Ubuntu 5.04 / 5.10 / 6.06 LTS : tiff vulnerabilities (USN-330-1)

High Nessus Plugin ID 27909


The remote Ubuntu host is missing one or more security-related patches.


Tavis Ormandy discovered that the TIFF library did not sufficiently check handled images for validity. By tricking an user or an automated system into processing a specially crafted TIFF image, an attacker could exploit these weaknesses to execute arbitrary code with the target application's privileges.

This library is used in many client and server applications, thus you should reboot your computer after the upgrade to ensure that all running programs use the new version of the library.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected packages.

Plugin Details

Severity: High

ID: 27909

File Name: ubuntu_USN-330-1.nasl

Version: $Revision: 1.15 $

Type: local

Agent: unix

Published: 2007/11/10

Modified: 2016/09/26

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:ND

Vulnerability Information

CPE: p-cpe:/a:canonical:ubuntu_linux:libtiff-opengl, p-cpe:/a:canonical:ubuntu_linux:libtiff-tools, p-cpe:/a:canonical:ubuntu_linux:libtiff4, p-cpe:/a:canonical:ubuntu_linux:libtiff4-dev, p-cpe:/a:canonical:ubuntu_linux:libtiffxx0c2, cpe:/o:canonical:ubuntu_linux:5.04, cpe:/o:canonical:ubuntu_linux:5.10, cpe:/o:canonical:ubuntu_linux:6.06:-:lts

Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2006/08/02

Vulnerability Publication Date: 2006/08/02

Exploitable With

Metasploit (Apple iOS MobileMail LibTIFF Buffer Overflow)

Reference Information

CVE: CVE-2006-3459, CVE-2006-3460, CVE-2006-3461, CVE-2006-3462, CVE-2006-3463, CVE-2006-3464, CVE-2006-3465

OSVDB: 27723, 27724, 27725, 27726, 27727, 27728, 27729

USN: 330-1

CWE: 189