![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.1.2.2017.795 |
Category: | Debian Local Security Checks |
Title: | Debian: Security Advisory (DLA-795-1) |
Summary: | The remote host is missing an update for the Debian 'tiff' package(s) announced via the DLA-795-1 advisory. |
Description: | Summary: The remote host is missing an update for the Debian 'tiff' package(s) announced via the DLA-795-1 advisory. Vulnerability Insight: Numerous security vulnerabilities have been found through fuzzing on various tiff-related binaries. Crafted TIFF images allows remote attacks to cause denial of service or, in certain cases arbitrary code execution through divide-by-zero, out of bunds write, integer and heap overflow. CVE-2016-3622 The fpAcc function in tif_predict.c in the tiff2rgba tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted TIFF image. CVE-2016-3623 The rgb2ycbcr tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero) by setting the (1) v or (2) h parameter to 0. (Fixed along with CVE-2016-3624.) CVE-2016-3624 The cvtClump function in the rgb2ycbcr tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) by setting the '-v' option to -1. CVE-2016-3945 Multiple integer overflows in the (1) cvt_by_strip and (2) cvt_by_tile functions in the tiff2rgba tool in LibTIFF 4.0.6 and earlier, when -b mode is enabled, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image, which triggers an out-of-bounds write. CVE-2016-3990 Heap-based buffer overflow in the horizontalDifference8 function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image to tiffcp. CVE-2016-9533 tif_pixarlog.c in libtiff 4.0.6 has out-of-bounds write vulnerabilities in heap allocated buffers. Reported as MSVR 35094, aka 'PixarLog horizontalDifference heap-buffer-overflow.' CVE-2016-9534 tif_write.c in libtiff 4.0.6 has an issue in the error code path of TIFFFlushData1() that didn't reset the tif_rawcc and tif_rawcp members. Reported as MSVR 35095, aka 'TIFFFlushData1 heap-buffer-overflow.' CVE-2016-9535 tif_predict.h and tif_predict.c in libtiff 4.0.6 have assertions that can lead to assertion failures in debug mode, or buffer overflows in release mode, when dealing with unusual tile size like YCbCr with subsampling. Reported as MSVR 35105, aka 'Predictor heap-buffer-overflow.' CVE-2016-9536 tools/tiff2pdf.c in libtiff 4.0.6 has out-of-bounds write vulnerabilities in heap allocated buffers in t2p_process_jpeg_strip(). Reported as MSVR 35098, aka 't2p_process_jpeg_strip heap-buffer-overflow.' CVE-2016-9537 tools/tiffcrop.c in libtiff 4.0.6 has out-of-bounds write vulnerabilities in buffers. Reported as MSVR 35093, MSVR 35096, and MSVR 35097. CVE-2016-9538 tools/tiffcrop.c in libtiff 4.0.6 reads an undefined buffer in readContigStripsIntoBuffer() because of a uint16 integer overflow. Reported as MSVR 35100. CVE-2016-9540 tools/tiffcp.c in libtiff 4.0.6 has an out-of-bounds write on tiled images with odd tile width versus image width. Reported as MSVR 35103, aka cpStripToTile ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'tiff' package(s) on Debian 7. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-10092 BugTraq ID: 95218 http://www.securityfocus.com/bid/95218 Debian Security Information: DSA-3762 (Google Search) http://www.debian.org/security/2017/dsa-3762 https://blogs.gentoo.org/ago/2017/01/01/libtiff-multiple-heap-based-buffer-overflow/ https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2016-10092 http://www.openwall.com/lists/oss-security/2017/01/01/12 http://www.openwall.com/lists/oss-security/2017/01/01/10 Common Vulnerability Exposure (CVE) ID: CVE-2016-10093 BugTraq ID: 95215 http://www.securityfocus.com/bid/95215 https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2016-10093 Common Vulnerability Exposure (CVE) ID: CVE-2016-10271 BugTraq ID: 97199 http://www.securityfocus.com/bid/97199 https://github.com/vadz/libtiff/commit/9657bbe3cdce4aaa90e07d50c1c70ae52da0ba6a Common Vulnerability Exposure (CVE) ID: CVE-2016-10272 BugTraq ID: 97197 http://www.securityfocus.com/bid/97197 Common Vulnerability Exposure (CVE) ID: CVE-2016-3622 BugTraq ID: 85917 http://www.securityfocus.com/bid/85917 https://security.gentoo.org/glsa/201701-16 http://www.openwall.com/lists/oss-security/2016/04/07/4 http://www.securitytracker.com/id/1035508 Common Vulnerability Exposure (CVE) ID: CVE-2016-3623 BugTraq ID: 85952 http://www.securityfocus.com/bid/85952 http://www.openwall.com/lists/oss-security/2016/04/08/3 SuSE Security Announcement: openSUSE-SU-2016:2275 (Google Search) http://lists.opensuse.org/opensuse-updates/2016-09/msg00039.html Common Vulnerability Exposure (CVE) ID: CVE-2016-3624 BugTraq ID: 85956 http://www.securityfocus.com/bid/85956 http://bugzilla.maptools.org/show_bug.cgi?id=2568 http://www.openwall.com/lists/oss-security/2016/04/08/4 Common Vulnerability Exposure (CVE) ID: CVE-2016-3945 BugTraq ID: 85960 http://www.securityfocus.com/bid/85960 http://www.openwall.com/lists/oss-security/2016/04/08/6 RedHat Security Advisories: RHSA-2016:1546 http://rhn.redhat.com/errata/RHSA-2016-1546.html RedHat Security Advisories: RHSA-2016:1547 http://rhn.redhat.com/errata/RHSA-2016-1547.html Common Vulnerability Exposure (CVE) ID: CVE-2016-3990 BugTraq ID: 86000 http://www.securityfocus.com/bid/86000 http://www.openwall.com/lists/oss-security/2016/04/12/2 Common Vulnerability Exposure (CVE) ID: CVE-2016-9533 BugTraq ID: 94484 http://www.securityfocus.com/bid/94484 BugTraq ID: 94742 http://www.securityfocus.com/bid/94742 RedHat Security Advisories: RHSA-2017:0225 http://rhn.redhat.com/errata/RHSA-2017-0225.html Common Vulnerability Exposure (CVE) ID: CVE-2016-9534 BugTraq ID: 94743 http://www.securityfocus.com/bid/94743 Common Vulnerability Exposure (CVE) ID: CVE-2016-9535 BugTraq ID: 94744 http://www.securityfocus.com/bid/94744 Debian Security Information: DSA-3844 (Google Search) http://www.debian.org/security/2017/dsa-3844 Common Vulnerability Exposure (CVE) ID: CVE-2016-9536 BugTraq ID: 94745 http://www.securityfocus.com/bid/94745 Common Vulnerability Exposure (CVE) ID: CVE-2016-9537 BugTraq ID: 94746 http://www.securityfocus.com/bid/94746 Common Vulnerability Exposure (CVE) ID: CVE-2016-9538 BugTraq ID: 94753 http://www.securityfocus.com/bid/94753 Common Vulnerability Exposure (CVE) ID: CVE-2016-9540 BugTraq ID: 94747 http://www.securityfocus.com/bid/94747 Common Vulnerability Exposure (CVE) ID: CVE-2017-5225 BugTraq ID: 95413 http://www.securityfocus.com/bid/95413 https://security.gentoo.org/glsa/201709-27 http://www.securitytracker.com/id/1037911 |
Copyright | Copyright (C) 2023 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |