[USN-3212-3] LibTIFF vulnerabilities
Leonidas S. Barbosa
leo.barbosa at canonical.com
Wed Jul 19 17:06:22 UTC 2017
==========================================================================
Ubuntu Security Notice USN-3212-3
July 19, 2017
tiff vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 ESM
Summary:
LibTIFF could be made to crash or run programs as your login if it
opened a specially crafted file.
Software Description:
- tiff: Tag Image File Format (TIFF) library
Details:
USN-3212-1 and USN-3212-2 fixed a vulnerabilitiy in LibTIFF. This
update provides a subset of corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
It was discovered that LibTIFF incorrectly handled certain malformed
images. If a user or automated system were tricked into opening a
specially crafted image, a remote attacker could crash the
application, leading to a denial of service, or possibly execute
arbitrary code with user privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 ESM:
libtiff-tools 3.9.5-2ubuntu1.10
libtiff4 3.9.5-2ubuntu1.10
In general, a standard system update will make all the necessary
changes.
References:
https://www.ubuntu.com/usn/usn-3212-3
https://www.ubuntu.com/usn/usn-3212-1
CVE-2015-7554, CVE-2015-8668, CVE-2016-10092, CVE-2016-3623,
CVE-2016-3624, CVE-2016-3632, CVE-2016-3990, CVE-2016-3991,
CVE-2016-5321, CVE-2016-5322, CVE-2016-8331, CVE-2016-9453,
CVE-2016-9533, CVE-2016-9534, CVE-2016-9536, CVE-2016-9537
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: This is a digitally signed message part
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20170719/e43f1724/attachment.sig>
More information about the ubuntu-security-announce
mailing list