vulnerability bulletin CVE-2013-1960
libtiff: buffer overflow of tiff2pdf t2_process_jpeg_strip
Synthesis of the vulnerability
An attacker can invite the victim to open a malicious TIFF image with tiff2pdf, in order to create a denial of service or to execute code.Impacted products:
Debian, Fedora, MBS, openSUSE, Solaris, RHEL, Slackware, Unix (platform).
952158, BID-59609, CVE-2013-1960, DSA-2698-1, FEDORA-2013-7361, FEDORA-2013-7369, MDVSA-2013:208, openSUSE-SU-2013:0812-1, openSUSE-SU-2013:0812-2, openSUSE-SU-2013:0922-1, openSUSE-SU-2013:0944-1, RHSA-2014:0222-01, RHSA-2014:0223-01, SSA:2013-290-01, VIGILANCE-VUL-12743.
Description of the vulnerability
The tiff2pdf tool of the libtiff suite is used to convert a TIFF image to a PDF document.
The t2_process_jpeg_strip() function of the tiff2pdf.c file processes the strip encoding of image data. However, if the TIFF image uses invalid values, a buffer overflow occurs.
An attacker can therefore invite the victim to open a malicious TIFF image with tiff2pdf, in order to create a denial of service or to execute code.Complete Vigil@nce bulletin....
Share this bulletin
Computer vulnerabilities tracking service
Vigil@nce provides application vulnerability bulletins
. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The technology watch team tracks security threats targeting the computer system. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.