Executive Summary
Summary | |
---|---|
Title | libtiff security update |
Informations | |||
---|---|---|---|
Name | RHSA-2014:0223 | First vendor Publication | 2014-02-27 |
Vendor | RedHat | Last vendor Modification | 2014-02-27 |
Severity (Vendor) | Moderate | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated libtiff packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 3. Description: The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. A heap-based buffer overflow and a use-after-free flaw were found in the tiff2pdf tool. An attacker could use these flaws to create a specially crafted TIFF file that would cause tiff2pdf to crash or, possibly, execute arbitrary code. (CVE-2013-1960, CVE-2013-4232) Multiple buffer overflow flaws were found in the gif2tiff tool. An attacker could use these flaws to create a specially crafted GIF file that could cause gif2tiff to crash or, possibly, execute arbitrary code. (CVE-2013-4231, CVE-2013-4243, CVE-2013-4244) Multiple buffer overflow flaws were found in the tiff2pdf tool. An attacker could use these flaws to create a specially crafted TIFF file that would cause tiff2pdf to crash. (CVE-2013-1961) Red Hat would like to thank Emmanuel Bouillon of NCI Agency for reporting CVE-2013-1960 and CVE-2013-1961. The CVE-2013-4243 issue was discovered by Murray McAllister of the Red Hat Security Response Team, and the CVE-2013-4244 issue was discovered by Huzaifa Sidhpurwala of the Red Hat Security Response Team. All libtiff users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All running applications linked against libtiff must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 952131 - CVE-2013-1961 libtiff (tiff2pdf): Stack-based buffer overflow with malformed image-length and resolution 952158 - CVE-2013-1960 libtiff (tiff2pdf): Heap-based buffer overflow in t2_process_jpeg_strip() 995965 - CVE-2013-4231 libtiff (gif2tiff): GIF LZW decoder missing datasize value check 995975 - CVE-2013-4232 libtiff (tiff2pdf): use-after-free in t2p_readwrite_pdf_image() 996052 - CVE-2013-4243 libtiff (gif2tiff): possible heap-based buffer overflow in readgifimage() 996468 - CVE-2013-4244 libtiff (gif2tiff): OOB Write in LZW decompressor |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2014-0223.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
83 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
17 % | CWE-399 | Resource Management Errors |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:18349 | |||
Oval ID: | oval:org.mitre.oval:def:18349 | ||
Title: | USN-1832-1 -- tiff vulnerabilities | ||
Description: | LibTIFF could be made to crash or run programs as your login if it opened a specially crafted file. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1832-1 CVE-2013-1960 CVE-2013-1961 | Version: | 7 |
Platform(s): | Ubuntu 13.04 Ubuntu 12.10 Ubuntu 12.04 Ubuntu 10.04 | Product(s): | tiff |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18900 | |||
Oval ID: | oval:org.mitre.oval:def:18900 | ||
Title: | DSA-2744-1 tiff - several | ||
Description: | Pedro Ribeiro and Huzaifa S. Sidhpurwala discovered multiple vulnerabilities in various tools shipped by the tiff library. Processing a malformed file may lead to denial of service or the execution of arbitrary code. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2744-1 CVE-2013-4231 CVE-2013-4232 CVE-2013-4244 | Version: | 8 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/Linux 7 Debian GNU/kFreeBSD 6.0 Debian GNU/kFreeBSD 7 | Product(s): | tiff |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20013 | |||
Oval ID: | oval:org.mitre.oval:def:20013 | ||
Title: | DSA-2698-1 tiff - buffer overflow | ||
Description: | Multiple issues were discovered in the TIFF tools, a set of utilities for TIFF image file manipulation and conversion. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2698-1 CVE-2013-1960 CVE-2013-1961 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/Linux 7 Debian GNU/kFreeBSD 6.0 Debian GNU/kFreeBSD 7 | Product(s): | tiff |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23517 | |||
Oval ID: | oval:org.mitre.oval:def:23517 | ||
Title: | ELSA-2014:0222: libtiff security update (Moderate) | ||
Description: | The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014:0222-00 CVE-2010-2596 CVE-2013-1960 CVE-2013-1961 CVE-2013-4231 CVE-2013-4232 CVE-2013-4243 CVE-2013-4244 | Version: | 12 |
Platform(s): | Oracle Linux 6 | Product(s): | libtiff |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23884 | |||
Oval ID: | oval:org.mitre.oval:def:23884 | ||
Title: | USN-2205-1 -- tiff vulnerabilities | ||
Description: | LibTIFF could be made to crash or run programs as your login if it opened a specially crafted file. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2205-1 CVE-2013-4231 CVE-2013-4232 CVE-2013-4243 CVE-2013-4244 | Version: | 5 |
Platform(s): | Ubuntu 14.04 Ubuntu 13.10 Ubuntu 12.10 Ubuntu 12.04 Ubuntu 10.04 | Product(s): | tiff |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23902 | |||
Oval ID: | oval:org.mitre.oval:def:23902 | ||
Title: | ELSA-2014:0223: libtiff security update (Moderate) | ||
Description: | The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014:0223-00 CVE-2013-1960 CVE-2013-1961 CVE-2013-4231 CVE-2013-4232 CVE-2013-4243 CVE-2013-4244 | Version: | 11 |
Platform(s): | Oracle Linux 5 | Product(s): | libtiff |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:24133 | |||
Oval ID: | oval:org.mitre.oval:def:24133 | ||
Title: | RHSA-2014:0222: libtiff security update (Moderate) | ||
Description: | The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2014:0222-00 CESA-2014:0222 CVE-2010-2596 CVE-2013-1960 CVE-2013-1961 CVE-2013-4231 CVE-2013-4232 CVE-2013-4243 CVE-2013-4244 | Version: | 34 |
Platform(s): | Red Hat Enterprise Linux 6 CentOS Linux 6 | Product(s): | libtiff |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:24202 | |||
Oval ID: | oval:org.mitre.oval:def:24202 | ||
Title: | RHSA-2014:0223: libtiff security update (Moderate) | ||
Description: | The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2014:0223-00 CESA-2014:0223 CVE-2013-1960 CVE-2013-1961 CVE-2013-4231 CVE-2013-4232 CVE-2013-4243 CVE-2013-4244 | Version: | 30 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | libtiff |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:25031 | |||
Oval ID: | oval:org.mitre.oval:def:25031 | ||
Title: | DSA-2965-1 tiff - security update | ||
Description: | Murray McAllister discovered a heap-based buffer overflow in the gif2tiff command line tool. Executing gif2tiff on a malicious tiff image could result in arbitrary code execution. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2965-1 CVE-2013-4243 | Version: | 3 |
Platform(s): | Debian GNU/Linux 7.0 Debian GNU/kFreeBSD 7.0 | Product(s): | tiff |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:25238 | |||
Oval ID: | oval:org.mitre.oval:def:25238 | ||
Title: | SUSE-SU-2013:1638-1 -- Security update for libtiff | ||
Description: | This tiff update fixes several security issues. * bnc#834477: CVE-2013-4232 CVE-2013-4231: tiff: buffer overflows/use after free problem * bnc#834779: CVE-2013-4243: libtiff (gif2tiff): heap-based buffer overflow in readgifimage() * bnc#834788: CVE-2013-4244: libtiff (gif2tiff): OOB Write in LZW decompressor | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2013:1638-1 CVE-2013-4232 CVE-2013-4231 CVE-2013-4243 CVE-2013-4244 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Server 10 SUSE Linux Enterprise Desktop 11 | Product(s): | libtiff |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26020 | |||
Oval ID: | oval:org.mitre.oval:def:26020 | ||
Title: | SUSE-SU-2013:0795-1 -- Security update for libtiff | ||
Description: | This update fixes two buffer overflow security issues with libtiff: * CVE-2013-1960 * CVE-2013-1961 | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2013:0795-1 CVE-2013-1960 CVE-2013-1961 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Server 10 SUSE Linux Enterprise Desktop 11 SUSE Linux Enterprise Desktop 10 | Product(s): | libtiff |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27265 | |||
Oval ID: | oval:org.mitre.oval:def:27265 | ||
Title: | DEPRECATED: ELSA-2014-0223 -- libtiff security update (moderate) | ||
Description: | [3.8.2-19] - Resolves: #1063460 CVE-2013-1960 CVE-2013-1961 CVE-2013-4231 CVE-2013-4232 CVE-2013-4243 CVE-2013-4244 libtiff various flaws | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014-0223 CVE-2013-1960 CVE-2013-1961 CVE-2013-4231 CVE-2013-4232 CVE-2013-4243 CVE-2013-4244 | Version: | 4 |
Platform(s): | Oracle Linux 5 | Product(s): | libtiff |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:27392 | |||
Oval ID: | oval:org.mitre.oval:def:27392 | ||
Title: | DEPRECATED: ELSA-2014-0222 -- libtiff security update (moderate) | ||
Description: | [3.9.4-10] - Resolves: #1063464. Several CVEs for libtiff | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014-0222 CVE-2010-2596 CVE-2013-1960 CVE-2013-1961 CVE-2013-4231 CVE-2013-4232 CVE-2013-4243 CVE-2013-4244 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | libtiff |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-01-10 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201701-16.nasl - Type : ACT_GATHER_INFO |
2016-09-06 | Name : The remote Debian host is missing a security update. File : debian_DLA-610.nasl - Type : ACT_GATHER_INFO |
2016-08-03 | Name : The remote OracleVM host is missing a security update. File : oraclevm_OVMSA-2016-0093.nasl - Type : ACT_GATHER_INFO |
2015-06-08 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL16715.nasl - Type : ACT_GATHER_INFO |
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_libtiff_20140731.nasl - Type : ACT_GATHER_INFO |
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_libtiff_20140114.nasl - Type : ACT_GATHER_INFO |
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_libtiff_20131217.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2014-0339.nasl - Type : ACT_GATHER_INFO |
2014-10-12 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2014-365.nasl - Type : ACT_GATHER_INFO |
2014-06-23 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2965.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-715.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-431.nasl - Type : ACT_GATHER_INFO |
2014-06-10 | Name : The remote Fedora host is missing a security update. File : fedora_2014-6837.nasl - Type : ACT_GATHER_INFO |
2014-06-10 | Name : The remote Fedora host is missing a security update. File : fedora_2014-6831.nasl - Type : ACT_GATHER_INFO |
2014-06-10 | Name : The remote Fedora host is missing a security update. File : fedora_2014-6594.nasl - Type : ACT_GATHER_INFO |
2014-05-29 | Name : The remote Fedora host is missing a security update. File : fedora_2014-6583.nasl - Type : ACT_GATHER_INFO |
2014-05-07 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2205-1.nasl - Type : ACT_GATHER_INFO |
2014-03-18 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2014-307.nasl - Type : ACT_GATHER_INFO |
2014-02-28 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0222.nasl - Type : ACT_GATHER_INFO |
2014-02-28 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140227_libtiff_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2014-02-28 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140227_libtiff_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2014-02-28 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0223.nasl - Type : ACT_GATHER_INFO |
2014-02-28 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-0223.nasl - Type : ACT_GATHER_INFO |
2014-02-28 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-0222.nasl - Type : ACT_GATHER_INFO |
2014-02-28 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-0223.nasl - Type : ACT_GATHER_INFO |
2014-02-28 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-0222.nasl - Type : ACT_GATHER_INFO |
2014-02-23 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201402-21.nasl - Type : ACT_GATHER_INFO |
2013-11-08 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_libtiff-devel-130927.nasl - Type : ACT_GATHER_INFO |
2013-10-20 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2013-290-01.nasl - Type : ACT_GATHER_INFO |
2013-09-19 | Name : The remote Fedora host is missing a security update. File : fedora_2013-15673.nasl - Type : ACT_GATHER_INFO |
2013-09-07 | Name : The remote Fedora host is missing a security update. File : fedora_2013-15679.nasl - Type : ACT_GATHER_INFO |
2013-09-03 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-224.nasl - Type : ACT_GATHER_INFO |
2013-08-28 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2744.nasl - Type : ACT_GATHER_INFO |
2013-08-25 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-219.nasl - Type : ACT_GATHER_INFO |
2013-08-20 | Name : The remote Fedora host is missing a security update. File : fedora_2013-14726.nasl - Type : ACT_GATHER_INFO |
2013-08-20 | Name : The remote Fedora host is missing a security update. File : fedora_2013-14707.nasl - Type : ACT_GATHER_INFO |
2013-08-07 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-208.nasl - Type : ACT_GATHER_INFO |
2013-06-19 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2698.nasl - Type : ACT_GATHER_INFO |
2013-05-22 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1832-1.nasl - Type : ACT_GATHER_INFO |
2013-05-19 | Name : The remote Fedora host is missing a security update. File : fedora_2013-7361.nasl - Type : ACT_GATHER_INFO |
2013-05-16 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_libtiff-devel-130506.nasl - Type : ACT_GATHER_INFO |
2013-05-14 | Name : The remote Fedora host is missing a security update. File : fedora_2013-7369.nasl - Type : ACT_GATHER_INFO |
2013-05-10 | Name : The remote Fedora host is missing a security update. File : fedora_2013-7339.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-03-01 13:20:59 |
|
2014-02-27 21:19:59 |
|