Movatterモバイル変換


[0]ホーム

URL:


Home page logo
bugtraq logo

Bugtraqmailing list archives

PreviousBy DateNext
PreviousBy ThreadNext

SUSE Security Announcement: libtiff/tiff (SUSE-SA:2005:001)


From: Thomas Biege <thomas () suse de>
Date: Mon, 10 Jan 2005 11:36:46 +0100

-----BEGIN PGP SIGNED MESSAGE-----______________________________________________________________________________                        SUSE Security Announcement        Package:                libtiff/tiff        Announcement-ID:        SUSE-SA:2005:001        Date:                   Monday, Jan 10th 2005 11:30 MET        Affected products:      8.1, 8.2, 9.0, 9.1, 9.2                                SUSE Linux Desktop 1.0                                SUSE Linux Enterprise Server 8, 9                                Novell Linux Desktop 9        Vulnerability Type:     remote system compromise        Severity (1-10):        8        SUSE default package:   yes        Cross References:       CAN-2004-1183                                CAN-2004-1308    Content of this advisory:        1) security vulnerability resolved:             - integer overflow             - buffer overflow           problem description        2) solution/workaround        3) special instructions and notes        4) package location and checksums        5) pending vulnerabilities, solutions, workarounds:        6) standard appendix (further information)______________________________________________________________________________1) problem description, brief discussion    Libtiff supports reading, writing, and manipulating of TIFF image files.    iDEFENSE reported an integer overflow in libtiff that can be exploited by    specific TIFF images to trigger a heap-based buffer overflow afterwards.    This bug can be used by external attackers to execute arbitrary code    over the network by placing special image files on web-pages and    alike.        Additionally a buffer overflow in tiffdump was fixed.        2) solution/workaround    There is no workaround known.        3) special instructions and notes    It is needed that all processes using libtiff are restarted.    If you use GUI applications please close your X/GDM/KDM session(s) and    log in again.        4) package location and checksums    Download the update package for your distribution and verify its    integrity by the methods listed in section 3) of this announcement.    Then, install the package using the command "rpm -Fhv file.rpm" to apply    the update.    Our maintenance customers are being notified individually. The packages    are being offered for installation from the maintenance web.        x86 Platform:    SUSE Linux 9.2:   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/libtiff-3.6.1-47.4.i586.rpm      8d0c9a4295719b7b659d33b311932cce   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/libtiff-devel-3.6.1-47.4.i586.rpm      bbdfe23b8390265f62c5e800551eca7d   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/tiff-3.6.1-47.4.i586.rpm      79d0b122103b619b795872ed70a7feaa    patch rpm(s):   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/libtiff-3.6.1-47.4.i586.patch.rpm      dd18c32e661a59dfda88e5318ecfb825   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/libtiff-devel-3.6.1-47.4.i586.patch.rpm      a161f078c72920fde4f95f0f229e07fb   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/tiff-3.6.1-47.4.i586.patch.rpm      b66e77ac565b375555f9b980145a9442    source rpm(s):   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/tiff-3.6.1-47.4.src.rpm      953f00dd4f98223d270db6e2c662e370    SUSE Linux 9.1:   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/libtiff-3.6.1-38.14.i586.rpm      bc883989e3deeecbc0dfb47a9daa23ff   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/tiff-3.6.1-38.14.i586.rpm      46a598e4914836b7e4e90094625e1587    patch rpm(s):   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/libtiff-3.6.1-38.14.i586.patch.rpm      ec8d13d5b0bb4bedb2796db800ec8821   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/tiff-3.6.1-38.14.i586.patch.rpm      8bfef59cd1946f889f9eb3b8f441e61a    source rpm(s):   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/tiff-3.6.1-38.14.src.rpm      59218891e1c096ee376aec6906dbbc1c    SUSE Linux 9.0:   ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/libtiff-3.5.7-379.i586.rpm      339b3bbc318cc6298e07a65e82a1e07d   ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/tiff-3.5.7-379.i586.rpm      6fe1432237f589dc73e348e1cdbc9068    patch rpm(s):   ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/libtiff-3.5.7-379.i586.patch.rpm      867a5a98a2ac68071be51a2426992bd9   ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/tiff-3.5.7-379.i586.patch.rpm      a185bec3b9a4a79590561d2bd7d19243    source rpm(s):   ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/src/tiff-3.5.7-379.src.rpm      a4857a276db37e3a6d4fc6df2bebd230    SUSE Linux 8.2:   ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/libtiff-3.5.7-379.i586.rpm      aab8d95cf757c5520830e0bed74e2d5f   ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/tiff-3.5.7-379.i586.rpm      5ded8ffdd7633ce5a68a231d637f6247    patch rpm(s):   ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/libtiff-3.5.7-379.i586.patch.rpm      566e39a22033284c1266c52eac7320d3   ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/tiff-3.5.7-379.i586.patch.rpm      40521831ae56bdabde85ee92473697c5    source rpm(s):   ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/src/tiff-3.5.7-379.src.rpm      f407a1cfca26d9618d19848b087983ee    SUSE Linux 8.1:   ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/libtiff-3.5.7-379.i586.rpm      36ec66df028b5d24f8373282a32f1440   ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/tiff-3.5.7-379.i586.rpm      7e5b60fd51d14eac8312474f2d43cda0    patch rpm(s):   ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/libtiff-3.5.7-379.i586.patch.rpm      41959759027005e272103b07054c6e26   ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/tiff-3.5.7-379.i586.patch.rpm      0ae11b9367fe84085aacd6ed1b586bff    source rpm(s):   ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/src/tiff-3.5.7-379.src.rpm      b9d1ac1c51f9f935ca78628d8d2adc3e    x86-64 Platform:    SUSE Linux 9.2:   ftp://ftp.suse.com/pub/suse/x86_64/update/9.2/rpm/x86_64/libtiff-32bit-9.2-200501041820.x86_64.rpm      d22303573664d8ef0170c1da81a65232   ftp://ftp.suse.com/pub/suse/x86_64/update/9.2/rpm/x86_64/libtiff-32bit-9.2-200501041820.x86_64.rpm      d22303573664d8ef0170c1da81a65232   ftp://ftp.suse.com/pub/suse/x86_64/update/9.2/rpm/x86_64/libtiff-devel-3.6.1-47.4.x86_64.rpm      27a98a68b4bda3096f6263998c41d29d   ftp://ftp.suse.com/pub/suse/x86_64/update/9.2/rpm/x86_64/tiff-3.6.1-47.4.x86_64.rpm      d9f2938c822fa2131a3b2a1c4b471376    patch rpm(s):   ftp://ftp.suse.com/pub/suse/x86_64/update/9.2/rpm/x86_64/libtiff-32bit-9.2-200501041820.x86_64.patch.rpm      f52f8c1a562151373ee98c14e22a6107   ftp://ftp.suse.com/pub/suse/x86_64/update/9.2/rpm/x86_64/libtiff-32bit-9.2-200501041820.x86_64.patch.rpm      f52f8c1a562151373ee98c14e22a6107   ftp://ftp.suse.com/pub/suse/x86_64/update/9.2/rpm/x86_64/libtiff-devel-3.6.1-47.4.x86_64.patch.rpm      cb8f1590ecc0b7ef89eeca271ab7a5c7   ftp://ftp.suse.com/pub/suse/x86_64/update/9.2/rpm/x86_64/tiff-3.6.1-47.4.x86_64.patch.rpm      e49a2d960381dea99758b7c8d34df07f    source rpm(s):   ftp://ftp.suse.com/pub/suse/x86_64/update/9.2/rpm/src/tiff-3.6.1-47.4.src.rpm      953f00dd4f98223d270db6e2c662e370    SUSE Linux 9.1:   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/libtiff-3.6.1-38.14.x86_64.rpm      01f564b510e02b71ed23146358b6488a   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/tiff-3.6.1-38.14.x86_64.rpm      b9fbc56e9f2250ec222c87f8a3805252    patch rpm(s):   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/libtiff-3.6.1-38.14.x86_64.patch.rpm      813bcb747d11c80ddc30c9de98dbd344   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/tiff-3.6.1-38.14.x86_64.patch.rpm      2a6c5c2923d9709904cdef560c996fb9    source rpm(s):   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/tiff-3.6.1-38.14.src.rpm      506ec05d53f1bc266263aa76086d8af9    SUSE Linux 9.0:   ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/libtiff-3.5.7-379.x86_64.rpm      29e8cfa5fd6725ea02d66e43a2abeafb   ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/tiff-3.5.7-379.x86_64.rpm      b5bccb1560f75b5fd9dd827bdc2f6424    patch rpm(s):   ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/libtiff-3.5.7-379.x86_64.patch.rpm      e64cdac3e6a86404d17807e12c4f7098   ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/tiff-3.5.7-379.x86_64.patch.rpm      9e5eb1bfc586805c8e1f65002b82234c    source rpm(s):   ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/src/tiff-3.5.7-379.src.rpm      b406b3a976b892afb572be9907ab2df0      ______________________________________________________________________________5) pending vulnerabilities in SUSE Distributions and Workarounds:    Please read our next summary report for more information.______________________________________________________________________________6) standard appendix: authenticity verification, additional information  - Package authenticity verification:    SUSE update packages are available on many mirror ftp servers all over    the world. While this service is being considered valuable and important    to the free and open source software community, many users wish to be    sure about the origin of the package and its content before installing    the package. There are two verification methods that can be used    independently from each other to prove the authenticity of a downloaded    file or rpm package:    1) md5sums as provided in the (cryptographically signed) announcement.    2) using the internal gpg signatures of the rpm package.    1) execute the command        md5sum <name-of-the-file.rpm>       after you downloaded the file from a SUSE ftp server or its mirrors.       Then, compare the resulting md5sum with the one that is listed in the       announcement. Since the announcement containing the checksums is       cryptographically signed (usually using the key security () suse de),       the checksums show proof of the authenticity of the package.       We recommend against subscribing to security lists that cause the       e-mail message containing the announcement to be modified       so that the signature does not match after transport through the mailing       list software.       Downsides: You must be able to verify the authenticity of the       announcement in the first place. If RPM packages are being rebuilt       and a new version of a package is published on the ftp server, all       md5 sums for the files are useless.    2) rpm package signatures provide an easy way to verify the authenticity       of an rpm package. Use the command        rpm -v --checksig <file.rpm>       to verify the signature of the package, where <file.rpm> is the       file name of the rpm package that you have downloaded. Of course,       package authenticity verification can only target an uninstalled rpm       package file.       Prerequisites:        a) gpg is installed        b) The package is signed using a certain key. The public part of this           key must be installed by the gpg program in the directory           ~/.gnupg/ under the user's home directory who performs the           signature verification (usually root). You can import the key           that is used by SUSE in rpm packages for SUSE Linux by saving           this announcement to a file ("announcement.txt") and           running the command (do "su -" to be root):            gpg --batch; gpg < announcement.txt | gpg --import           SUSE Linux distributions version 7.1 and thereafter install the           key "build () suse de" upon installation or upgrade, provided that           the package gpg is installed. The file containing the public key           is placed at the top-level directory of the first CD (pubring.gpg)           and atftp://ftp.suse.com/pub/suse/pubring.gpg-build.suse.de .  - SUSE runs two security mailing lists to which any interested party may    subscribe:    suse-security () suse com        -   general/linux/SUSE security discussion.            All SUSE security announcements are sent to this list.            To subscribe, send an email to                <suse-security-subscribe () suse com>.    suse-security-announce () suse com        -   SUSE's announce-only mailing list.            Only SUSE's security announcements are sent to this list.            To subscribe, send an email to                <suse-security-announce-subscribe () suse com>.    For general information or the frequently asked questions (faq)     send mail to:        <suse-security-info () suse com> or        <suse-security-faq () suse com> respectively.    =====================================================================    SUSE's security contact is <security () suse com> or <security () suse de>.    The <security () suse de> public key is listed below.    =====================================================================______________________________________________________________________________    The information in this advisory may be distributed or reproduced,    provided that the advisory is not modified in any way. In particular,    it is desired that the clear-text signature shows proof of the    authenticity of the text.    SUSE Linux AG makes no warranties of any kind whatsoever with respect    to the information contained in this security advisory.Type Bits/KeyID    Date       User IDpub  2048R/3D25D3D9 1999-03-06 SuSE Security Team <security () suse de>pub  1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build () suse de>- -----BEGIN PGP PUBLIC KEY BLOCK-----Version: GnuPG v1.0.7 (GNU/Linux)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Fv2n- -----END PGP PUBLIC KEY BLOCK----------BEGIN PGP SIGNATURE-----Version: GnuPG v1.2.2-rc1-SuSE (GNU/Linux)iQEVAwUBQeJZXney5gA9JdPZAQHuhQf8CiQ6/4mIzbaqmUWjP7TREsy2j7riyM2+dkyiCE4luNDVcAJahGQUtjwDwzEcJjeBNsuIX7vYiW0ct9ZlVDZupDQtmE83K8p4ke76sEBKtxHvkl0MQdqsQAdEKMorPWCHdivmWp9om9Ob572uc2EM9mQl/SiJg+c9Wp6Dl0okfuB/YDZKaeBaZr9rTceso+Fj5+OEzUkq8AuFwF/vcdTYFryX+Qh3X5ZwPA9LGqtsWh5zviIg985wbm1axKyVgI89+VZXC9gibIR4NtdHcVpw25I+6FM4ElhArRVXTQm2kimxbZv1BBnkupUDtJ5va+3NwMZzG254e+7OYmcvoTyynw===5xrJ-----END PGP SIGNATURE-----

PreviousBy DateNext
PreviousBy ThreadNext

Current thread:


[8]ページ先頭

©2009-2026 Movatter.jp