Ubuntu 2205-1: LibTIFF vulnerabilities

    Date06 May 2014
    CategoryUbuntu
    50
    Posted ByLinuxSecurity Advisories
    LibTIFF could be made to crash or run programs as your login if it opened a specially crafted file.
    ==========================================================================
    Ubuntu Security Notice USN-2205-1
    May 06, 2014
    
    tiff vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 14.04 LTS
    - Ubuntu 13.10
    - Ubuntu 12.10
    - Ubuntu 12.04 LTS
    - Ubuntu 10.04 LTS
    
    Summary:
    
    LibTIFF could be made to crash or run programs as your login if it opened a
    specially crafted file.
    
    Software Description:
    - tiff: Tag Image File Format (TIFF) library
    
    Details:
    
    Pedro Ribeiro discovered that LibTIFF incorrectly handled certain
    malformed images when using the gif2tiff tool. If a user or automated
    system were tricked into opening a specially crafted GIF image, a remote
    attacker could crash the application, leading to a denial of service, or
    possibly execute arbitrary code with user privileges. This issue only
    affected Ubuntu 10.04 LTS, Ubunu 12.04 LTS, Ubuntu 12.10 and Ubuntu 13.10.
    (CVE-2013-4231)
    
    Pedro Ribeiro discovered that LibTIFF incorrectly handled certain
    malformed images when using the tiff2pdf tool. If a user or automated
    system were tricked into opening a specially crafted TIFF image, a remote
    attacker could crash the application, leading to a denial of service, or
    possibly execute arbitrary code with user privileges. This issue only
    affected Ubuntu 10.04 LTS, Ubunu 12.04 LTS, Ubuntu 12.10 and Ubuntu 13.10.
    (CVE-2013-4232)
    
    Murray McAllister discovered that LibTIFF incorrectly handled certain
    malformed images when using the gif2tiff tool. If a user or automated
    system were tricked into opening a specially crafted GIF image, a remote
    attacker could crash the application, leading to a denial of service, or
    possibly execute arbitrary code with user privileges. (CVE-2013-4243)
    
    Huzaifa Sidhpurwala discovered that LibTIFF incorrectly handled certain
    malformed images when using the gif2tiff tool. If a user or automated
    system were tricked into opening a specially crafted GIF image, a remote
    attacker could crash the application, leading to a denial of service, or
    possibly execute arbitrary code with user privileges. This issue only
    affected Ubuntu 10.04 LTS, Ubunu 12.04 LTS, Ubuntu 12.10 and Ubuntu 13.10.
    (CVE-2013-4244)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 14.04 LTS:
      libtiff5                        4.0.3-7ubuntu0.1
    
    Ubuntu 13.10:
      libtiff5                        4.0.2-4ubuntu3.1
    
    Ubuntu 12.10:
      libtiff5                        4.0.2-1ubuntu2.3
    
    Ubuntu 12.04 LTS:
      libtiff4                        3.9.5-2ubuntu1.6
    
    Ubuntu 10.04 LTS:
      libtiff4                        3.9.2-2ubuntu0.14
    
    In general, a standard system update will make all the necessary changes.
    
    References:
      http://www.ubuntu.com/usn/usn-2205-1
      CVE-2013-4231, CVE-2013-4232, CVE-2013-4243, CVE-2013-4244
    
    Package Information:
      https://launchpad.net/ubuntu/+source/tiff/4.0.3-7ubuntu0.1
      https://launchpad.net/ubuntu/+source/tiff/4.0.2-4ubuntu3.1
      https://launchpad.net/ubuntu/+source/tiff/4.0.2-1ubuntu2.3
      https://launchpad.net/ubuntu/+source/tiff/3.9.5-2ubuntu1.6
      https://launchpad.net/ubuntu/+source/tiff/3.9.2-2ubuntu0.14
    
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"23","type":"x","order":"1","pct":56.1,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":12.2,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"13","type":"x","order":"3","pct":31.71,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Advisories

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.