![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.52739 |
Category: | Ubuntu Local Security Checks |
Title: | Ubuntu USN-130-1 (tiff) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to tiff announced via advisory USN-130-1. A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty Warthog) Ubuntu 5.04 (Hoary Hedgehog) The following packages are affected: libtiff4 Tavis Ormandy discovered a buffer overflow in the TIFF library. A malicious image with an invalid bits per sample number could be constructed which, when decoded, would have resulted in execution of arbitrary code with the privileges of the process using the library. Since this library is used in many applications like ghostscript and the CUPS printing system, this vulnerability may lead to remotely induced privilege escalation. Solution: The problem can be corrected by upgrading the affected package to version 3.6.1-1.1ubuntu1.3 (for Ubuntu 4.10), or 3.6.1-5ubuntu0.1 (for Ubuntu 5.04). After a standard system upgrade you need to restart your CUPS server with sudo /etc/init.d/cupsys restart to effect the necessary changes. http://www.securityspace.com/smysecure/catid.html?in=USN-130-1 Risk factor : High CVSS Score: 7.5 |
Cross-Ref: |
BugTraq ID: 13585 Common Vulnerability Exposure (CVE) ID: CVE-2005-1544 http://www.securityfocus.com/bid/13585 Debian Security Information: DSA-755 (Google Search) http://www.debian.org/security/2005/dsa-755 http://www.gentoo.org/security/en/glsa/glsa-200505-07.xml http://www.mandriva.com/security/advisories?name=MDKSA-2006:042 http://bugs.gentoo.org/show_bug.cgi?id=91584 http://bugzilla.remotesensing.org/show_bug.cgi?id=843 http://www.osvdb.org/16350 SCO Security Bulletin: SCOSA-2005.34 ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.34/SCOSA-2005.34.txt SCO Security Bulletin: SCOSA-2006.3 ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.3/SCOSA-2006.3.txt http://securitytracker.com/id?1013944 http://secunia.com/advisories/15320 http://secunia.com/advisories/16872 http://secunia.com/advisories/18289 http://secunia.com/advisories/18943 http://www.ubuntu.com/usn/usn-130-1 XForce ISS Database: libtiff-bitspersample-bo(20533) https://exchange.xforce.ibmcloud.com/vulnerabilities/20533 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |