Linux Security
    Linux Security
    Linux Security

    Debian: New tiff packages fix several vulnerabilities

    Date 02 Aug 2006
    Posted By LinuxSecurity Advisories
    Updated package.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 1137-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    August 2nd, 2006              
    - --------------------------------------------------------------------------
    Package        : tiff
    Vulnerability  : several
    Problem type   : local (remote)
    Debian-specific: no
    CVE IDs        : CVE-2006-3459 CVE-2006-3460 CVE-2006-3461 CVE-2006-3462
                     CVE-2006-3463 CVE-2006-3464 CVE-2006-3465
    Tavis Ormandy of the Google Security Team discovered several problems
    in the TIFF library.  The Common Vulnerabilities and Exposures project
    identifies the following issues:
        Several stack-buffer overflows have been discovered.
        A heap overflow vulnerability in the JPEG decoder may overrun a
        buffer with more data than expected.
        A heap overflow vulnerability in the PixarLog decoder may allow an
        attacker to execute arbitrary code.
        A heap overflow vulnerability has been discovered in the NeXT RLE
        An loop was discovered where a 16bit unsigned short was used to
        iterate over a 32bit unsigned value so that the loop would never
        terminate and continue forever.
        Multiple unchecked arithmetic operations were uncovered, including
        a number of the range checking operations designed to ensure the
        offsets specified in TIFF directories are legitimate.
        A flaw was also uncovered in libtiffs custom tag support which may
        result in abnormal behaviour, crashes, or potentially arbitrary
        code execution.
    For the stable distribution (sarge) these problems have been fixed in
    version 3.7.2-7.
    For the unstable distribution (sid) these problems have been fixed in
    version 3.8.2-6.
    We recommend that you upgrade your libtiff packages.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given at the end of this advisory:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      736 ce0ffb8cdd1130153deaefa8b59abe81
          Size/MD5 checksum:    17174 ff485016221ededfc8ce649538322211
          Size/MD5 checksum:  1252995 221679f6d5c15670b3c242cbfff79a00
      Alpha architecture:
          Size/MD5 checksum:    47112 a4f7feea087ba03a84f745ee79a7ff56
          Size/MD5 checksum:   243840 f7abb618f36082be959f6e3c9a99cf8f
          Size/MD5 checksum:   479064 c137c6857ed320928f182115fbd94b21
          Size/MD5 checksum:   311206 c202ef6404c23ea7dc999c03e586c07f
          Size/MD5 checksum:    41228 53c5979e8c2556e5a19607c19e862368
      AMD64 architecture:
          Size/MD5 checksum:    46036 bc6d0c7db57a1dcae4b8dd65b4640243
          Size/MD5 checksum:   218060 d09ef1de8b31f074d2f05c7522858cf1
          Size/MD5 checksum:   459964 8be097d74ac788d87a8358b8f9e68d79
          Size/MD5 checksum:   267872 cc0a4241cd53de29b561286fcd91cf2c
          Size/MD5 checksum:    40804 136bc49ad0c85dc6fa9f61242cf97c05
      ARM architecture:
          Size/MD5 checksum:    45536 0253b94c6f94a33c9942568f9093fedd
          Size/MD5 checksum:   208630 45e2ef6af43bfbddb4aee00b659d287a
          Size/MD5 checksum:   454194 354e1b4560b4a407c4b4faf5d2555b20
          Size/MD5 checksum:   266148 f535b441d81a7786815d954c843b9c81
          Size/MD5 checksum:    40304 fcd0980c8fc2dedaa8a6380e0d4736bd
      Intel IA-32 architecture:
          Size/MD5 checksum:    45400 e51d8f157a2ef94cbc4e893f756be29a
          Size/MD5 checksum:   206412 69a3c66b2c9733653e6e7f667ab260b3
          Size/MD5 checksum:   453078 267f8f361f0dc87f40c8bc37d4785f57
          Size/MD5 checksum:   252412 5720af1515d6c9ce04f0e7abea045955
          Size/MD5 checksum:    40850 18710ba8ae073bd5a6e7b3c299cbae23
      Intel IA-64 architecture:
          Size/MD5 checksum:    48512 c57280d747f62859c4477a0f1dcbcfef
          Size/MD5 checksum:   269156 277ad4a79cd2148991134c6ed8c029fe
          Size/MD5 checksum:   511782 4b64fd28c917e7e2e158c7244cfc892d
          Size/MD5 checksum:   331790 614a46318d671800caab21e26df9c1bf
          Size/MD5 checksum:    42450 af80a3234e174d9f15bbb4e68d2b558f
      HP Precision architecture:
          Size/MD5 checksum:    46846 e863b11db8f25a221776ea306eeb1539
          Size/MD5 checksum:   230316 9ccb777cf49096a2dabf144de609b83c
          Size/MD5 checksum:   473764 6938692095c40fba1f5feca1efd243a8
          Size/MD5 checksum:   282648 68ffb8ebaac2404aa1f9a709e83abfc6
          Size/MD5 checksum:    41476 4327a6e2887ab7d5bb69d0476186d69e
      Motorola 680x0 architecture:
          Size/MD5 checksum:    45408 e33d428b54a5776181803c28475e2a30
          Size/MD5 checksum:   193578 d7f3db57205002a50354df9cc1e74767
          Size/MD5 checksum:   443280 2e982f2b17745777ff6e249f627b1b4c
          Size/MD5 checksum:   235056 c362aaa8589f44a3dc533143c37fd16b
          Size/MD5 checksum:    40450 279a59887fd7a90b9d92415a07fe87f1
      Big endian MIPS architecture:
          Size/MD5 checksum:    46300 c26b165f7098aa083170b90c8002406e
          Size/MD5 checksum:   252404 77b6d4382ee49bab1d3b94ea69d3bd88
          Size/MD5 checksum:   459088 34e8d02f8bac8bc4b059bc36109dda66
          Size/MD5 checksum:   281156 c2bf726c93de2c1ce1cb289d65fec892
          Size/MD5 checksum:    41086 85b8389df1df050f12fd87488ab46c02
      Little endian MIPS architecture:
          Size/MD5 checksum:    46256 8a1cc8fbd9e7679f2ec722f46a300fe1
          Size/MD5 checksum:   252820 876a24a6b4b49d19eb2d425f7271528e
          Size/MD5 checksum:   459392 f1d09bb13a31f8ec73922f50d538b073
          Size/MD5 checksum:   280986 eff50ab58f511148d9d56ecbbc02c162
          Size/MD5 checksum:    41066 7490a101b2de00f6f458359f64b05daa
      PowerPC architecture:
          Size/MD5 checksum:    47462 3eaaac85e15b48dd1add1fb314de9b74
          Size/MD5 checksum:   235624 2d13e7c1769aab6d8a051817009d10ca
          Size/MD5 checksum:   461300 94dddf225b2130da2daca1ec54b2c0b0
          Size/MD5 checksum:   272868 0517f72923504549f4acf0fab1e1924f
          Size/MD5 checksum:    42658 9dd0f68f37713263bc9a729d7216b35f
      IBM S/390 architecture:
          Size/MD5 checksum:    46422 039bfe0dde0063b276a57c1414a6d9ca
          Size/MD5 checksum:   214056 b87d71aa653f45726d3b4ecd60b226b3
          Size/MD5 checksum:   466474 6b6e2dd8152760e65d2af459deac62fc
          Size/MD5 checksum:   267648 fc8d5662348991874f47953f20102b38
          Size/MD5 checksum:    41078 090b4edea314fadf183bb31fd891be34
      Sun Sparc architecture:
          Size/MD5 checksum:    45706 955588f87bf3796b962c6f18ad5ecbb3
          Size/MD5 checksum:   205502 710eb39e993e988dcc1abc5cefd2f559
          Size/MD5 checksum:   455492 76e4acd2000175c52d60f6b6f53aaa25
          Size/MD5 checksum:   258764 c33aacda7a8162ff5ba7fd9399e347a6
          Size/MD5 checksum:    40806 cefaef4ab3ed03fdeeec97a40081721f
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.


    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"11","type":"x","order":"1","pct":34.38,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":18.75,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":46.88,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.