Revision Date: | 2005-01-13 | Version: | 502 |
Title: | RHSA-2005:019: libtiff security update (Important) |
Description: | The libtiff package contains a library of functions for manipulating TIFF (Tagged Image File Format) image format files.
iDEFENSE has reported an integer overflow bug that affects libtiff. An attacker who has the ability to trick a user into opening a malicious TIFF file could cause the application linked to libtiff to crash or possibly execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-1308 to this issue.
Dmitry V. Levin reported another integer overflow in the tiffdump utility. An atacker who has the ability to trick a user into opening a malicious TIFF file with tiffdump could possibly execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-1183 to this issue.
All users are advised to upgrade to these updated packages, which contain backported fixes for these issues.
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | CVE-2004-1183 CVE-2004-1308 RHSA-2005:019-01
|
Platform(s): | Red Hat Enterprise Linux 3
| Product(s): | |
Definition Synopsis |
Red Hat Enterprise Linux 3 is installed AND Package Information
libtiff is earlier than 0:3.5.7-22.el3
AND libtiff is signed with Red Hat master key
OR
libtiff-devel is earlier than 0:3.5.7-22.el3
AND libtiff-devel is signed with Red Hat master key
|