drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in libtiff
Name: |
Zwei Probleme in libtiff |
|
ID: |
USN-1631-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 11.10, Ubuntu 12.04 LTS, Ubuntu 12.10 |
|
Datum: |
Do, 15. November 2012, 16:34 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4447
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4564 |
|
Applikationen: |
libtiff |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --===============3464770596191196972== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enigFFC721758FE299CAD9D768FF"
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enigFFC721758FE299CAD9D768FF Content-Type: text/plain; charset=ISO-8859- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-1631-1 November 15, 2012
tiff vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.10 - Ubuntu 12.04 LTS - Ubuntu 11.10 - Ubuntu 10.04 LTS - Ubuntu 8.04 LTS
Summary:
LibTIFF could be made to crash or run programs as your login if it opened a specially crafted file.
Software Description: - tiff: Tag Image File Format (TIFF) library
Details:
It was discovered that LibTIFF incorrectly handled certain malformed images using the PixarLog compression format. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could crash the application, leading to a denial of service, or possibly execute arbitrary code with user privileges. (CVE-2012-4447)
Huzaifa S. Sidhpurwala discovered that the ppm2tiff tool incorrectly handled certain malformed PPM images. If a user or automated system were tricked into opening a specially crafted PPM image, a remote attacker could crash the application, leading to a denial of service, or possibly execute arbitrary code with user privileges. (CVE-2012-4564)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.10: libtiff5 4.0.2-1ubuntu2.1
Ubuntu 12.04 LTS: libtiff4 3.9.5-2ubuntu1.3
Ubuntu 11.10: libtiff4 3.9.5-1ubuntu1.4
Ubuntu 10.04 LTS: libtiff4 3.9.2-2ubuntu0.11
Ubuntu 8.04 LTS: libtiff4 3.8.2-7ubuntu3.14
In general, a standard system update will make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-1631-1 CVE-2012-4447, CVE-2012-4564
Package Information: https://launchpad.net/ubuntu/+source/tiff/4.0.2-1ubuntu2.1 https://launchpad.net/ubuntu/+source/tiff/3.9.5-2ubuntu1.3 https://launchpad.net/ubuntu/+source/tiff/3.9.5-1ubuntu1.4 https://launchpad.net/ubuntu/+source/tiff/3.9.2-2ubuntu0.11 https://launchpad.net/ubuntu/+source/tiff/3.8.2-7ubuntu3.14
--------------enigFFC721758FE299CAD9D768FF Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://www.enigmail.net/
iQIcBAEBCgAGBQJQpPN5AAoJEGVp2FWnRL6TNuEQAKaxjaWaQ7cK/GKQSxoNMxhT q0Q8A8qij8+RM7P13CNCU57tGtLqEanFctqZHdp2b6iHAXmJ3hyCALJjeOwLJDhw 5iOXhq9ayxDRJxpzZi6jkkHtCHp4ASpRH8ub2y5/4gxYclWnrmwyxM16oCKWu/wr MFwsMfy1K+guCyXBZoitutlBTRuCFbQdahaAPq/17wGp3UBleI8Q5vLx2aED5D8X 8A6z8yxnfYYfdlHxawAebBk/0ZmBKOHbGofL+4c0ASxGLyK6JD21fnZd8R3kencb WUiMjevGvon6kc151IUwe6t2cYe0Pzm8ltx8O5dGwLfHNoQ2Aw7wjHdwfIHpCxCj 84X6V7/iDBi0jiztj6mYeJD8T/GlgdFpDHv2FY1pEIDZOFwaNSlo4NSpM+v+mtB1 r43lQL3Ts4M/3CscwXKu7T+BYqrjYS4j/rugPD8ypl0E2WqVDfJKgxFyMZ34gWzI yfNqSNrSevtBDOrABz0kmyiKAq3+zbSB2s96SlRw+YwCP5RI8oJbZDAMqaiK4j5l rCVPM9Xv3Z9Bz/ggI0Byio0IcYSjptHONX7sRBNrufg/gKAHSNTDQtl5S8BnTuyn Shf+gwns5jXwSFA+6Ghqhe2UVcD6kaKXjLVO2WW/vqGf8tJEcr6gpQgFj8u8LYte HJ3aR4YrWnlT/bPDF+kc =4aj/ -----END PGP SIGNATURE-----
--------------enigFFC721758FE299CAD9D768FF--
--===============3464770596191196972== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============3464770596191196972==--
|
|
|
|