[<prev] [next>] [day] [month] [year] [list]
Message-Id: <200608012240.k71MeCex031013@lambchop.rdu.rpath.com>
Date: Tue, 01 Aug 2006 18:40:12 -0400
From: "Justin M. Forbes" <jmforbes@...th.com>
To: security-announce@...ts.rpath.com,
	update-announce@...ts.rpath.com
Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com,
	lwn@....net
Subject: rPSA-2006-0142-1 libtiff
rPath Security Advisory: 2006-0142-1
Published: 2006-08-01
Products: rPath Linux 1
Rating: Severe
Exposure Level Classification:
    Remote User Deterministic Unauthorized Access
Updated Versions:
    libtiff=/conary.rpath.com@rpl:devel//1/3.8.2-3-0.1
References:
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3459
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3460
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3461
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3462
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3463
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3464
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3465
    https://issues.rpath.com/browse/RPL-558
Description:
    Previous versions of the libtiff package are vulnerable to several
    vulnerabilities which enable attackers to subvert user accounts
    if the users attempt to view intentionally malformed TIFF files.
Powered by blists - more mailing lists