Secunia Security Advisory - Debian has issued an update for tiff. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system.
f93d6edb2b19db6575ed15fb19dbf30c15505d6d96ab3e74fe6d3e51e3626fdf
TITLE:
Debian update for tiff
SECUNIA ADVISORY ID:
SA20021
VERIFY ADVISORY:
http://secunia.com/advisories/20021/
CRITICAL:
Moderately critical
IMPACT:
DoS, System access
WHERE:
>From remote
OPERATING SYSTEM:
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/
Debian GNU/Linux 3.0
http://secunia.com/product/143/
Debian GNU/Linux 3.1
http://secunia.com/product/5307/
DESCRIPTION:
Debian has issued an update for tiff. This fixes some
vulnerabilities, which can be exploited by malicious people to cause
a DoS (Denial of Service) and potentially to compromise a user's
system.
For more information:
SA19838
SOLUTION:
Apply updated packages.
-- Debian GNU/Linux 3.0 alias woody --
Source archives:
http://security.debian.org/pool/updates/main/t/tiff/tiff_3.5.5-7woody1.dsc
Size/MD5 checksum: 637 cf22045e1a49b2742c91b7f0a905adeb
http://security.debian.org/pool/updates/main/t/tiff/tiff_3.5.5-7woody1.diff.gz
Size/MD5 checksum: 38424 d087fb3914b10aef86959b9ed52ec955
http://security.debian.org/pool/updates/main/t/tiff/tiff_3.5.5.orig.tar.gz
Size/MD5 checksum: 693641 3b7199ba793dec6ca88f38bb0c8cc4d8
Alpha architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-7woody1_alpha.deb
Size/MD5 checksum: 141492 484fe914264072028ef4b02b97300ea8
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-7woody1_alpha.deb
Size/MD5 checksum: 106130 65673af7006686eb2718f45abfb39130
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-7woody1_alpha.deb
Size/MD5 checksum: 423888 2bc86fdbf9c751ac7173889e53d6ddcc
ARM architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-7woody1_arm.deb
Size/MD5 checksum: 117008 1f272257c4987092ff80563840acd4e3
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-7woody1_arm.deb
Size/MD5 checksum: 91560 e84fa486a3f25e69d7d6b093a8d890e4
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-7woody1_arm.deb
Size/MD5 checksum: 404854 b709c95f40e52e4e1003dbf6e5c768f7
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-7woody1_i386.deb
Size/MD5 checksum: 112074 0f9fb0719cb1ed7b5954b8c70d9c9049
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-7woody1_i386.deb
Size/MD5 checksum: 82018 c8f11403adfa3ec5695d5468f56401b2
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-7woody1_i386.deb
Size/MD5 checksum: 387406 1c2350b56c49cde7b899d6e8261397ec
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-7woody1_ia64.deb
Size/MD5 checksum: 158788 883e3b5861f0f3610e6d1005ca760d3d
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-7woody1_ia64.deb
Size/MD5 checksum: 136620 846e662216862a10e53e282a316400a6
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-7woody1_ia64.deb
Size/MD5 checksum: 447038 73838b902a9dd1bb26146a397eb692db
HP Precision architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-7woody1_hppa.deb
Size/MD5 checksum: 128282 eea419b6a514c4971d8cce8afe701b6e
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-7woody1_hppa.deb
Size/MD5 checksum: 107664 b71f9194d14e10758a13259654fcc410
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-7woody1_hppa.deb
Size/MD5 checksum: 420756 235956ededa69f803954040c8be01033
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-7woody1_m68k.deb
Size/MD5 checksum: 107256 9d10fc534cf1bf95c16dd5db5373334c
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-7woody1_m68k.deb
Size/MD5 checksum: 80700 9a1986ea34f0b86b3bfb5255315528d5
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-7woody1_m68k.deb
Size/MD5 checksum: 380346 7ec9a504a5c39a3d2e2bddec81be6bc6
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-7woody1_mips.deb
Size/MD5 checksum: 124018 a4f309ec307e0b965578ed940d4a0ea9
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-7woody1_mips.deb
Size/MD5 checksum: 88772 1923797ce7bcc87a5717e9916314ba06
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-7woody1_mips.deb
Size/MD5 checksum: 411214 f27e5579da8ca6a547286e5e7585cb86
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-7woody1_mipsel.deb
Size/MD5 checksum: 123542 ea78a9c8d14ff4627b7f01846334789b
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-7woody1_mipsel.deb
Size/MD5 checksum: 89078 6cb7602c3c14127a9df23b4b250a90cf
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-7woody1_mipsel.deb
Size/MD5 checksum: 411310 b2b76ce9f914e4f8b27f4587a0777ccc
PowerPC architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-7woody1_powerpc.deb
Size/MD5 checksum: 116098 3b39efd8b84ee2e30c9f5bae6e71733b
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-7woody1_powerpc.deb
Size/MD5 checksum: 90574 b0d0cff70a07f0257ec0ebeb58e34d37
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-7woody1_powerpc.deb
Size/MD5 checksum: 403134 b56fb0d12f26942ab109256bcf2b6c5f
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-7woody1_s390.deb
Size/MD5 checksum: 116916 e2bf80099e059ded08e58da8cecf296f
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-7woody1_s390.deb
Size/MD5 checksum: 92756 e2fedfbfd543ffdbcfbe670b63f6a7bc
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-7woody1_s390.deb
Size/MD5 checksum: 395662 0648812bd3022237c75085deba6524c3
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.5.5-7woody1_sparc.deb
Size/MD5 checksum: 132898 427a7a7666e5d5099368fc8290652e9a
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g_3.5.5-7woody1_sparc.deb
Size/MD5 checksum: 89748 1d42ae0eb84771f168696e118762a5c9
http://security.debian.org/pool/updates/main/t/tiff/libtiff3g-dev_3.5.5-7woody1_sparc.deb
Size/MD5 checksum: 397464 380f640a527e6a2cc659bd191f168631
-- Debian GNU/Linux 3.1 alias sarge --
Source archives:
http://security.debian.org/pool/updates/main/t/tiff/tiff_3.7.2-3sarge1.dsc
Size/MD5 checksum: 750 5292d79663e45dc1a815fdf4fbced88f
http://security.debian.org/pool/updates/main/t/tiff/tiff_3.7.2-3sarge1.diff.gz
Size/MD5 checksum: 10929 0dc2c9b82a80b9aa72844089feeaf5b2
http://security.debian.org/pool/updates/main/t/tiff/tiff_3.7.2.orig.tar.gz
Size/MD5 checksum: 1252995 221679f6d5c15670b3c242cbfff79a00
Alpha architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-3sarge1_alpha.deb
Size/MD5 checksum: 46780 32137fed99cfe1e4abf975b76e53e534
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-3sarge1_alpha.deb
Size/MD5 checksum: 243516 cebb5556cac9f8a2989ce719175510de
http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-3sarge1_alpha.deb
Size/MD5 checksum: 478224 075e9d2d41cecc0a12099004e2a3f5e5
http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-3sarge1_alpha.deb
Size/MD5 checksum: 309642 b21266c7e4769ff718441113d6f06776
http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-3sarge1_alpha.deb
Size/MD5 checksum: 40902 1300556889de2ca4a1db5fa67faf521d
AMD64 architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-3sarge1_amd64.deb
Size/MD5 checksum: 45708 aa3ec93031ee68464e1d179fa93a996d
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-3sarge1_amd64.deb
Size/MD5 checksum: 217720 95fba37c5822a8a76b049ff7c8f0e3e3
http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-3sarge1_amd64.deb
Size/MD5 checksum: 459198 f73e3337905b20f021f21430e5d1cd6a
http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-3sarge1_amd64.deb
Size/MD5 checksum: 266792 1d05b2504f1024b4ea1e42b939dd23d3
http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-3sarge1_amd64.deb
Size/MD5 checksum: 40466 e99bcfb2c1c196a3a5883645e0e87f59
ARM architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-3sarge1_arm.deb
Size/MD5 checksum: 45226 493405e066e7e4e34382785c61ed63aa
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-3sarge1_arm.deb
Size/MD5 checksum: 208348 cebc75bc41462e3bbec3bb680782f2ae
http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-3sarge1_arm.deb
Size/MD5 checksum: 453422 17e77299f3cfed68c18d45e49bfb0cdc
http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-3sarge1_arm.deb
Size/MD5 checksum: 265098 a7fe69596d51036b8bc1aca3ddb4ffce
http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-3sarge1_arm.deb
Size/MD5 checksum: 39974 0bcc5bbbca1a4a5e68c4915e71aa5264
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-3sarge1_i386.deb
Size/MD5 checksum: 45070 6d615bf5aabdb87e53b392e56d67a31c
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-3sarge1_i386.deb
Size/MD5 checksum: 206070 d243294914c50dd2184459ac4056d4da
http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-3sarge1_i386.deb
Size/MD5 checksum: 452436 aaa4c81b1731ea3b936cef591ae0094d
http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-3sarge1_i386.deb
Size/MD5 checksum: 251548 c769d9abda84f2581a0918d8d0e14ad6
http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-3sarge1_i386.deb
Size/MD5 checksum: 40518 1d1983f8b8d910d829024f0e68c3f430
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-3sarge1_ia64.deb
Size/MD5 checksum: 48174 95f9a574537c9e4749b61d36ba7f0c4b
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-3sarge1_ia64.deb
Size/MD5 checksum: 268840 e7ada3b6f4dede0cc615f2e357c7f1b6
http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-3sarge1_ia64.deb
Size/MD5 checksum: 510948 baa9e6bb3e5b47c20f12648c683ad650
http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-3sarge1_ia64.deb
Size/MD5 checksum: 330612 7e23b99dfd8e7611ce90eec63ee7f298
http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-3sarge1_ia64.deb
Size/MD5 checksum: 42102 4398a87b268ef69b54adac33e616252e
HP Precision architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-3sarge1_hppa.deb
Size/MD5 checksum: 46506 626e3e1f6704a8f1660c079c15c55f5d
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-3sarge1_hppa.deb
Size/MD5 checksum: 230020 a7a58223d62a7929b7810628efaf7ec4
http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-3sarge1_hppa.deb
Size/MD5 checksum: 472842 c051e1c0b5853f695c193ac6e45996ff
http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-3sarge1_hppa.deb
Size/MD5 checksum: 281488 ac8dff3f4c0e06f9634871431da84272
http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-3sarge1_hppa.deb
Size/MD5 checksum: 41158 58bbe3291069c661e9ec2206ea15b787
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-3sarge1_m68k.deb
Size/MD5 checksum: 45082 5b41876dbeb2620959880fe2255151c3
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-3sarge1_m68k.deb
Size/MD5 checksum: 193346 d19e70706a4f421421360dcbf50f79bc
http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-3sarge1_m68k.deb
Size/MD5 checksum: 442584 feb24367354884bfbcb260fc81308192
http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-3sarge1_m68k.deb
Size/MD5 checksum: 234324 e15dd919316bb5a1392b2c8a1c1d230a
http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-3sarge1_m68k.deb
Size/MD5 checksum: 40108 0c96a6175862ef00c892752b91f4558f
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-3sarge1_mips.deb
Size/MD5 checksum: 45966 01b790d715989a69e712102d7f75bb9b
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-3sarge1_mips.deb
Size/MD5 checksum: 252098 703f77c67402e375af6042803c0a853c
http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-3sarge1_mips.deb
Size/MD5 checksum: 458446 39e019da604ea401404262d1148e67e2
http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-3sarge1_mips.deb
Size/MD5 checksum: 280364 e69fd2380a2aac192e81f548461586db
http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-3sarge1_mips.deb
Size/MD5 checksum: 40746 ecc9da81ea37deff720a8a1f4b146680
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-3sarge1_mipsel.deb
Size/MD5 checksum: 45924 2cf8e9413e317a7ca6db5a25115e3198
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-3sarge1_mipsel.deb
Size/MD5 checksum: 252556 c0bc05bdc88e29e400bc011457b8e80c
http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-3sarge1_mipsel.deb
Size/MD5 checksum: 458864 8c07f54637d99e347f3a87fd2e40ef21
http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-3sarge1_mipsel.deb
Size/MD5 checksum: 280238 94681c55971b4fe94869ad558e625139
http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-3sarge1_mipsel.deb
Size/MD5 checksum: 40730 9482ea1a711ff8cec430b1c909c2dc58
PowerPC architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-3sarge1_powerpc.deb
Size/MD5 checksum: 47144 96335b6a94658bb97852948f6abd538a
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-3sarge1_powerpc.deb
Size/MD5 checksum: 235298 d77e58b3988c957830e076beefba79ec
http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-3sarge1_powerpc.deb
Size/MD5 checksum: 460428 2185eb42d4629fd7615c6d267a8d3f64
http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-3sarge1_powerpc.deb
Size/MD5 checksum: 271916 4eb6af54a34a4441819248611e2b2ed3
http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-3sarge1_powerpc.deb
Size/MD5 checksum: 42316 5d14ce57ad1b666dbe99301221623d9c
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-3sarge1_s390.deb
Size/MD5 checksum: 46096 c275b88c86572311c723910cf626305e
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-3sarge1_s390.deb
Size/MD5 checksum: 213682 96082e599832fb8d0a7e9df202ee411b
http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-3sarge1_s390.deb
Size/MD5 checksum: 465848 c90098e745601ac1409d18144a55d32f
http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-3sarge1_s390.deb
Size/MD5 checksum: 266562 b378324e62843c012a0bf64a24da00d5
http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-3sarge1_s390.deb
Size/MD5 checksum: 40742 eeabd51cc38bb74ede6c5b0c9c7dca78
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-3sarge1_sparc.deb
Size/MD5 checksum: 45394 3bcb5ac9c212b0aace2c71b8812d5e52
http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-3sarge1_sparc.deb
Size/MD5 checksum: 205236 58f316a2cc2041988b64551a70b45cef
http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-3sarge1_sparc.deb
Size/MD5 checksum: 454594 01c1d5c7d7ee0fa4729a1bfa83fd9273
http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-3sarge1_sparc.deb
Size/MD5 checksum: 257742 b8af195da2e880cbae59826bf84b8d32
http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-3sarge1_sparc.deb
Size/MD5 checksum: 40470 02164452e05683ad474441be7beadb37
-- Debian GNU/Linux unstable alias sid --
The vulnerabilities will reportedly be fixed soon.
ORIGINAL ADVISORY:
http://www.us.debian.org/security/2006/dsa-1054
OTHER REFERENCES:
SA19838:
http://secunia.com/advisories/19838/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------