ALAS-2012-147


Amazon Linux AMI Security Advisory: ALAS-2012-147
Advisory Release Date: 2014-09-14 17:20 Pacific
Severity: Medium

Issue Overview:

A heap-based buffer overflow flaw was found in the way libtiff processed certain TIFF images using the Pixar Log Format encoding. An attacker could create a specially-crafted TIFF file that, when opened, could cause an application using libtiff to crash or, possibly, execute arbitrary code with the privileges of the user running the application. (CVE-2012-4447 )

A stack-based buffer overflow flaw was found in the way libtiff handled DOTRANGE tags. An attacker could use this flaw to create a specially-crafted TIFF file that, when opened, would cause an application linked against libtiff to crash or, possibly, execute arbitrary code. (CVE-2012-5581 )

A heap-based buffer overflow flaw was found in the tiff2pdf tool. An attacker could use this flaw to create a specially-crafted TIFF file that would cause tiff2pdf to crash or, possibly, execute arbitrary code. (CVE-2012-3401 )

A missing return value check flaw, leading to a heap-based buffer overflow, was found in the ppm2tiff tool. An attacker could use this flaw to create a specially-crafted PPM (Portable Pixel Map) file that would cause ppm2tiff to crash or, possibly, execute arbitrary code. (CVE-2012-4564 )


Affected Packages:

libtiff


Issue Correction:
Run yum update libtiff to update your system.

New Packages:
i686:
    libtiff-static-3.9.4-9.11.amzn1.i686
    libtiff-debuginfo-3.9.4-9.11.amzn1.i686
    libtiff-3.9.4-9.11.amzn1.i686
    libtiff-devel-3.9.4-9.11.amzn1.i686

src:
    libtiff-3.9.4-9.11.amzn1.src

x86_64:
    libtiff-debuginfo-3.9.4-9.11.amzn1.x86_64
    libtiff-3.9.4-9.11.amzn1.x86_64
    libtiff-static-3.9.4-9.11.amzn1.x86_64
    libtiff-devel-3.9.4-9.11.amzn1.x86_64