Debian DSA-567-1 : tiff - heap overflows

high Nessus Plugin ID 15665


The remote Debian host is missing a security-related update.


Several problems have been discovered in libtiff, the Tag Image File Format library for processing TIFF graphics files. An attacker could prepare a specially crafted TIFF graphic that would cause the client to execute arbitrary code or crash. The Common Vulnerabilities and Exposures Project has identified the following problems :

- CAN-2004-0803 Chris Evans discovered several problems in the RLE (run length encoding) decoders that could lead to arbitrary code execution.

- CAN-2004-0804

Matthias Clasen discovered a division by zero through an integer overflow.

- CAN-2004-0886

Dmitry V. Levin discovered several integer overflows that caused malloc issues which can result to either plain crash or memory corruption.


Upgrade the libtiff package.

For the stable distribution (woody) these problems have been fixed in version 3.5.5-6woody1.

See Also

Plugin Details

Severity: High

ID: 15665

File Name: debian_DSA-567.nasl

Version: 1.23

Type: local

Agent: unix

Published: 11/10/2004

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:tiff, cpe:/o:debian:debian_linux:3.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 10/15/2004

Vulnerability Publication Date: 10/14/2004

Reference Information

CVE: CVE-2004-0803, CVE-2004-0804, CVE-2004-0886

BID: 11406

CERT: 555304, 687568

DSA: 567