USN-3212-4: LibTIFF vulnerabilities

USN-3212-4: LibTIFF vulnerabilities

Ubuntu Security Notice USN-3212-4

7th August, 2017

tiff vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 12.04 LTS

Summary

LibTIFF could be made to crash or run programs as your login if it
opened a specially crafted file.

Software description

  • tiff
    – Tag Image File Format (TIFF) library

Details

USN-3212-1 fixed several issues in LibTIFF. This update
provides a subset of corresponding update for Ubuntu 12.04 ESM.

Mei Wang discovered a multiple integer overflows in LibTIFF which
allows remote attackers to cause a denial of service (crash) or
execute arbitrary code via a crafted TIFF image, which triggers
an out-of-bounds write. (CVE-2016-3945)

It was discovered that LibTIFF is vulnerable to a heap buffer
overflow in the resulting in DoS or code execution
via a crafted BitsPerSample value. (CVE-2017-5225)

Original advisory details:

It was discovered that LibTIFF incorrectly handled certain malformed
images. If a user or automated system were tricked into opening a specially
crafted image, a remote attacker could crash the application, leading to a
denial of service, or possibly execute arbitrary code with user privileges.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 12.04 LTS:
libtiff4

3.9.5-2ubuntu1.11
libtiff-tools

3.9.5-2ubuntu1.11

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2016-3945,

CVE-2017-5225

Source: USN-3212-4: LibTIFF vulnerabilities

About KENNETH 19688 Articles
지락문화예술공작단

Be the first to comment

Leave a Reply

Your email address will not be published.


*


이 사이트는 스팸을 줄이는 아키스밋을 사용합니다. 댓글이 어떻게 처리되는지 알아보십시오.