Ubuntu 4.10 / 5.04 : tiff vulnerability (USN-156-1)

high Nessus Plugin ID 20559

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Wouter Hanegraaff discovered that the TIFF library did not sufficiently validate the 'YCbCr subsampling' value in TIFF image headers. Decoding a malicious image with a zero value resulted in an arithmetic exception, which caused the program that uses the TIFF library to crash. This leads to a Denial of Service in server applications that use libtiff (like the CUPS printing system) and can cause data loss in, for example, the Evolution email client.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected libtiff-tools, libtiff4 and / or libtiff4-dev packages.

Plugin Details

Severity: High

ID: 20559

File Name: ubuntu_USN-156-1.nasl

Version: 1.14

Type: local

Agent: unix

Published: 1/15/2006

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Vulnerability Information

CPE: p-cpe:/a:canonical:ubuntu_linux:libtiff-tools, p-cpe:/a:canonical:ubuntu_linux:libtiff4, p-cpe:/a:canonical:ubuntu_linux:libtiff4-dev, cpe:/o:canonical:ubuntu_linux:4.10, cpe:/o:canonical:ubuntu_linux:5.04

Required KB Items: Host/cpu, Host/Debian/dpkg-l, Host/Ubuntu, Host/Ubuntu/release

Patch Publication Date: 7/29/2005

Reference Information

USN: 156-1