vulnerability note CVE-2013-1961
libtiff: buffer overflow of tiff2pdf t2p_write_pdf_page
Synthesis of the vulnerability
An attacker can invite the victim to open a malicious TIFF image with tiff2pdf, in order to create a denial of service or to execute code.Impacted products: Debian
, Unix (platform)
952131, BID-59607, CERTFR-2014-AVI-112, CVE-2013-1961, DSA-2698-1, FEDORA-2013-7361, FEDORA-2013-7369, MDVSA-2013:208, openSUSE-SU-2013:0812-1, openSUSE-SU-2013:0812-2, openSUSE-SU-2013:0922-1, openSUSE-SU-2013:0944-1, RHSA-2014:0222-01, RHSA-2014:0223-01, SSA:2013-290-01, VIGILANCE-VUL-12744.
Description of the vulnerability
The tiff2pdf tool of the libtiff suite is used to convert a TIFF image to a PDF document.
The t2p_write_pdf_page() function of the tiff2pdf.c file generates a PDF Page object. The PDF MediaBox field defines the page area containing data. Its values are generated using the sprintf() function which writes in a 16 bytes array. However, if the TIFF image uses large sizes, a buffer overflow occurs.
An attacker can therefore invite the victim to open a malicious TIFF image with tiff2pdf, in order to create a denial of service or to execute code.Complete Vigil@nce bulletin....
Share this bulletin
Computer vulnerabilities tracking service
Vigil@nce provides network vulnerability alerts
. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The technology watch team tracks security threats targeting the computer system.