How to Buy
This script is Copyright (C) 2009-2017 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated libtiff packages that fix several security issues are now
available for Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having moderate security impact by the
Red Hat Security Response Team.
The libtiff packages contain a library of functions for manipulating
Tagged Image File Format (TIFF) files.
Several integer overflow flaws, leading to heap-based buffer
overflows, were found in various libtiff color space conversion tools.
An attacker could create a specially crafted TIFF file, which once
opened by an unsuspecting user, would cause the conversion tool to
crash or, potentially, execute arbitrary code with the privileges of
the user running the tool. (CVE-2009-2347)
A buffer underwrite flaw was found in libtiff's Lempel-Ziv-Welch (LZW)
compression algorithm decoder. An attacker could create a specially
crafted LZW-encoded TIFF file, which once opened by an unsuspecting
user, would cause an application linked with libtiff to access an
out-of-bounds memory location, leading to a denial of service
(application crash). (CVE-2009-2285)
The CVE-2009-2347 flaws were discovered by Tielei Wang from
ICST-ERCIS, Peking University.
All libtiff users should upgrade to these updated packages, which
contain backported patches to correct these issues. After installing
this update, all applications linked with the libtiff library (such as
Konqueror) must be restarted for the update to take effect.
See also :
Update the affected libtiff and / or libtiff-devel packages.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : false
Family: Red Hat Local Security Checks
Nessus Plugin ID: 39850 ()
Bugtraq ID: 3545135652
CVE ID: CVE-2009-2285CVE-2009-2347
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.