SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   KDE Vendors:   KDE.org
(Gentoo Describes Workaround for KDE kfax) LibTIFF Integer Overflow in 'tif_dirread' Lets Remote Users Deny Service
SecurityTracker Alert ID:  1012615
SecurityTracker URL:  http://securitytracker.com/id/1012615
CVE Reference:   CAN-2004-0804   (Links to External Site)
Date:  Dec 19 2004
Impact:   Denial of service via network
Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in LibTIFF. A remote user can cause an application using LibTIFF to crash. KDE kfax is affected.

Debian reported that Matthias Clasen discovered a division by zero error through an integer overflow. The flaw resides in 'libtiff/tif_dirread.c'.

Impact:   A remote user can cause the target application to crash.
Solution:   Gentoo indicates that a fix is not available and that the KDE Team recommends that you remove the kfax binary as well as the kfaxpart.la KPart:

rm /usr/kde/3.*/lib/kde3/kfaxpart.la
rm /usr/kde/3.*/bin/kfax

This workaround will disable kfax.

Cause:   Boundary error
Underlying OS:   Linux (Gentoo)

Message History:   This archive entry is a follow-up to the message listed below.
Oct 15 2004 LibTIFF Integer Overflow in 'tif_dirread' Lets Remote Users Deny Service



 Source Message Contents

Date:  Sun, 19 Dec 2004 20:15:53 +0100
Subject:  [gentoo-announce] [ GLSA 200412-17 ] kfax: Multiple overflows in the included TIFF library


--nextPart9353338.jglg2cCuv7
Content-Type: text/plain;
  charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

=2D - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200412-17
=2D - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
=2D - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
     Title: kfax: Multiple overflows in the included TIFF library
      Date: December 19, 2004
      Bugs: #73795
        ID: 200412-17

=2D - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
=3D=3D=3D=3D=3D=3D=3D=3D

kfax contains several buffer overflows potentially leading to execution
of arbitrary code.

Background
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

KDE is a feature-rich graphical desktop environment for Linux and
Unix-like Operating Systems. kfax (part of kdegraphics) is the KDE fax
file viewer.

Affected packages
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

    -------------------------------------------------------------------
     Package               /  Vulnerable  /                 Unaffected
    -------------------------------------------------------------------
  1  kde-base/kdegraphics       < 3.3.1                    Vulnerable!
    -------------------------------------------------------------------
=A0 =A0 =A0NOTE: Certain packages are still vulnerable. See Workaround.

Description
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

Than Ngo discovered that kfax contains a private copy of the TIFF
library and is therefore subject to several known vulnerabilities (see
References).

Impact
=3D=3D=3D=3D=3D=3D

A remote attacker could entice a user to view a carefully-crafted TIFF
image file with kfax, which would potentially lead to execution of
arbitrary code with the rights of the user running kfax.

Workaround
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

The KDE Team recommends to remove the kfax binary as well as the
kfaxpart.la KPart:

    rm /usr/kde/3.*/lib/kde3/kfaxpart.la
    rm /usr/kde/3.*/bin/kfax

Note: This will render the kfax functionality useless, if kfax
functionality is needed you should upgrade to the KDE 3.3.2 which is
not stable at the time of this writing.

Resolution
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

All kfax users should use the workaround as no patches are available
yet.

References
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

  [ 1 ] KDE Security Advisory: kfax libtiff vulnerabilities
        http://www.kde.org/info/security/advisory-20041209-2.txt
  [ 2 ] GLSA 200410-11
        http://www.gentoo.org/security/en/glsa/glsa-200410-11.xml
  [ 3 ] CAN-2004-0803
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCAN-2004-0803
  [ 4 ] CAN-2004-0804
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCAN-2004-0804
  [ 5 ] CAN-2004-0886
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCAN-2004-0886

Availability
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200412-17.xml

Concerns?
=3D=3D=3D=3D=3D=3D=3D=3D=3D

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
=3D=3D=3D=3D=3D=3D=3D

Copyright 2004 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.0

--nextPart9353338.jglg2cCuv7
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)

iD8DBQBBxdNuzKC5hMHO6rkRAhYxAJ9zE4a64ykIwXAlVnYMXXsuFvhCxACggOKu
ZX/wC7fc32ssR04SdKwHpi8=
=UO2r
-----END PGP SIGNATURE-----

--nextPart9353338.jglg2cCuv7--

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC