FreeBSD : tiff -- directory entry count integer overflow vulnerability (fc7e6a42-6012-11d9-a9e7-0001020eed82)

This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

In an iDEFENSE Security Advisory infamous41md reports :

Remote exploitation of a heap-based buffer overflow vulnerability
within the LibTIFF package could allow attackers to execute arbitrary
code.

The vulnerability specifically exists due to insufficient validation
of user-supplied data when calculating the size of a directory entry.
A TIFF file includes a number of directory entry header fields that
describe the data in the file. Included in these entries is an entry
count and offset value that are calculated to determine the size and
location of the data for that entry.

See also :

http://www.nessus.org/u?4583297c
http://www.nessus.org/u?8ff6b725

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.4
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 19184 (freebsd_pkg_fc7e6a42601211d9a9e70001020eed82.nasl)

Bugtraq ID: 12075

CVE ID: CVE-2004-1308

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now