Jump to content

Advisories (MDKSA-2006:102 ): libtiff


aru
 Share

Recommended Posts

Mandriva Advisories MDKSA-2006:102 : libtiff

 

Updated libtiff packages fixes tiff2pdf vulnerability

June 14th, 2006

 

A buffer overflow in the t2p_write_pdf_string function in tiff2pdf in

 

libtiff 3.8.2 and earlier allows attackers to cause a denial of service

 

(crash) and possibly execute arbitrary code via a TIFF file with a

 

DocumentName tag that contains UTF-8 characters, which triggers the

 

overflow when a character is sign extended to an integer that produces

 

more digits than expected in a sprintf call.

 

 

 

Corporate Server 3 and Corporate Desktop 3 are not affected by this

 

vulnerability as tiff2pdf was not part of the libtiff version shipped

 

in those products.

 

 

 

The updated packages have been patched to correct this issue.

 

 

The released versions of Mandriva GNU/Linux affected are:

  • 10.2
  • 2006.0

Full information about this advisory, including the updated packages, is available at:

www.mandriva.com/security/advisories?name=MDKSA-2006:102

 

Other references:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2193

 

Posted automatically by aru (mdksec2mub v: mdksec2mub,v 1.2 2006/06/01 20:04:28 pituko Exp $)

Link to comment
Share on other sites

 Share

×
×
  • Create New...