USN-3212-4: LibTIFF vulnerabilities
7 August 2017
LibTIFF could be made to crash or run programs as your login if it opened a specially crafted file.
Releases
Packages
- tiff - Tag Image File Format (TIFF) library
Details
USN-3212-1 fixed several issues in LibTIFF. This update
provides a subset of corresponding update for Ubuntu 12.04 ESM.
Mei Wang discovered a multiple integer overflows in LibTIFF which
allows remote attackers to cause a denial of service (crash) or
execute arbitrary code via a crafted TIFF image, which triggers
an out-of-bounds write. (CVE-2016-3945)
It was discovered that LibTIFF is vulnerable to a heap buffer
overflow in the resulting in DoS or code execution
via a crafted BitsPerSample value. (CVE-2017-5225)
Original advisory details:
It was discovered that LibTIFF incorrectly handled certain malformed
images. If a user or automated system were tricked into opening a specially
crafted image, a remote attacker could crash the application, leading to a
denial of service, or possibly execute arbitrary code with user privileges.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-3212-1: libtiff-tools, libtiff5-alt-dev, tiff, libtiff4-dev, libtiffxx5, libtiff-doc, libtiff5-dev, libtiff-opengl, libtiff5