Amazon Linux 1 Security Advisory: ALAS-2012-147
Advisory Release Date: 2012-12-20 13:55 Pacific
Advisory Updated Date: 2014-09-14 17:20 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
A heap-based buffer overflow flaw was found in the way libtiff processed certain TIFF images using the Pixar Log Format encoding. An attacker could create a specially-crafted TIFF file that, when opened, could cause an application using libtiff to crash or, possibly, execute arbitrary code with the privileges of the user running the application. (CVE-2012-4447)
A stack-based buffer overflow flaw was found in the way libtiff handled DOTRANGE tags. An attacker could use this flaw to create a specially-crafted TIFF file that, when opened, would cause an application linked against libtiff to crash or, possibly, execute arbitrary code. (CVE-2012-5581)
A heap-based buffer overflow flaw was found in the tiff2pdf tool. An attacker could use this flaw to create a specially-crafted TIFF file that would cause tiff2pdf to crash or, possibly, execute arbitrary code. (CVE-2012-3401)
A missing return value check flaw, leading to a heap-based buffer overflow, was found in the ppm2tiff tool. An attacker could use this flaw to create a specially-crafted PPM (Portable Pixel Map) file that would cause ppm2tiff to crash or, possibly, execute arbitrary code. (CVE-2012-4564)
Affected Packages:
libtiff
Issue Correction:
Run yum update libtiff to update your system.
i686:
libtiff-static-3.9.4-9.11.amzn1.i686
libtiff-debuginfo-3.9.4-9.11.amzn1.i686
libtiff-3.9.4-9.11.amzn1.i686
libtiff-devel-3.9.4-9.11.amzn1.i686
src:
libtiff-3.9.4-9.11.amzn1.src
x86_64:
libtiff-debuginfo-3.9.4-9.11.amzn1.x86_64
libtiff-3.9.4-9.11.amzn1.x86_64
libtiff-static-3.9.4-9.11.amzn1.x86_64
libtiff-devel-3.9.4-9.11.amzn1.x86_64