Lucene search

K
gentooGentoo FoundationGLSA-200605-17
HistoryMay 30, 2006 - 12:00 a.m.

libTIFF: Multiple vulnerabilities

2006-05-3000:00:00
Gentoo Foundation
security.gentoo.org
22

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.063 Low

EPSS

Percentile

93.7%

Background

libTIFF provides support for reading and manipulating TIFF images.

Description

Multiple vulnerabilities, ranging from integer overflows and NULL pointer dereferences to double frees, were reported in libTIFF.

Impact

An attacker could exploit these vulnerabilities by enticing a user to open a specially crafted TIFF image, possibly leading to the execution of arbitrary code or a Denial of Service.

Workaround

There is no known workaround at this time.

Resolution

All libTIFF users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-libs/tiff-3.8.1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-libs/tiff< 3.8.1UNKNOWN

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.063 Low

EPSS

Percentile

93.7%