Scientific Linux Security Update : libtiff for SL3.0.x, SL 4.x, SL 5.x on i386/x86_64
High Nessus Plugin ID 60623
SynopsisThe remote Scientific Linux host is missing one or more security updates.
DescriptionCVE-2009-2285 libtiff: LZWDecodeCompat underflow
CVE-2009-2347 libtiff: integer overflows in various inter-color spaces conversion tools (crash, ACE)
Several integer overflow flaws, leading to heap-based buffer overflows, were found in various libtiff color space conversion tools.
An attacker could create a specially crafted TIFF file, which once opened by an unsuspecting user, would cause the conversion tool to crash or, potentially, execute arbitrary code with the privileges of the user running the tool. (CVE-2009-2347)
A buffer underwrite flaw was found in libtiff's Lempel-Ziv-Welch (LZW) compression algorithm decoder. An attacker could create a specially crafted LZW-encoded TIFF file, which once opened by an unsuspecting user, would cause an application linked with libtiff to access an out-of-bounds memory location, leading to a denial of service (application crash). (CVE-2009-2285)
The CVE-2009-2347 flaws were discovered by Tielei Wang from ICST-ERCIS, Peking University.
SolutionUpdate the affected libtiff and / or libtiff-devel packages.