This is the mail archive of the cygwin-apps mailing list for the Cygwin project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

Re: SECURITY: tiff


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Yaakov S (Cygwin Ports) wrote:
>>> Multiple vulnerabilities, ranging from integer overflows and NULL
>>> pointer dereferences to double frees, were reported in libTIFF.

And now, there's more:

A buffer overflow has been found in the t2p_write_pdf_string function in
tiff2pdf, which can been triggered with a TIFF file containing a
DocumentName tag with UTF-8 characters. An additional buffer overflow
has been found in the handling of the parameters in tiffsplit.

Solution: update to 3.8.2 and apply the following patches:
http://www.gentoo.org/cgi-bin/viewcvs.cgi/*checkout*/media-libs/tiff/files/tiff-3.8.2-tiffsplit.patch
http://www.gentoo.org/cgi-bin/viewcvs.cgi/*checkout*/media-libs/tiff/files/tiff-buffer.patch

More information:
http://www.gentoo.org/security/en/glsa/glsa-200607-03.xml
http://bugs.gentoo.org/show_bug.cgi?id=135021
http://bugs.gentoo.org/show_bug.cgi?id=135881
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2193
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2656


Yaakov
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.1 (Cygwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFEtZy4piWmPGlmQSMRAo2pAJ9gEq6uMHL4j7TvhGHL+j8RyN9Y+ACcCczX
PzQldn5/cuh2WwiUn9ifBF0=
=Cztp
-----END PGP SIGNATURE-----


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]