[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

DESA-2005-002: tiff: unsanitised input



- --------------------------------------------------------------------------
Debian-Edu/Skolelinux Security Advisory DESA 2005-002
http://www.skolelinux.no/security/                       Finn-Arne Johansen
January 6th, 2005               debian-edu-security@lists.alioth.debian.org
- --------------------------------------------------------------------------

Package             : tiff (libtiff3g)
Vulnerability       : unsanitised input
Problem-Type        : remote
Need reboot         : no
Debian-Edu-specific : no
CVE ID              : CAN-2004-1183
DSA ID              : DSA-626-1

Dmitry V. Levin discovered a buffer overflow in libtiff, the Tag Image
File Format library for processing TIFF graphics files.  Upon reading
a TIFF file it is possible to crash the application, and maybe also to
execute arbitrary code.

We recommend that you upgrade your libtiff3g packages.

Upgrade Instructions
- --------------------

Make sure the line

  deb http://security.debian.org/ stable/updates main contrib non-free

is present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists. 
If you only want to upgrade libtiff3g, you may run 'apt-get install
libtiff3g' to upgrade your package.

- --------------------------------------------------------------------------
Mailing list: bruker@skolelinux.no, debian-edu@lists.debian.org,
              linuxiskolen@skolelinux.no, user@skolelinux.de,
              admin-discuss@skolelinux.org
Package info: `apt-cache show <pkg>'

Attachment: signature.asc
Description: Digital signature


Reply to: