LWN.net Logo

libtiff: two code execution flaws

Package(s):libtiff CVE #(s):CVE-2013-4231 CVE-2013-4232
Created:August 19, 2013 Updated:August 28, 2013
Description:

From the Red Hat bugzilla entries [1, 2]:

CVE-2013-4231: Pedro Ribeiro discovered a buffer overflow flaw in rgb2ycbcr, a tool to convert RGB color, greyscale, or bi-level TIFF images to YCbCr images, and multiple buffer overflow flaws in gif2tiff, a tool to convert GIF images to TIFF. A remote attacker could provide a specially-crafted TIFF or GIF file that, when processed by rgb2ycbcr and gif2tiff respectively, would cause the tool to crash or, potentially, execute arbitrary code with the privileges of the user running the tool.

CVE-2013-4232: Pedro Ribeiro discovered a use-after-free flaw in the t2p_readwrite_pdf_image() function in tiff2pdf, a tool for converting a TIFF image to a PDF document. A remote attacker could provide a specially-crafted TIFF file that, when processed by tiff2pdf, would cause tiff2pdf to crash or, potentially, execute arbitrary code with the privileges of the user running tiff2pdf.

Alerts:
Fedora FEDORA-2013-14707 2013-08-18
Fedora FEDORA-2013-14726 2013-08-18
Mageia MGASA-2013-0258 2013-08-22
Debian DSA-2744-1 2013-08-27
openSUSE openSUSE-SU-2013:1482-1 2013-09-24
openSUSE openSUSE-SU-2013:1484-1 2013-09-24

(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds