lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <m1FjzI8-000ofRC__6241.81263051486$1148764457$gmane$org@finlandia.Infodrom.North.DE>
Date: Sat, 27 May 2006 15:57:20 +0200 (CEST)
From: joey@...odrom.org (Martin Schulze)
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 1078-1] New tiff packages fix denial of service


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1078-1                    security@...ian.org
http://www.debian.org/security/                             Martin Schulze
May 27th, 2006                        http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : tiff
Vulnerability  : out-of-bounds read
Problem type   : local (remote)
Debian-specific: no
CVE ID         : CVE-2006-2120
BugTraq ID     : 17809
Debian Bug     : 366588

Andrey Kiselev discovered a problem in the TIFF library that may allow
an attacker with a specially crafted TIFF image with Yr/Yg/Yb values
that exceed the YCR/YCG/YCB values to crash the library and hence the
surrounding application.

The old stable distribution (woody) is not affected by this problem.

For the stable distribution (sarge) this problem has been fixed in
version 3.7.2-4.

The unstable distribution (sid) is not affected by this problem.

We recommend that you upgrade your tiff packages and restart the
programs using it.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/t/tiff/tiff_3.7.2-4.dsc
      Size/MD5 checksum:      736 e0021d24806e337d1fbb1f07de784ba2
    http://security.debian.org/pool/updates/main/t/tiff/tiff_3.7.2-4.diff.gz
      Size/MD5 checksum:    11234 cca061e95cccee07e8536d0c019e466c
    http://security.debian.org/pool/updates/main/t/tiff/tiff_3.7.2.orig.tar.gz
      Size/MD5 checksum:  1252995 221679f6d5c15670b3c242cbfff79a00

  Alpha architecture:

    http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-4_alpha.deb
      Size/MD5 checksum:    46854 d9bfc8b23ef18313f418a6428a997ab3
    http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-4_alpha.deb
      Size/MD5 checksum:   243572 cfc1c2e69fd26f6fd00e80fc2060e214
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-4_alpha.deb
      Size/MD5 checksum:   478314 f169fa8a48b6e88fc0caea7d55fdcf04
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-4_alpha.deb
      Size/MD5 checksum:   309820 ff5d90bfd292db105f8613d618124084
    http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-4_alpha.deb
      Size/MD5 checksum:    40962 d5a3d88cb65ccde5243a576de9f32801

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-4_amd64.deb
      Size/MD5 checksum:    45776 3dcbd8b4f6738375e596faf777a4f824
    http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-4_amd64.deb
      Size/MD5 checksum:   217792 ed3b23887f2406380aecf5c87f0ca471
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-4_amd64.deb
      Size/MD5 checksum:   459322 1b5e6430f73c9862a6771a5f48fe82f8
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-4_amd64.deb
      Size/MD5 checksum:   266904 814c8a97e386f73def4ed6612e2dbbf6
    http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-4_amd64.deb
      Size/MD5 checksum:    40548 8bd17da7fc319403082125b6b16d8e05

  ARM architecture:

    http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-4_arm.deb
      Size/MD5 checksum:    45296 db835b005471c02c8e70f9307f575799
    http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-4_arm.deb
      Size/MD5 checksum:   208400 c257593052a9b59bf4a8ce0f002c7648
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-4_arm.deb
      Size/MD5 checksum:   453488 32f3da61807b63176b0867b196c8e737
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-4_arm.deb
      Size/MD5 checksum:   265160 1be7d1c3ad694b68d29fa545e901b56e
    http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-4_arm.deb
      Size/MD5 checksum:    40030 7c9131c151c161977d1b7fa5976e691e

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-4_i386.deb
      Size/MD5 checksum:    45132 1fc191c2b6c8439a5d4679790770191b
    http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-4_i386.deb
      Size/MD5 checksum:   206130 7f5797ca49fe57dd94b5a1f017e40665
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-4_i386.deb
      Size/MD5 checksum:   452520 a1d15c07bef2bc43d64e9e934e2bb156
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-4_i386.deb
      Size/MD5 checksum:   251650 2f5aaeae03e06396d277d537b3bce2ba
    http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-4_i386.deb
      Size/MD5 checksum:    40582 461d11f346fa421e48c3b5de8873a3d0

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-4_ia64.deb
      Size/MD5 checksum:    48250 3ecaec89588a5d8d76fb870f57272d24
    http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-4_ia64.deb
      Size/MD5 checksum:   268880 5ee821331c1b69fcf1ab5730292886a5
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-4_ia64.deb
      Size/MD5 checksum:   511114 3509eed54bbd43554dd230e70f785660
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-4_ia64.deb
      Size/MD5 checksum:   330812 fc93932aa45b25f04f215364c5bb304a
    http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-4_ia64.deb
      Size/MD5 checksum:    42172 ceb9f32b06db1abe66bb7a4d6d433dcf

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-4_hppa.deb
      Size/MD5 checksum:    41814 767e8a29ea8e12fad3bd508acb0cc3ed
    http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-4_hppa.deb
      Size/MD5 checksum:   230076 4b841231ed80cacd9b0c49170bf15a97
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-4_hppa.deb
      Size/MD5 checksum:   473032 c97e959fedf65c3dc45a3b0ac20a111f
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-4_hppa.deb
      Size/MD5 checksum:   281566 7f00d2017a1ead25083a775b9a14bf92
    http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-4_hppa.deb
      Size/MD5 checksum:    41230 d66a6ec6d56eab8abd045a1af38ac41c

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-4_m68k.deb
      Size/MD5 checksum:    45148 71ce37b7ab06f65c85d3e3df96df4629
    http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-4_m68k.deb
      Size/MD5 checksum:   193400 3dddfa40c162c52a68f7bb408f120a43
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-4_m68k.deb
      Size/MD5 checksum:   442684 f7c40c9c6ef836bf2355a127a7ee0427
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-4_m68k.deb
      Size/MD5 checksum:   234430 97bc16b9a0c118354244195626b4c41f
    http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-4_m68k.deb
      Size/MD5 checksum:    40194 7595030ca4135f7119bb3129b0932ea9

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-4_mips.deb
      Size/MD5 checksum:    46040 107792cc52f67039d7052d45f24aac70
    http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-4_mips.deb
      Size/MD5 checksum:   252122 f81805bf9f8a009a56d9527fc46b33fe
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-4_mips.deb
      Size/MD5 checksum:   458562 70444e106a768d8833ddaa02eceff020
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-4_mips.deb
      Size/MD5 checksum:   280456 e8610464e76cecdb9a99bb0c0c013567
    http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-4_mips.deb
      Size/MD5 checksum:    40822 cb372f45ca6c88d866f757e1a4c01929

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-4_mipsel.deb
      Size/MD5 checksum:    46002 a5300e63a5566259670cd1327c451771
    http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-4_mipsel.deb
      Size/MD5 checksum:   252594 386bedb09b018f558e54b05c3525aa55
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-4_mipsel.deb
      Size/MD5 checksum:   458910 10053a120d4c5565e844dd6e90ee238b
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-4_mipsel.deb
      Size/MD5 checksum:   280324 ae4d54a959ce4b4c572f2403ead36c6d
    http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-4_mipsel.deb
      Size/MD5 checksum:    40798 1c05b23e49ccd41db8f4d9c876e2e36c

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-4_powerpc.deb
      Size/MD5 checksum:    47210 fe939778aa55beafd89336df1b3c322e
    http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-4_powerpc.deb
      Size/MD5 checksum:   235362 defadd716ddb33d75ba14000cdbe0076
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-4_powerpc.deb
      Size/MD5 checksum:   460564 566779844370fed3702c02b4416dba49
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-4_powerpc.deb
      Size/MD5 checksum:   272002 3a34ea3b3eb8691d5e2679d0fa6247e6
    http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-4_powerpc.deb
      Size/MD5 checksum:    42394 0193c740ac4c629eb3c80ce28f3cfb11

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-4_s390.deb
      Size/MD5 checksum:    46166 ea2bda56e24b29c06d91e3bd1c63cff7
    http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-4_s390.deb
      Size/MD5 checksum:   213746 211d29444ac8596b177f40a650a4bee2
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-4_s390.deb
      Size/MD5 checksum:   465962 c465a95587ba28c39a0bc213f04a2b18
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-4_s390.deb
      Size/MD5 checksum:   266682 bdeb0f604b6a6c6420f94defb9a0d930
    http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-4_s390.deb
      Size/MD5 checksum:    40812 e5b76ee32d41a8094cfde0af0566356b

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-4_sparc.deb
      Size/MD5 checksum:    45466 c798e777f7714a44a8c25747ee34f94c
    http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-4_sparc.deb
      Size/MD5 checksum:   205304 766577556058b3a3387ae82a1139f4e5
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-4_sparc.deb
      Size/MD5 checksum:   454738 b8b94ac00a5a78f5aad3b8c0f8c13a7d
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-4_sparc.deb
      Size/MD5 checksum:   257860 64d54fae38c0647f0fab3b5127432a29
    http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-4_sparc.deb
      Size/MD5 checksum:    40540 543e3e614f20101d54ebe9aacf6a4cbf


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEeFq/W5ql+IAeqTIRAhkYAJ9Nz/9TZbaj5vq8hrEgtCVE6EG8lQCgoU7x
U6r9qUH0vLHRbSwsDUVcFvg=
=gjYg
-----END PGP SIGNATURE-----



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ