what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2009-169

Mandriva Linux Security Advisory 2009-169
Posted Jul 28, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-169 - Buffer underflow in the LZWDecodeCompat function in libtiff 3.8.2 allows context-dependent attackers to cause a denial of service (crash) via a crafted TIFF image, a different vulnerability than CVE-2008-2327. Fix several places in tiff2rgba and rgb2ycbcr that were being careless about possible integer overflow in calculation of buffer sizes. This update provides fixes for these vulnerabilities.

tags | advisory, denial of service, overflow, vulnerability
systems | linux, mandriva
advisories | CVE-2009-2285, CVE-2009-2347
SHA-256 | 90aff0a5960233fb9cd84f73ebc463ce903c3508c40dd8edf5d93294d238679a

Mandriva Linux Security Advisory 2009-169

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2009:169
http://www.mandriva.com/security/
_______________________________________________________________________

Package : libtiff
Date : July 28, 2009
Affected: Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

Multiple vulnerabilities has been found and corrected in libtiff:

Buffer underflow in the LZWDecodeCompat function in libtiff 3.8.2
allows context-dependent attackers to cause a denial of service (crash)
via a crafted TIFF image, a different vulnerability than CVE-2008-2327
(CVE-2009-2285).

Fix several places in tiff2rgba and rgb2ycbcr that were being careless
about possible integer overflow in calculation of buffer sizes
(CVE-2009-2347).

This update provides fixes for these vulnerabilities.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2285
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2347
_______________________________________________________________________

Updated Packages:

Mandriva Enterprise Server 5:
2bf7a1b4771704f7c72408fe6b944fc0 mes5/i586/libtiff3-3.8.2-12.2mdvmes5.i586.rpm
9b004f438542b42434091ee7f2ff2423 mes5/i586/libtiff3-devel-3.8.2-12.2mdvmes5.i586.rpm
7126e7bace7b14ec2b1f5c42960e0ccd mes5/i586/libtiff3-static-devel-3.8.2-12.2mdvmes5.i586.rpm
ca0f7e4b41bfb512ed4a0d92becb6586 mes5/i586/libtiff-progs-3.8.2-12.2mdvmes5.i586.rpm
53acba6f85576fbfbe2a4a24ab88520f mes5/SRPMS/libtiff-3.8.2-12.2mdvmes5.src.rpm

Mandriva Enterprise Server 5/X86_64:
b20069dd869817ebc68fdc97cf8e4b02 mes5/x86_64/lib64tiff3-3.8.2-12.2mdvmes5.x86_64.rpm
f526910543ec8d419c4b3034a72e9aa3 mes5/x86_64/lib64tiff3-devel-3.8.2-12.2mdvmes5.x86_64.rpm
fe09a51765724e741458509feec0b14a mes5/x86_64/lib64tiff3-static-devel-3.8.2-12.2mdvmes5.x86_64.rpm
5795c86884009e482af8303c28436c04 mes5/x86_64/libtiff-progs-3.8.2-12.2mdvmes5.x86_64.rpm
53acba6f85576fbfbe2a4a24ab88520f mes5/SRPMS/libtiff-3.8.2-12.2mdvmes5.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFKb0iXmqjQ0CJFipgRAvc6AKC9igIrfPUumYiOGgZxZZlTDId62ACg2iRg
C4F/iKStpPgwdTI6Wx49CBw=
=kQyQ
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close