Lucene search

K
gentooGentoo FoundationGLSA-200410-11
HistoryOct 13, 2004 - 12:00 a.m.

tiff: Buffer overflows in image decoding

2004-10-1300:00:00
Gentoo Foundation
security.gentoo.org
12

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.061 Low

EPSS

Percentile

93.6%

Background

The tiff library contains encoding and decoding routines for the Tag Image File Format. It is called by numerous programs, including GNOME and KDE, to help in displaying TIFF images. xv is a multi-format image manipulation utility that is statically linked to the tiff library.

Description

Chris Evans found heap-based overflows in RLE decoding routines in tif_next.c, tif_thunder.c and potentially tif_luv.c.

Impact

A remote attacker could entice a user to view a carefully crafted TIFF image file, which would potentially lead to execution of arbitrary code with the rights of the user viewing the image. This affects any program that makes use of the tiff library, including GNOME and KDE web browsers or mail readers.

Workaround

There is no known workaround at this time.

Resolution

All tiff library users should upgrade to the latest version:

 # emerge sync

 # emerge -pv ">=media-libs/tiff-3.6.1-r2"
 # emerge ">=media-libs/tiff-3.6.1-r2"

xv makes use of the tiff library and needs to be recompiled to receive the new patched version of the library. All xv users should also upgrade to the latest version:

 # emerge sync

 # emerge -pv ">=media-gfx/xv-3.10a-r8"
 # emerge ">=media-gfx/xv-3.10a-r8"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-libs/tiff< 3.6.1-r2UNKNOWN
Gentooanyallmedia-gfx/xv<= 3.10a-r7UNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.061 Low

EPSS

Percentile

93.6%