SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   LibTIFF Vendors:   libtiff.org
(Slackware Issues Fix) LibTIFF Integer Overflow in 'tif_dirread' Lets Remote Users Deny Service
SecurityTracker Alert ID:  1012020
SecurityTracker URL:  http://securitytracker.com/id/1012020
CVE Reference:   CVE-2004-0804   (Links to External Site)
Date:  Nov 1 2004
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 3.6.1
Description:   A vulnerability was reported in LibTIFF. A remote user can cause an application using LibTIFF to crash.

Debian reported that Matthias Clasen discovered a division by zero error through an integer overflow. The flaw resides in 'libtiff/tif_dirread.c'.

Impact:   A remote user can cause the target application to crash.
Solution:   Slackware has released a fix.

Updated package for Slackware 8.1:
ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/libtiff-3.5.7-i386-3.tgz

Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/libtiff-3.5.7-i386-4.tgz

Updated package for Slackware 9.1:
ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/libtiff-3.5.7-i486-4.tgz

Updated package for Slackware 10.0:
ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/libtiff-3.7.0-i486-1.tgz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/libtiff-3.7.0-i486-1.tgz


The MD5 signatures are:

Slackware 8.1 package:
13c265d491293ab098ff32f204813ba6 libtiff-3.5.7-i386-3.tgz

Slackware 9.0 package:
04256c3f750ef84e620ef5ac96a3d5ff libtiff-3.5.7-i386-4.tgz

Slackware 9.1 package:
0c767736c44faa6c4e57dbe18b03046e libtiff-3.5.7-i486-4.tgz

Slackware 10.0 package:
44da0e434b86e744e8845b845705e1b7 libtiff-3.7.0-i486-1.tgz

Slackware -current package:
f02243e50f71fccb1b4ec9827e326056 libtiff-3.7.0-i486-1.tgz

Vendor URL:  www.libtiff.org/ (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Slackware)
Underlying OS Comments:  8.1, 9.0, 9.1, 10.1, and -current

Message History:   This archive entry is a follow-up to the message listed below.
Oct 15 2004 LibTIFF Integer Overflow in 'tif_dirread' Lets Remote Users Deny Service



 Source Message Contents

Subject:  [slackware-security] libtiff (SSA:2004-305-02)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  libtiff (SSA:2004-305-02)

New libtiff packages are available for Slackware 8.1, 9.0, 9.1,
10.1, and -current to fix security issues that could lead to
application crashes, or possibly execution of arbitrary code.

More details about this issue may be found in the Common
Vulnerabilities and Exposures (CVE) database:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0803
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0804
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0886


Here are the details from the Slackware 10.0 ChangeLog:
+--------------------------+
patches/packages/libtiff-3.7.0-i486-1.tgz:  Upgraded to libtiff-3.7.0.
  This fixes several bugs that could lead to crashes, or could possibly allow
  arbitrary code to be executed.  For more details, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0803
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0804
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0886
  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Updated package for Slackware 8.1:
ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/libtiff-3.5.7-i386-3.tgz

Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/libtiff-3.5.7-i386-4.tgz

Updated package for Slackware 9.1:
ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/libtiff-3.5.7-i486-4.tgz

Updated package for Slackware 10.0:
ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/libtiff-3.7.0-i486-1.tgz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/libtiff-3.7.0-i486-1.tgz


MD5 signatures:
+-------------+

Slackware 8.1 package:
13c265d491293ab098ff32f204813ba6  libtiff-3.5.7-i386-3.tgz

Slackware 9.0 package:
04256c3f750ef84e620ef5ac96a3d5ff  libtiff-3.5.7-i386-4.tgz

Slackware 9.1 package:
0c767736c44faa6c4e57dbe18b03046e  libtiff-3.5.7-i486-4.tgz

Slackware 10.0 package:
44da0e434b86e744e8845b845705e1b7  libtiff-3.7.0-i486-1.tgz

Slackware -current package:
f02243e50f71fccb1b4ec9827e326056  libtiff-3.7.0-i486-1.tgz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg libtiff-3.7.0-i486-1.tgz


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com

+------------------------------------------------------------------------+
| To leave the slackware-security mailing list:                          |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message:                                                     |
|                                                                        |
|   unsubscribe slackware-security                                       |
|                                                                        |
| You will get a confirmation message back containing instructions to    |
| complete the process.  Please do not reply to this email address.      |
+------------------------------------------------------------------------+

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)

iD8DBQFBhcMFakRjwEAQIjMRAsvfAJ4yRrEm1MnBtdC6Chbf/PbiRXckvwCfRK81
1pkBLetVSOYA4ZovyL4sw2U=
=hgR2
-----END PGP SIGNATURE-----

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC