Linux Security
Linux Security
Linux Security

Debian: New tiff packages fix several vulnerabilities

Date 02 Aug 2006
Posted By LinuxSecurity Advisories
Updated package.
- --------------------------------------------------------------------------
Debian Security Advisory DSA 1137-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
August 2nd, 2006              
- --------------------------------------------------------------------------

Package        : tiff
Vulnerability  : several
Problem type   : local (remote)
Debian-specific: no
CVE IDs        : CVE-2006-3459 CVE-2006-3460 CVE-2006-3461 CVE-2006-3462
                 CVE-2006-3463 CVE-2006-3464 CVE-2006-3465

Tavis Ormandy of the Google Security Team discovered several problems
in the TIFF library.  The Common Vulnerabilities and Exposures project
identifies the following issues:


    Several stack-buffer overflows have been discovered.


    A heap overflow vulnerability in the JPEG decoder may overrun a
    buffer with more data than expected.


    A heap overflow vulnerability in the PixarLog decoder may allow an
    attacker to execute arbitrary code.


    A heap overflow vulnerability has been discovered in the NeXT RLE


    An loop was discovered where a 16bit unsigned short was used to
    iterate over a 32bit unsigned value so that the loop would never
    terminate and continue forever.


    Multiple unchecked arithmetic operations were uncovered, including
    a number of the range checking operations designed to ensure the
    offsets specified in TIFF directories are legitimate.


    A flaw was also uncovered in libtiffs custom tag support which may
    result in abnormal behaviour, crashes, or potentially arbitrary
    code execution.

For the stable distribution (sarge) these problems have been fixed in
version 3.7.2-7.

For the unstable distribution (sid) these problems have been fixed in
version 3.8.2-6.

We recommend that you upgrade your libtiff packages.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:
      Size/MD5 checksum:      736 ce0ffb8cdd1130153deaefa8b59abe81
      Size/MD5 checksum:    17174 ff485016221ededfc8ce649538322211
      Size/MD5 checksum:  1252995 221679f6d5c15670b3c242cbfff79a00

  Alpha architecture:
      Size/MD5 checksum:    47112 a4f7feea087ba03a84f745ee79a7ff56
      Size/MD5 checksum:   243840 f7abb618f36082be959f6e3c9a99cf8f
      Size/MD5 checksum:   479064 c137c6857ed320928f182115fbd94b21
      Size/MD5 checksum:   311206 c202ef6404c23ea7dc999c03e586c07f
      Size/MD5 checksum:    41228 53c5979e8c2556e5a19607c19e862368

  AMD64 architecture:
      Size/MD5 checksum:    46036 bc6d0c7db57a1dcae4b8dd65b4640243
      Size/MD5 checksum:   218060 d09ef1de8b31f074d2f05c7522858cf1
      Size/MD5 checksum:   459964 8be097d74ac788d87a8358b8f9e68d79
      Size/MD5 checksum:   267872 cc0a4241cd53de29b561286fcd91cf2c
      Size/MD5 checksum:    40804 136bc49ad0c85dc6fa9f61242cf97c05

  ARM architecture:
      Size/MD5 checksum:    45536 0253b94c6f94a33c9942568f9093fedd
      Size/MD5 checksum:   208630 45e2ef6af43bfbddb4aee00b659d287a
      Size/MD5 checksum:   454194 354e1b4560b4a407c4b4faf5d2555b20
      Size/MD5 checksum:   266148 f535b441d81a7786815d954c843b9c81
      Size/MD5 checksum:    40304 fcd0980c8fc2dedaa8a6380e0d4736bd

  Intel IA-32 architecture:
      Size/MD5 checksum:    45400 e51d8f157a2ef94cbc4e893f756be29a
      Size/MD5 checksum:   206412 69a3c66b2c9733653e6e7f667ab260b3
      Size/MD5 checksum:   453078 267f8f361f0dc87f40c8bc37d4785f57
      Size/MD5 checksum:   252412 5720af1515d6c9ce04f0e7abea045955
      Size/MD5 checksum:    40850 18710ba8ae073bd5a6e7b3c299cbae23

  Intel IA-64 architecture:
      Size/MD5 checksum:    48512 c57280d747f62859c4477a0f1dcbcfef
      Size/MD5 checksum:   269156 277ad4a79cd2148991134c6ed8c029fe
      Size/MD5 checksum:   511782 4b64fd28c917e7e2e158c7244cfc892d
      Size/MD5 checksum:   331790 614a46318d671800caab21e26df9c1bf
      Size/MD5 checksum:    42450 af80a3234e174d9f15bbb4e68d2b558f

  HP Precision architecture:
      Size/MD5 checksum:    46846 e863b11db8f25a221776ea306eeb1539
      Size/MD5 checksum:   230316 9ccb777cf49096a2dabf144de609b83c
      Size/MD5 checksum:   473764 6938692095c40fba1f5feca1efd243a8
      Size/MD5 checksum:   282648 68ffb8ebaac2404aa1f9a709e83abfc6
      Size/MD5 checksum:    41476 4327a6e2887ab7d5bb69d0476186d69e

  Motorola 680x0 architecture:
      Size/MD5 checksum:    45408 e33d428b54a5776181803c28475e2a30
      Size/MD5 checksum:   193578 d7f3db57205002a50354df9cc1e74767
      Size/MD5 checksum:   443280 2e982f2b17745777ff6e249f627b1b4c
      Size/MD5 checksum:   235056 c362aaa8589f44a3dc533143c37fd16b
      Size/MD5 checksum:    40450 279a59887fd7a90b9d92415a07fe87f1

  Big endian MIPS architecture:
      Size/MD5 checksum:    46300 c26b165f7098aa083170b90c8002406e
      Size/MD5 checksum:   252404 77b6d4382ee49bab1d3b94ea69d3bd88
      Size/MD5 checksum:   459088 34e8d02f8bac8bc4b059bc36109dda66
      Size/MD5 checksum:   281156 c2bf726c93de2c1ce1cb289d65fec892
      Size/MD5 checksum:    41086 85b8389df1df050f12fd87488ab46c02

  Little endian MIPS architecture:
      Size/MD5 checksum:    46256 8a1cc8fbd9e7679f2ec722f46a300fe1
      Size/MD5 checksum:   252820 876a24a6b4b49d19eb2d425f7271528e
      Size/MD5 checksum:   459392 f1d09bb13a31f8ec73922f50d538b073
      Size/MD5 checksum:   280986 eff50ab58f511148d9d56ecbbc02c162
      Size/MD5 checksum:    41066 7490a101b2de00f6f458359f64b05daa

  PowerPC architecture:
      Size/MD5 checksum:    47462 3eaaac85e15b48dd1add1fb314de9b74
      Size/MD5 checksum:   235624 2d13e7c1769aab6d8a051817009d10ca
      Size/MD5 checksum:   461300 94dddf225b2130da2daca1ec54b2c0b0
      Size/MD5 checksum:   272868 0517f72923504549f4acf0fab1e1924f
      Size/MD5 checksum:    42658 9dd0f68f37713263bc9a729d7216b35f

  IBM S/390 architecture:
      Size/MD5 checksum:    46422 039bfe0dde0063b276a57c1414a6d9ca
      Size/MD5 checksum:   214056 b87d71aa653f45726d3b4ecd60b226b3
      Size/MD5 checksum:   466474 6b6e2dd8152760e65d2af459deac62fc
      Size/MD5 checksum:   267648 fc8d5662348991874f47953f20102b38
      Size/MD5 checksum:    41078 090b4edea314fadf183bb31fd891be34

  Sun Sparc architecture:
      Size/MD5 checksum:    45706 955588f87bf3796b962c6f18ad5ecbb3
      Size/MD5 checksum:   205502 710eb39e993e988dcc1abc5cefd2f559
      Size/MD5 checksum:   455492 76e4acd2000175c52d60f6b6f53aaa25
      Size/MD5 checksum:   258764 c33aacda7a8162ff5ba7fd9399e347a6
      Size/MD5 checksum:    40806 cefaef4ab3ed03fdeeec97a40081721f

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"47","type":"x","order":"1","pct":79.66,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"7","type":"x","order":"2","pct":11.86,"resources":[]},{"id":"181","title":"Hardly ever","votes":"5","type":"x","order":"3","pct":8.47,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.