Oracle Solaris Third-Party Patch Update : libtiff (cve_2012_4564_design_error1)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote Solaris system is missing a security patch for third-party
software.

Description :

The remote Solaris system is missing necessary patches to address
security updates :

- ppm2tiff does not check the return value of the
TIFFScanlineSize function, which allows remote attackers
to cause a denial of service (crash) and possibly
execute arbitrary code via a crafted PPM image that
triggers an integer overflow, a zero-memory allocation,
and a heap-based buffer overflow. (CVE-2012-4564)

- Heap-based buffer overflow in the t2p_process_jpeg_strip
function in tiff2pdf in libtiff 4.0.3 and earlier allows
remote attackers to cause a denial of service (crash)
and possibly execute arbitrary code via a crafted TIFF
image file. (CVE-2013-1960)

- Stack-based buffer overflow in the t2p_write_pdf_page
function in tiff2pdf in libtiff before 4.0.3 allows
remote attackers to cause a denial of service
(application crash) via a crafted image length and
resolution in a TIFF image file. (CVE-2013-1961)

See also :

http://www.nessus.org/u?b5f8def1
https://blogs.oracle.com/sunsecurity/entry/cve_2012_4564_design_error1
http://www.nessus.org/u?bca93c68

Solution :

Upgrade to Solaris 11.1.14.5.0.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)

Family: Solaris Local Security Checks

Nessus Plugin ID: 80681 ()

Bugtraq ID:

CVE ID: CVE-2012-4564
CVE-2013-1960
CVE-2013-1961

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now