MGASA-2013-0258

Source
https://advisories.mageia.org/MGASA-2013-0258.html
Import Source
https://advisories.mageia.org/MGASA-2013-0258.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2013-0258
Related
Published
2013-08-22T18:20:56Z
Modified
2013-08-22T18:20:52Z
Summary
Updated libtiff packagess fix multiple security vulnerabilities
Details

Updated libtiff packages fix security vulnerabilities:

Pedro Ribeiro discovered a buffer overflow flaw in rgb2ycbcr, a tool to convert RGB color, greyscale, or bi-level TIFF images to YCbCr images, and multiple buffer overflow flaws in gif2tiff, a tool to convert GIF images to TIFF. A remote attacker could provide a specially-crafted TIFF or GIF file that, when processed by rgb2ycbcr and gif2tiff respectively, would cause the tool to crash or, potentially, execute arbitrary code with the privileges of the user running the tool (CVE-2013-4231)

Pedro Ribeiro discovered a use-after-free flaw in the t2preadwritepdf_image() function in tiff2pdf, a tool for converting a TIFF image to a PDF document. A remote attacker could provide a specially-crafted TIFF file that, when processed by tiff2pdf, would cause tiff2pdf to crash or, potentially, execute arbitrary code with the privileges of the user running tiff2pdf (CVE-2013-4232).

References
Credits

Affected packages