Debian DSA-2698-1 : tiff - buffer overflow

High Nessus Plugin ID 66916

Synopsis

The remote Debian host is missing a security-related update.

Description

Multiple issues were discovered in the TIFF tools, a set of utilities for TIFF image file manipulation and conversion.

- CVE-2013-1960 Emmanuel Bouillon discovered a heap-based buffer overflow in the tp_process_jpeg_strip function in the tiff2pdf tool. This could potentially lead to a crash or arbitrary code execution.

- CVE-2013-1961 Emmanuel Bouillon discovered many stack-based buffer overflows in the TIFF tools. These issues could potentially lead to a crash or arbitrary code execution.

Solution

Upgrade the tiff packages.

For the oldstable distribution (squeeze), these problems have been fixed in version 3.9.4-5+squeeze9.

For the stable distribution (wheezy), these problems have been fixed in version 4.0.2-6+deb7u1.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=706674

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=706675

https://security-tracker.debian.org/tracker/CVE-2013-1960

https://security-tracker.debian.org/tracker/CVE-2013-1961

https://packages.debian.org/source/squeeze/tiff

https://packages.debian.org/source/wheezy/tiff

https://www.debian.org/security/2013/dsa-2698

Plugin Details

Severity: High

ID: 66916

File Name: debian_DSA-2698.nasl

Version: 1.9

Type: local

Agent: unix

Published: 2013/06/19

Updated: 2018/11/10

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:tiff, cpe:/o:debian:debian_linux:6.0, cpe:/o:debian:debian_linux:7.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2013/06/18

Reference Information

CVE: CVE-2013-1960, CVE-2013-1961

BID: 59607, 59609

DSA: 2698