From Mageia wiki
Jump to: navigation, search

MGASA-2012-0137

Date: July 9th, 2012
Affected releases: 1, 2


Description:
Updated libtiff packages fix security vulnerabilities:

libtiff did not properly convert between signed and unsigned integer
values, leading to a buffer overflow. An attacker could use this flaw
to create a specially-crafted TIFF file that, when opened, would cause
an application linked against libtiff to crash or, possibly, execute
arbitrary code (CVE-2012-2088).

Multiple integer overflow flaws, leading to heap-based buffer overflows,
were found in the tiff2pdf tool. An attacker could use these flaws to
create a specially-crafted TIFF file that would cause tiff2pdf to crash
or, possibly, execute arbitrary code (CVE-2012-2113).


Updated Packages:
Mageia 1:
libtiff-progs-3.9.5-1.4.mga1
lib(64)tiff3-3.9.5-1.4.mga1
lib(64)tiff-devel-3.9.5-1.4.mga1
lib(64)tiff-static-devel-3.9.5-1.4.mga1

Mageia 2:
libtiff-progs-4.0.1-2.1.mga2
lib(64)tiff5-4.0.1-2.1.mga2
lib(64)tiff-devel-4.0.1-2.1.mga2
lib(64)tiff-static-devel-4.0.1-2.1.mga2


References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2088 (mga1 only)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2113
https://rhn.redhat.com/errata/RHSA-2012-1054.html
https://bugs.mageia.org/show_bug.cgi?id=6677