MGASA-2012-0137
Date: | July 9th, 2012 |
Affected releases: | 1, 2 |
Description:
Updated libtiff packages fix security vulnerabilities:
libtiff did not properly convert between signed and unsigned integer
values, leading to a buffer overflow. An attacker could use this flaw
to create a specially-crafted TIFF file that, when opened, would cause
an application linked against libtiff to crash or, possibly, execute
arbitrary code (CVE-2012-2088).
Multiple integer overflow flaws, leading to heap-based buffer overflows,
were found in the tiff2pdf tool. An attacker could use these flaws to
create a specially-crafted TIFF file that would cause tiff2pdf to crash
or, possibly, execute arbitrary code (CVE-2012-2113).
Updated Packages:
Mageia 1:
libtiff-progs-3.9.5-1.4.mga1
lib(64)tiff3-3.9.5-1.4.mga1
lib(64)tiff-devel-3.9.5-1.4.mga1
lib(64)tiff-static-devel-3.9.5-1.4.mga1
Mageia 2:
libtiff-progs-4.0.1-2.1.mga2
lib(64)tiff5-4.0.1-2.1.mga2
lib(64)tiff-devel-4.0.1-2.1.mga2
lib(64)tiff-static-devel-4.0.1-2.1.mga2
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2088 (mga1 only)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2113
https://rhn.redhat.com/errata/RHSA-2012-1054.html
https://bugs.mageia.org/show_bug.cgi?id=6677