Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.120140
Kategorie:Amazon Linux Local Security Checks
Titel:Amazon Linux: Security Advisory (ALAS-2014-365)
Zusammenfassung:The remote host is missing an update for the 'libtiff' package(s) announced via the ALAS-2014-365 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'libtiff' package(s) announced via the ALAS-2014-365 advisory.

Vulnerability Insight:
Use-after-free vulnerability in the t2p_readwrite_pdf_image function in tools/tiff2pdf.c in libtiff 4.0.3 allows remote attackers to cause a denial of service (crash) or possible execute arbitrary code via a crafted TIFF image.

The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image.

Heap-based buffer overflow in the readgifimage function in the gif2tiff tool in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted height and width values in a GIF image.

Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size.

Affected Software/OS:
'libtiff' package(s) on Amazon Linux.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2013-4231
54543
http://secunia.com/advisories/54543
54628
http://secunia.com/advisories/54628
61695
http://www.securityfocus.com/bid/61695
DSA-2744
http://www.debian.org/security/2013/dsa-2744
RHSA-2014:0223
http://rhn.redhat.com/errata/RHSA-2014-0223.html
[oss-security] 20130809 Re: CVE Request -- Four (stack-based) buffer overflows and one use-after-free in libtiff v4.0.3 reported by Pedro Ribeiro
http://www.openwall.com/lists/oss-security/2013/08/10/2
[tiff] 20130801 Vulnerabilities in libtiff 4.0.3
http://www.asmail.be/msg0055359936.html
http://bugzilla.maptools.org/show_bug.cgi?id=2450
https://bugzilla.redhat.com/show_bug.cgi?id=995965
Common Vulnerability Exposure (CVE) ID: CVE-2013-4232
http://bugzilla.maptools.org/show_bug.cgi?id=2449
https://bugzilla.redhat.com/show_bug.cgi?id=995975
Common Vulnerability Exposure (CVE) ID: CVE-2013-4243
62082
http://www.securityfocus.com/bid/62082
GLSA-201701-16
https://security.gentoo.org/glsa/201701-16
http://bugzilla.maptools.org/show_bug.cgi?id=2451
https://bugzilla.redhat.com/show_bug.cgi?id=996052
Common Vulnerability Exposure (CVE) ID: CVE-2013-4244
http://bugzilla.maptools.org/show_bug.cgi?id=2452
https://bugzilla.redhat.com/show_bug.cgi?id=996468
https://github.com/vadz/libtiff/commit/ce6841d9e41d621ba23cf18b190ee6a23b2cc833
CopyrightCopyright (C) 2015 Greenbone AG

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.