Summary
Murray McAllister discovered a heap-based buffer overflow in the gif2tiff command line tool. Executing gif2tiff on a malicious tiff image could result in arbitrary code execution.
Solution
For the stable distribution (wheezy), this problem has been fixed in version 4.0.2-6+deb7u3.
For the testing distribution (jessie), this problem will be fixed soon.
For the unstable distribution (sid), this problem has been fixed in version 4.0.3-9.
We recommend that you upgrade your tiff packages.
Insight
libtiff is a library providing support for the Tag Image File Format (TIFF), a widely used format for storing image data.
Affected
tiff on Debian Linux
Detection
This check tests the installed software version using the apt package manager.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2013-4243 -
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities