Joined: 12 May 2004
|Posted: Sun Jul 09, 2006 6:26 pm Post subject: [ GLSA 200607-03 ] libTIFF: Multiple buffer overflows
|Gentoo Linux Security Advisory
Title: libTIFF: Multiple buffer overflows (GLSA 200607-03)
Date: July 09, 2006
libTIFF contains buffer overflows that could result in arbitrary code execution.
libTIFF provides support for reading and manipulating TIFF images.
Vulnerable: < 3.8.2-r1
Unaffected: >= 3.8.2-r1
Architectures: All supported architectures
A buffer overflow has been found in the t2p_write_pdf_string function in tiff2pdf, which can been triggered with a TIFF file containing a DocumentName tag with UTF-8 characters. An additional buffer overflow has been found in the handling of the parameters in tiffsplit.
A remote attacker could entice a user to load a specially crafted TIFF file, resulting in the possible execution of arbitrary code.
There is no known workaround at this time.
All libTIFF users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/tiff-3.8.2-r1"