RHEL 2.1 / 3 : libtiff (RHSA-2005:019)

This script is Copyright (C) 2005-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated libtiff packages that fix various integer overflows are now
available.

The libtiff package contains a library of functions for manipulating
TIFF (Tagged Image File Format) image format files.

iDEFENSE has reported an integer overflow bug that affects libtiff. An
attacker who has the ability to trick a user into opening a malicious
TIFF file could cause the application linked to libtiff to crash or
possibly execute arbitrary code. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2004-1308
to this issue.

Dmitry V. Levin reported another integer overflow in the tiffdump
utility. An atacker who has the ability to trick a user into opening a
malicious TIFF file with tiffdump could possibly execute arbitrary
code. The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2004-1183 to this issue.

All users are advised to upgrade to these updated packages, which
contain backported fixes for these issues.

See also :

https://www.redhat.com/security/data/cve/CVE-2004-1183.html
https://www.redhat.com/security/data/cve/CVE-2004-1308.html
http://rhn.redhat.com/errata/RHSA-2005-019.html

Solution :

Update the affected libtiff and / or libtiff-devel packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: Red Hat Local Security Checks

Nessus Plugin ID: 16159 ()

Bugtraq ID:

CVE ID: CVE-2004-1183
CVE-2004-1308