USN-3212-1: LibTIFF vulnerabilities

Ubuntu Security Notice USN-3212-1

27th February, 2017

tiff vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

LibTIFF could be made to crash or run programs as your login if it opened a
specially crafted file.

Software description

  • tiff
    – Tag Image File Format (TIFF) library

Details

It was discovered that LibTIFF incorrectly handled certain malformed
images. If a user or automated system were tricked into opening a specially
crafted image, a remote attacker could crash the application, leading to a
denial of service, or possibly execute arbitrary code with user privileges.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.10:
libtiff5

4.0.6-2ubuntu0.1
libtiff-tools

4.0.6-2ubuntu0.1
Ubuntu 16.04 LTS:
libtiff5

4.0.6-1ubuntu0.1
libtiff-tools

4.0.6-1ubuntu0.1
Ubuntu 14.04 LTS:
libtiff5

4.0.3-7ubuntu0.6
libtiff-tools

4.0.3-7ubuntu0.6

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-7554,

CVE-2015-8668,

CVE-2016-10092,

CVE-2016-10093,

CVE-2016-10094,

CVE-2016-3622,

CVE-2016-3623,

CVE-2016-3624,

CVE-2016-3632,

CVE-2016-3658,

CVE-2016-3945,

CVE-2016-3990,

CVE-2016-3991,

CVE-2016-5314,

CVE-2016-5315,

CVE-2016-5316,

CVE-2016-5317,

CVE-2016-5320,

CVE-2016-5321,

CVE-2016-5322,

CVE-2016-5323,

CVE-2016-5652,

CVE-2016-5875,

CVE-2016-6223,

CVE-2016-8331,

CVE-2016-9273,

CVE-2016-9297,

CVE-2016-9448,

CVE-2016-9453,

CVE-2016-9532,

CVE-2016-9533,

CVE-2016-9534,

CVE-2016-9535,

CVE-2016-9536,

CVE-2016-9537,

CVE-2016-9538,

CVE-2016-9539,

CVE-2016-9540,

CVE-2017-5225


Source From: ubuntu.com.
Original article title: USN-3212-1: LibTIFF vulnerabilities.
This full article can be read at: USN-3212-1: LibTIFF vulnerabilities.

Advertisement


Random Article You May Like

Leave a Reply

Your email address will not be published. Required fields are marked *

*
*