"UBUNTU9.10"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

exit(0);

7.3 High

AI Score

Confidence

High

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.111 Low

EPSS

Percentile

95.1%