Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
Tavis Ormandy of the Google Security Team discovered several problems
in the TIFF library. The Common Vulnerabilities and Exposures project
identifies the following issues:
Several stack-buffer overflows have been discovered.
A heap overflow vulnerability in the JPEG decoder may overrun a
buffer with more data than expected.
A heap overflow vulnerability in the PixarLog decoder may permit an
attacker to execute arbitrary code.
A heap overflow vulnerability has been discovered in the NeXT RLE
An loop was discovered where a 16bit unsigned short was used to
iterate over a 32bit unsigned value so that the loop would never
terminate and continue forever.
Multiple unchecked arithmetic operations were uncovered, including
a number of the range checking operations designed to ensure the
offsets specified in TIFF directories are legitimate.
A flaw was also uncovered in libtiffs custom tag support which may
result in abnormal behaviour, crashes, or potentially arbitrary
For the stable distribution (sarge) these problems have been fixed in
For the unstable distribution (sid) these problems have been fixed in
We recommend that you upgrade your libtiff packages.
Solution : http://www.debian.org/security/2006/dsa-1137
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi
|Knoppix 7.2.0 Live Linux Bootable Startup CD (Runs form CD) +Free Retro Linux CD
|Mandrake Linux Standard Edition 8.2 and Knoppix live
|KNOPPIX 8.1 LINUX LIVE DVD - 2018
|KNOPPIX LINUX - NEWEST v. 8.1 DVD & 32GB USB 3.0 Flash Drive + Persistence Mode
No Discussions have been posted on this vulnerability.