Revision Date: | 2004-10-22 | Version: | 502 |
Title: | RHSA-2004:577: libtiff security update (Important) |
Description: | The libtiff package contains a library of functions for manipulating TIFF (Tagged Image File Format) image format files. TIFF is a widely used file format for bitmapped images.
During a source code audit, Chris Evans discovered a number of integer overflow bugs that affect libtiff. An attacker who has the ability to trick a user into opening a malicious TIFF file could cause the application linked to libtiff to crash or possibly execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CAN-2004-0886 and CAN-2004-0804 to these issues.
Additionally, a number of buffer overflow bugs that affect libtiff have been found. An attacker who has the ability to trick a user into opening a malicious TIFF file could cause the application linked to libtiff to crash or possibly execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0803 to this issue.
All users are advised to upgrade to these errata packages, which contain fixes for these issues.
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | CVE-2004-0803 CVE-2004-0804 CVE-2004-0886 CVE-2004-1307 RHSA-2004:577-01
|
Platform(s): | Red Hat Enterprise Linux 3
| Product(s): | |
Definition Synopsis |
Red Hat Enterprise Linux 3 is installed AND Package Information
libtiff is earlier than 0:3.5.7-20.1
AND libtiff is signed with Red Hat master key
OR
libtiff-devel is earlier than 0:3.5.7-20.1
AND libtiff-devel is signed with Red Hat master key
|