You are here
Home > Preporuke > Sigurnosni nedostaci programske biblioteke libtiff

Sigurnosni nedostaci programske biblioteke libtiff

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-3606-1
March 26, 2018

tiff vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 17.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

LibTIFF could be made to crash or run programs as your login if it opened a
specially crafted file.

Software Description:
– tiff: Tag Image File Format (TIFF) library

Details:

It was discovered that LibTIFF incorrectly handled certain malformed
images. If a user or automated system were tricked into opening a specially
crafted image, a remote attacker could crash the application, leading to a
denial of service, or possibly execute arbitrary code with user privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.10:
libtiff-tools 4.0.8-5ubuntu0.1
libtiff5 4.0.8-5ubuntu0.1

Ubuntu 16.04 LTS:
libtiff-tools 4.0.6-1ubuntu0.4
libtiff5 4.0.6-1ubuntu0.4

Ubuntu 14.04 LTS:
libtiff-tools 4.0.3-7ubuntu0.9
libtiff5 4.0.3-7ubuntu0.9

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3606-1
CVE-2016-3186, CVE-2016-5102, CVE-2016-5318, CVE-2017-11613,
CVE-2017-12944, CVE-2017-17095, CVE-2017-18013, CVE-2017-5563,
CVE-2017-9117, CVE-2017-9147, CVE-2017-9935, CVE-2018-5784

Package Information:
https://launchpad.net/ubuntu/+source/tiff/4.0.8-5ubuntu0.1
https://launchpad.net/ubuntu/+source/tiff/4.0.6-1ubuntu0.4
https://launchpad.net/ubuntu/+source/tiff/4.0.3-7ubuntu0.9

—–BEGIN PGP SIGNATURE—–

iQIcBAEBCgAGBQJauPPuAAoJEGVp2FWnRL6TbvEP+wY+GQ/8T4P29jJkJ5cbTEmQ
rXD0nLkCy6GqLFG+7B3nPDw65he8YEOX6Wki+Ywbb9bI0LAKE20jrjmz0Dbslahn
dnYBL2zJRVi5S9nbjJSsq/KQaSVR3SqQtNMIE18IQYLnj06OEgn3/GHamc2Go47q
U/2l4y4qnkuIMzXKzxDT1iyxFACT8xyEKFvwCV5vNMo7zrdnD2F1EoMWlGuqjtr+
B7zt0nKYPM/ZjmENzHFNMnX9nExMKrK8j3Y0qrVSNvCO9zJUMruFbE3NWG2FekSg
3ItmGN1tOtYfx6RoBrqGfP/1Q7HuvysNKLCozusNT2CbBw7ZS+6epX/jdF/vAOBD
gmya8sWQPGPtc7iGfWBJ8LL1HyeqzjO789VWJA97MabFrCcmNpx8lYymeLDD9DYc
AS/JjxttIGtG2jRI9FxBLzxQsvGZR1zLWT6qXQarU5Ycq0OCw+ozEj390CeZ/NP0
H5xNmElp+z8J9IUAcm32FBdW5JnDhHSGkJOvqcLtF7uj75ftXSdS/yxb8sgszlDZ
yvCCO1QMc29eV2fnd0x++Ek8rjanu4ggXre4L2ND+i+FOcMzlCiFaJYRCKRbDeZe
CMHn9E7DUqtItN27ysG8wwsqEiU4dujRyS5N7ctlO/+2ckWDlJRltmcA/lhsFb7p
7/s5bZI2Qxczd5I3keHI
=vdbH
—–END PGP SIGNATURE—–

AutorDanijel Kozinovic
Cert idNCERT-REF-2018-03-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa python-paramiko

Otkriven je sigurnosni nedostatak u programskom paketu python-paramiko za operacijski sustav RHEL. Otkriveni nedostatak potencijalnim napadačima omogućuje zaobilaženje sigurnosnih ograničenja....

Close