[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] libtiff: Stack based buffer overflow when handling DOTRANGE tags
From:       Huzaifa Sidhpurwala <huzaifas () redhat ! com>
Date:       2012-11-28 5:58:14
Message-ID: 50B5A526.5060303 () redhat ! com
[Download RAW message or body]

Hi All,

I found a stack-based buffer overflow in the way libtiff handled
DOTRANGE tags. An attacker could use this flaw to create a specially-
crafted TIFF file that, when opened, would cause an application linked
against libtiff to crash or, possibly, execute arbitrary code.

This issue is fixed in libtiff-4.0.2

We have assigned CVE-2012-5581 to this issue.

Reference:
https://bugzilla.redhat.com/show_bug.cgi?id=867235



-- 
Huzaifa Sidhpurwala / Red Hat Security Response Team
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic