Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.10.2013.0258
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2013-0258)
Resumen:The remote host is missing an update for the 'libtiff' package(s) announced via the MGASA-2013-0258 advisory.
Descripción:Summary:
The remote host is missing an update for the 'libtiff' package(s) announced via the MGASA-2013-0258 advisory.

Vulnerability Insight:
Updated libtiff packages fix security vulnerabilities:

Pedro Ribeiro discovered a buffer overflow flaw in rgb2ycbcr, a tool to convert
RGB color, greyscale, or bi-level TIFF images to YCbCr images, and multiple
buffer overflow flaws in gif2tiff, a tool to convert GIF images to TIFF. A
remote attacker could provide a specially-crafted TIFF or GIF file that, when
processed by rgb2ycbcr and gif2tiff respectively, would cause the tool to crash
or, potentially, execute arbitrary code with the privileges of the user running
the tool (CVE-2013-4231)

Pedro Ribeiro discovered a use-after-free flaw in the t2p_readwrite_pdf_image()
function in tiff2pdf, a tool for converting a TIFF image to a PDF document. A
remote attacker could provide a specially-crafted TIFF file that, when processed
by tiff2pdf, would cause tiff2pdf to crash or, potentially, execute arbitrary
code with the privileges of the user running tiff2pdf (CVE-2013-4232).

Affected Software/OS:
'libtiff' package(s) on Mageia 2, Mageia 3.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2013-4231
54543
http://secunia.com/advisories/54543
54628
http://secunia.com/advisories/54628
61695
http://www.securityfocus.com/bid/61695
DSA-2744
http://www.debian.org/security/2013/dsa-2744
RHSA-2014:0223
http://rhn.redhat.com/errata/RHSA-2014-0223.html
[oss-security] 20130809 Re: CVE Request -- Four (stack-based) buffer overflows and one use-after-free in libtiff v4.0.3 reported by Pedro Ribeiro
http://www.openwall.com/lists/oss-security/2013/08/10/2
[tiff] 20130801 Vulnerabilities in libtiff 4.0.3
http://www.asmail.be/msg0055359936.html
http://bugzilla.maptools.org/show_bug.cgi?id=2450
https://bugzilla.redhat.com/show_bug.cgi?id=995965
Common Vulnerability Exposure (CVE) ID: CVE-2013-4232
http://bugzilla.maptools.org/show_bug.cgi?id=2449
https://bugzilla.redhat.com/show_bug.cgi?id=995975
CopyrightCopyright (C) 2022 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.