libtiff-3.8.2-18.AXS3
エラータID: AXSA:2012-1055:03
The libtiff package contains a library of functions for manipulating TIFF (Tagged Image File Format) image format files. TIFF is a widely used file format for bitmapped images. TIFF files usually end in the .tif extension and they are often quite large.
The libtiff package should be installed if you need to manipulate TIFF format image files.
Security issues fixed with this release:
• CVE-2012-3401
The t2p_read_tiff_init function in tiff2pdf (tools/tiff2pdf.c) in LibTIFF 4.0.2 and earlier does not properly initialize the T2P context struct pointer in certain error conditions, which allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image that triggers a heap-based buffer overflow.
• CVE-2012-4447
Heap-based buffer overflow in tif_pixarlog.c in LibTIFF before 4.0.3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted TIFF image using the PixarLog Compression format.
• CVE-2012-4564
ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow.
• CVE-2012-5581
No description available at the time of writing, please refer to the CVE link below.
Update packages.
The t2p_read_tiff_init function in tiff2pdf (tools/tiff2pdf.c) in LibTIFF 4.0.2 and earlier does not properly initialize the T2P context struct pointer in certain error conditions, which allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image that triggers a heap-based buffer overflow.
Heap-based buffer overflow in tif_pixarlog.c in LibTIFF before 4.0.3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted TIFF image using the PixarLog Compression format.
ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow.
Stack-based buffer overflow in tif_dir.c in LibTIFF before 4.0.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DOTRANGE tag in a TIFF image.
N/A
Asianux Server 3 for x86
- libtiff-3.8.2-18.AXS3.i386.rpm
MD5: 0cab5219a509c973db4f6c3cc7b0d687
SHA-256: dc40e56583e7040922eeb5d65dd81007e113825a5fc81b99876c2c383815d0a1
Size: 311.50 kB - libtiff-devel-3.8.2-18.AXS3.i386.rpm
MD5: caf008dfef12ab4105ff2d8c1e1a01a1
SHA-256: 011f2849d646103f8f0f6861229333325a4d463cbb6ecd036ed8cb78d6640078
Size: 470.27 kB
Asianux Server 3 for x86_64
- libtiff-3.8.2-18.AXS3.x86_64.rpm
MD5: bfab5ac4100aef02b397ab47ccd4eadc
SHA-256: 23b19ac7834cd0bf8519c94a24f205b9dbcbeadec95bce59e22e77165253385b
Size: 316.26 kB - libtiff-devel-3.8.2-18.AXS3.x86_64.rpm
MD5: 5776968eefd3f1d1f86432a5c0ef0263
SHA-256: 6a8cfb56b5760dd01d9c7af121678b1b0cd39433547557649b66ea4bafaff1e6
Size: 470.19 kB