Scientific Linux Security Update : libtiff for SL3.0.x, SL 4.x, SL 5.x on i386/x86_64

high Nessus Plugin ID 60623

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

CVE-2009-2285 libtiff: LZWDecodeCompat underflow

CVE-2009-2347 libtiff: integer overflows in various inter-color spaces conversion tools (crash, ACE)

Several integer overflow flaws, leading to heap-based buffer overflows, were found in various libtiff color space conversion tools.
An attacker could create a specially crafted TIFF file, which once opened by an unsuspecting user, would cause the conversion tool to crash or, potentially, execute arbitrary code with the privileges of the user running the tool. (CVE-2009-2347)

A buffer underwrite flaw was found in libtiff's Lempel-Ziv-Welch (LZW) compression algorithm decoder. An attacker could create a specially crafted LZW-encoded TIFF file, which once opened by an unsuspecting user, would cause an application linked with libtiff to access an out-of-bounds memory location, leading to a denial of service (application crash). (CVE-2009-2285)

The CVE-2009-2347 flaws were discovered by Tielei Wang from ICST-ERCIS, Peking University.

Solution

Update the affected libtiff and / or libtiff-devel packages.

See Also

http://www.nessus.org/u?29942716

Plugin Details

Severity: High

ID: 60623

File Name: sl_20090728_libtiff_for_SL3_0_x.nasl

Version: 1.7

Type: local

Agent: unix

Published: 8/1/2012

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Reference Information

CVE: CVE-2009-2285, CVE-2009-2347

CWE: 119, 189