[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3762-1 tiff -- tiff

ID: oval:org.secpod.oval:def:602743Date: (C)2017-01-17   (M)2023-12-26
Class: PATCHFamily: unix




Multiple vulnerabilities have been discovered in the libtiff library and the included tools tiff2rgba, rgb2ycbcr, tiffcp, tiffcrop, tiff2pdf and tiffsplit, which may result in denial of service, memory disclosure or the execution of arbitrary code. There were additional vulnerabilities in the tools bmp2tiff, gif2tiff, thumbnail and ras2tiff, but since these were addressed by the libtiff developers by removing the tools altogether, no patches are available and those tools were also removed from the tiff package in Debian stable. The change had already been made in Debian stretch before and no applications included in Debian are known to rely on these scripts. If you use those tools in custom setups, consider using a different conversion/thumbnailing tool.

Platform:
Debian 8.x
Product:
libtiff5
Reference:
DSA-3762-1
CVE-2016-3622
CVE-2016-3623
CVE-2016-3624
CVE-2016-3945
CVE-2016-3990
CVE-2016-3991
CVE-2016-5314
CVE-2016-5315
CVE-2016-5316
CVE-2016-5317
CVE-2016-5321
CVE-2016-5322
CVE-2016-5323
CVE-2016-5652
CVE-2016-6223
CVE-2016-9273
CVE-2016-9297
CVE-2016-9448
CVE-2016-9453
CVE-2016-9532
CVE-2016-9533
CVE-2016-9534
CVE-2016-9535
CVE-2016-9536
CVE-2016-9537
CVE-2016-9538
CVE-2016-9540
CVE-2016-10092
CVE-2016-10093
CVE-2016-10094
CVE    30
CVE-2016-10092
CVE-2016-9534
CVE-2016-9532
CVE-2016-10094
...
CPE    7
cpe:/o:debian:debian_linux:9.0
cpe:/o:debian:debian_linux:8.x
cpe:/a:libtiff:libtiff
cpe:/a:libtiff:libtiff:4.0.7
...

© SecPod Technologies