lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20060802182812.CDE7AFDDD@finlandia.home.infodrom.org>
Date: Wed,  2 Aug 2006 20:28:12 +0200 (CEST)
From: joey@...odrom.org (Martin Schulze)
To: debian-security-announce@...ts.debian.org (Debian Security Announcements)
Cc: 
Subject: [SECURITY] [DSA 1137-1] New tiff packages fix
	several vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1137-1                    security@...ian.org
http://www.debian.org/security/                             Martin Schulze
August 2nd, 2006                        http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : tiff
Vulnerability  : several
Problem type   : local (remote)
Debian-specific: no
CVE IDs        : CVE-2006-3459 CVE-2006-3460 CVE-2006-3461 CVE-2006-3462
                 CVE-2006-3463 CVE-2006-3464 CVE-2006-3465

Tavis Ormandy of the Google Security Team discovered several problems
in the TIFF library.  The Common Vulnerabilities and Exposures project
identifies the following issues:

CVE-2006-3459

    Several stack-buffer overflows have been discovered.

CVE-2006-3460

    A heap overflow vulnerability in the JPEG decoder may overrun a
    buffer with more data than expected.

CVE-2006-3461

    A heap overflow vulnerability in the PixarLog decoder may allow an
    attacker to execute arbitrary code.

CVE-2006-3462

    A heap overflow vulnerability has been discovered in the NeXT RLE
    decoder.

CVE-2006-3463

    An loop was discovered where a 16bit unsigned short was used to
    iterate over a 32bit unsigned value so that the loop would never
    terminate and continue forever.

CVE-2006-3464

    Multiple unchecked arithmetic operations were uncovered, including
    a number of the range checking operations designed to ensure the
    offsets specified in TIFF directories are legitimate.

CVE-2006-3465

    A flaw was also uncovered in libtiffs custom tag support which may
    result in abnormal behaviour, crashes, or potentially arbitrary
    code execution.

For the stable distribution (sarge) these problems have been fixed in
version 3.7.2-7.

For the unstable distribution (sid) these problems have been fixed in
version 3.8.2-6.

We recommend that you upgrade your libtiff packages.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/t/tiff/tiff_3.7.2-7.dsc
      Size/MD5 checksum:      736 ce0ffb8cdd1130153deaefa8b59abe81
    http://security.debian.org/pool/updates/main/t/tiff/tiff_3.7.2-7.diff.gz
      Size/MD5 checksum:    17174 ff485016221ededfc8ce649538322211
    http://security.debian.org/pool/updates/main/t/tiff/tiff_3.7.2.orig.tar.gz
      Size/MD5 checksum:  1252995 221679f6d5c15670b3c242cbfff79a00

  Alpha architecture:

    http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-7_alpha.deb
      Size/MD5 checksum:    47112 a4f7feea087ba03a84f745ee79a7ff56
    http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-7_alpha.deb
      Size/MD5 checksum:   243840 f7abb618f36082be959f6e3c9a99cf8f
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-7_alpha.deb
      Size/MD5 checksum:   479064 c137c6857ed320928f182115fbd94b21
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-7_alpha.deb
      Size/MD5 checksum:   311206 c202ef6404c23ea7dc999c03e586c07f
    http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-7_alpha.deb
      Size/MD5 checksum:    41228 53c5979e8c2556e5a19607c19e862368

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-7_amd64.deb
      Size/MD5 checksum:    46036 bc6d0c7db57a1dcae4b8dd65b4640243
    http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-7_amd64.deb
      Size/MD5 checksum:   218060 d09ef1de8b31f074d2f05c7522858cf1
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-7_amd64.deb
      Size/MD5 checksum:   459964 8be097d74ac788d87a8358b8f9e68d79
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-7_amd64.deb
      Size/MD5 checksum:   267872 cc0a4241cd53de29b561286fcd91cf2c
    http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-7_amd64.deb
      Size/MD5 checksum:    40804 136bc49ad0c85dc6fa9f61242cf97c05

  ARM architecture:

    http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-7_arm.deb
      Size/MD5 checksum:    45536 0253b94c6f94a33c9942568f9093fedd
    http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-7_arm.deb
      Size/MD5 checksum:   208630 45e2ef6af43bfbddb4aee00b659d287a
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-7_arm.deb
      Size/MD5 checksum:   454194 354e1b4560b4a407c4b4faf5d2555b20
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-7_arm.deb
      Size/MD5 checksum:   266148 f535b441d81a7786815d954c843b9c81
    http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-7_arm.deb
      Size/MD5 checksum:    40304 fcd0980c8fc2dedaa8a6380e0d4736bd

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-7_i386.deb
      Size/MD5 checksum:    45400 e51d8f157a2ef94cbc4e893f756be29a
    http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-7_i386.deb
      Size/MD5 checksum:   206412 69a3c66b2c9733653e6e7f667ab260b3
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-7_i386.deb
      Size/MD5 checksum:   453078 267f8f361f0dc87f40c8bc37d4785f57
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-7_i386.deb
      Size/MD5 checksum:   252412 5720af1515d6c9ce04f0e7abea045955
    http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-7_i386.deb
      Size/MD5 checksum:    40850 18710ba8ae073bd5a6e7b3c299cbae23

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-7_ia64.deb
      Size/MD5 checksum:    48512 c57280d747f62859c4477a0f1dcbcfef
    http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-7_ia64.deb
      Size/MD5 checksum:   269156 277ad4a79cd2148991134c6ed8c029fe
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-7_ia64.deb
      Size/MD5 checksum:   511782 4b64fd28c917e7e2e158c7244cfc892d
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-7_ia64.deb
      Size/MD5 checksum:   331790 614a46318d671800caab21e26df9c1bf
    http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-7_ia64.deb
      Size/MD5 checksum:    42450 af80a3234e174d9f15bbb4e68d2b558f

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-7_hppa.deb
      Size/MD5 checksum:    46846 e863b11db8f25a221776ea306eeb1539
    http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-7_hppa.deb
      Size/MD5 checksum:   230316 9ccb777cf49096a2dabf144de609b83c
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-7_hppa.deb
      Size/MD5 checksum:   473764 6938692095c40fba1f5feca1efd243a8
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-7_hppa.deb
      Size/MD5 checksum:   282648 68ffb8ebaac2404aa1f9a709e83abfc6
    http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-7_hppa.deb
      Size/MD5 checksum:    41476 4327a6e2887ab7d5bb69d0476186d69e

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-7_m68k.deb
      Size/MD5 checksum:    45408 e33d428b54a5776181803c28475e2a30
    http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-7_m68k.deb
      Size/MD5 checksum:   193578 d7f3db57205002a50354df9cc1e74767
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-7_m68k.deb
      Size/MD5 checksum:   443280 2e982f2b17745777ff6e249f627b1b4c
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-7_m68k.deb
      Size/MD5 checksum:   235056 c362aaa8589f44a3dc533143c37fd16b
    http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-7_m68k.deb
      Size/MD5 checksum:    40450 279a59887fd7a90b9d92415a07fe87f1

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-7_mips.deb
      Size/MD5 checksum:    46300 c26b165f7098aa083170b90c8002406e
    http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-7_mips.deb
      Size/MD5 checksum:   252404 77b6d4382ee49bab1d3b94ea69d3bd88
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-7_mips.deb
      Size/MD5 checksum:   459088 34e8d02f8bac8bc4b059bc36109dda66
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-7_mips.deb
      Size/MD5 checksum:   281156 c2bf726c93de2c1ce1cb289d65fec892
    http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-7_mips.deb
      Size/MD5 checksum:    41086 85b8389df1df050f12fd87488ab46c02

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-7_mipsel.deb
      Size/MD5 checksum:    46256 8a1cc8fbd9e7679f2ec722f46a300fe1
    http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-7_mipsel.deb
      Size/MD5 checksum:   252820 876a24a6b4b49d19eb2d425f7271528e
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-7_mipsel.deb
      Size/MD5 checksum:   459392 f1d09bb13a31f8ec73922f50d538b073
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-7_mipsel.deb
      Size/MD5 checksum:   280986 eff50ab58f511148d9d56ecbbc02c162
    http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-7_mipsel.deb
      Size/MD5 checksum:    41066 7490a101b2de00f6f458359f64b05daa

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-7_powerpc.deb
      Size/MD5 checksum:    47462 3eaaac85e15b48dd1add1fb314de9b74
    http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-7_powerpc.deb
      Size/MD5 checksum:   235624 2d13e7c1769aab6d8a051817009d10ca
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-7_powerpc.deb
      Size/MD5 checksum:   461300 94dddf225b2130da2daca1ec54b2c0b0
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-7_powerpc.deb
      Size/MD5 checksum:   272868 0517f72923504549f4acf0fab1e1924f
    http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-7_powerpc.deb
      Size/MD5 checksum:    42658 9dd0f68f37713263bc9a729d7216b35f

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-7_s390.deb
      Size/MD5 checksum:    46422 039bfe0dde0063b276a57c1414a6d9ca
    http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-7_s390.deb
      Size/MD5 checksum:   214056 b87d71aa653f45726d3b4ecd60b226b3
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-7_s390.deb
      Size/MD5 checksum:   466474 6b6e2dd8152760e65d2af459deac62fc
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-7_s390.deb
      Size/MD5 checksum:   267648 fc8d5662348991874f47953f20102b38
    http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-7_s390.deb
      Size/MD5 checksum:    41078 090b4edea314fadf183bb31fd891be34

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.7.2-7_sparc.deb
      Size/MD5 checksum:    45706 955588f87bf3796b962c6f18ad5ecbb3
    http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.7.2-7_sparc.deb
      Size/MD5 checksum:   205502 710eb39e993e988dcc1abc5cefd2f559
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.7.2-7_sparc.deb
      Size/MD5 checksum:   455492 76e4acd2000175c52d60f6b6f53aaa25
    http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.7.2-7_sparc.deb
      Size/MD5 checksum:   258764 c33aacda7a8162ff5ba7fd9399e347a6
    http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0_3.7.2-7_sparc.deb
      Size/MD5 checksum:    40806 cefaef4ab3ed03fdeeec97a40081721f


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFE0O68W5ql+IAeqTIRAu2CAKCen9woCeYUfmTgqnDcigV2qzkpewCfaiz6
UuRcpsNysRI+l/oPURUKGZ0=
=cFlc
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ