Regression when reading CCITTFAX4 files due to fix for CVE-2011-0192 (tif_fax3.h)
Bug #731540 reported by
Even Rouault
This bug affects 5 people
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
LibTIFF |
Fix Released
|
Medium
|
|||
tiff (Fedora) |
Fix Released
|
High
|
|||
tiff (Ubuntu) |
Fix Released
|
Medium
|
Kees Cook | ||
Dapper |
Fix Released
|
Medium
|
Kees Cook | ||
Hardy |
Fix Released
|
Medium
|
Kees Cook | ||
Karmic |
Fix Released
|
Medium
|
Kees Cook | ||
Lucid |
Fix Released
|
Medium
|
Kees Cook | ||
Maverick |
Fix Released
|
Medium
|
Kees Cook | ||
Natty |
Fix Released
|
Medium
|
Kees Cook |
Bug Description
The "* SECURITY UPDATE: denial of service and possible code execution via
buffer overflow in Fax4Decode
- debian/
libtiff/
- CVE-2011-0192" causes a regression when reading CCITFAX4 compressed
TIFF file that could be read successfully before. (before updating to 3.9.2-2ubuntu0.4 it worked, just after it fails)
Reported upstream as http://
Also reported to https:/
Changed in tiff (Ubuntu): | |
status: | New → Confirmed |
Changed in tiff (Ubuntu Lucid): | |
status: | New → In Progress |
importance: | Undecided → Medium |
assignee: | nobody → Kees Cook (kees) |
Changed in tiff (Ubuntu Maverick): | |
status: | New → In Progress |
importance: | Undecided → Medium |
assignee: | nobody → Kees Cook (kees) |
Changed in tiff (Ubuntu Natty): | |
status: | Confirmed → In Progress |
importance: | Undecided → Medium |
assignee: | nobody → Kees Cook (kees) |
Changed in tiff (Ubuntu Dapper): | |
status: | New → In Progress |
importance: | Undecided → Medium |
assignee: | nobody → Kees Cook (kees) |
Changed in tiff (Ubuntu Hardy): | |
status: | New → In Progress |
importance: | Undecided → Medium |
assignee: | nobody → Kees Cook (kees) |
Changed in tiff (Ubuntu Karmic): | |
status: | New → In Progress |
importance: | Undecided → Medium |
assignee: | nobody → Kees Cook (kees) |
Changed in tiff (Ubuntu Lucid): | |
status: | In Progress → Fix Committed |
Changed in tiff (Ubuntu Maverick): | |
status: | In Progress → Fix Committed |
Changed in tiff (Ubuntu Dapper): | |
status: | In Progress → Fix Committed |
Changed in tiff (Ubuntu Hardy): | |
status: | In Progress → Fix Committed |
Changed in tiff (Ubuntu Karmic): | |
status: | In Progress → Fix Committed |
Changed in tiff (Ubuntu Dapper): | |
status: | Fix Committed → Fix Released |
Changed in tiff (Ubuntu Natty): | |
milestone: | none → ubuntu-11.04-beta-1 |
Changed in libtiff: | |
importance: | Unknown → Medium |
status: | Unknown → Confirmed |
Changed in libtiff: | |
status: | Confirmed → Fix Released |
Changed in tiff (Fedora): | |
importance: | Unknown → High |
status: | Unknown → Fix Released |
To post a comment you must log in.
A heap-based buffer overflow was found in the way TIFF (Tagged Image File
Format) image files manipulating library expanded certain rows of 2D-encoded
data, when processing TIFF Internet Fax image files, compressed with CCITT
group 4 compression algorithm. If an attacker created a specially-crafted
image file and tricked a local, unsuspecting user into loading the image
file in an application that uses the TIFF image manipulating library, it
could cause that application to crash or, potentially, execute arbitrary
code with the privileges of the user running the application.