Rapid7 Vulnerability & Exploit Database

RHSA-2008:0848: libtiff security and bug fix update

Back to Search

RHSA-2008:0848: libtiff security and bug fix update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
06/08/2006
Created
07/25/2018
Added
09/09/2008
Modified
07/04/2017

Description

The libtiff packages contain a library of functions for manipulating TaggedImage File Format (TIFF) files.Multiple uses of uninitialized values were discovered in libtiff'sLempel-Ziv-Welch (LZW) compression algorithm decoder. An attacker couldcreate a carefully crafted LZW-encoded TIFF file that would cause anapplication linked with libtiff to crash or, possibly, execute arbitrarycode. (CVE-2008-2327)Red Hat would like to thank Drew Yao of the Apple Product Security team forreporting this issue.A buffer overflow flaw was discovered in the tiff2pdf conversion programdistributed with libtiff. An attacker could create a TIFF file containingUTF-8 characters that would, when converted to PDF format, cause tiff2pdfto crash, or, possibly, execute arbitrary code. (CVE-2006-2193)Additionally, these updated packages fix the following bug:All libtiff users are advised to upgrade to these updated packages, whichcontain backported patches to resolve these issues.

Solution(s)

  • redhat-upgrade-libtiff
  • redhat-upgrade-libtiff-devel

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;