==========================================================================
Ubuntu Security Notice USN-3212-4
August 07, 2017
tiff vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 12.04 ESM
Summary:
LibTIFF could be made to crash or run programs as your login if it
opened a specially crafted file.
Software Description:
– tiff: Tag Image File Format (TIFF) library
Details:
USN-3212-1 fixed several issues in LibTIFF. This update
provides a subset of corresponding update for Ubuntu 12.04 ESM.
Mei Wang discovered a multiple integer overflows in LibTIFF which
allows remote attackers to cause a denial of service (crash) or
execute arbitrary code via a crafted TIFF image, which triggers
an out-of-bounds write. (CVE-2016-3945)
It was discovered that LibTIFF is vulnerable to a heap buffer
overflow in the resulting in DoS or code execution
via a crafted BitsPerSample value. (CVE-2017-5225)
Original advisory details:
It was discovered that LibTIFF incorrectly handled certain malformed
images. If a user or automated system were tricked into opening a
specially crafted image, a remote attacker could crash the
application, leading to a denial of service, or possibly execute
arbitrary code with user privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 ESM:
libtiff-tools 3.9.5-2ubuntu1.11
libtiff4 3.9.5-2ubuntu1.11
In general, a standard system update will make all the necessary
changes.
References:
https://www.ubuntu.com/usn/usn-3212-4
https://www.ubuntu.com/usn/usn-3212-1
CVE-2016-3945, CVE-2017-5225
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
iQIcBAABCAAGBQJZiHKBAAoJEEW851uECx9p668P/iPM2WkRoNPqu2zdlMVqY3ie
q7JKrYpUPQAiIWTgL0IkpkdUi2znimf6IjPQ6rfoZxXvVFS8xoAMSUZQyhgVx5d2
+xDvjr9TTKmZZz6QJwsd6psH8IN1gZeJOwXD7BCIeMZ90KNL7X7hePrDmvWClOe/
UnuBmjdD5Yae/PVRPGOUGSCFD5XJ1EqKGdWpwt3BOt++3rcwIYr+jcOY2kB3H27l
AWOTvHPgeNFEBGvWfNRAFpNDVoPp2uo4uoEjdA8MhfLJ0oO1kVkDDe3Q0Zb9ewC2
+nfaEs/hlO0DIOpkdTXsJonh+s+WM6RgpCk2YFWaWgoFyUDxswX2AnRuWt8xCuFq
1Pt16/62lNGHYf+epMknafJUWt/7C5Fp5TXiiGZ8Msu585+5d33k2+gMDgGuGzYX
PBxIPW0sXfs9fPXxISdVTlMR7FNQz7WyKlvXj2SfMnZIfhycH/XrZyOnzP2aBlCL
Z+gC2+SC3WcSCJxp0eV2F3mWLN4c6oWdfKlwsXTZmCEh+M7Kie48VwBYnqdhUPG2
WeH4Wg6Xk5Wc4CTzWVfZjh4OfKfQhRpTl1wPr6BLeI7yyYarHf6MS+TLzKE9x52+
rk+9SZhs5DAtF2UIYoFOCixQM39EDgk851rJ8zAVlyJFgY7Gl/tzq7oxuNR/fL3i
BElVloH4ApK1tVezua6F
=bh59
—–END PGP SIGNATURE—–
—