Overview
The SuSe Linux version of LibTIFF is vulnerable to a buffer overflow that may allow a remote attacker to execute arbitrary code.
Description
SuSe LibTIFF is a library used to encode and decode images in Tag Image File Format (TIFF) format on SuSE systems. A lack of input validation in the OJPEG (old JPEG) handling routine, OJPEGVSetField (in libtiff/tif_ojpeg.c), may cause a heap-based buffer overflow. Consequently, a remote attacker may be able to exploit this vulnerability by supplying an application using LibTIFF with a specially crafted TIFF image. Please note that OJPEG support is enabled by default in versions of the SuSE LibTIFF library without the latest security updates (announced at SUSE-SA:2004:038) installed. |
Impact
If a remote attacker can persuade a user to access a specially crafted TIFF image, that attacker may be able to execute arbitrary code with the privileges of the application linked to LibTIFF. |
Solution
Update SuSE
|
Disable OJPEG support
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was reported by iDefense.iDefense credits Andrei Nigmatulin for discovering this vulnerability.
This document was written by Jeff Gennari.
Other Information
CVE IDs: | CVE-2004-0929 |
Severity Metric: | 3.24 |
Date Public: | 2004-10-22 |
Date First Published: | 2004-12-01 |
Date Last Updated: | 2004-12-01 15:40 UTC |
Document Revision: | 173 |