libtiff: integer overflow of tiff2pdf
Synthesis of the vulnerability
An attacker can invite the victim to open a malicious TIFF image with tiff2pdf, in order to create a denial of service or to execute code.Impacted products:
Debian, Fedora, MBS, MES, Mandriva Linux, openSUSE, Solaris, RHEL, SUSE Linux Enterprise Desktop, SLES, Unix (platform).
BID-54076, CERTA-2012-AVI-343, CVE-2012-2113, DSA-2552-1, FEDORA-2012-10081, FEDORA-2012-10089, MDVSA-2012:101, MDVSA-2013:046, openSUSE-SU-2012:0829-1, RHSA-2012:1054-01, SUSE-SU-2012:0894-1, VIGILANCE-VUL-11725.
Description of the vulnerability
The tiff2pdf tool of the libtiff suite is used to convert a TIFF image to a PDF document.
The t2p_read_tiff_size() function of the tools/tiff2pdf.c file reads the size of the TIFF image. This function computes several multiplications and additions. However, these operations can overflow, and lead to the allocation of a short memory area.
An attacker can therefore invite the victim to open a malicious TIFF image with tiff2pdf, in order to create a denial of service or to execute code.Complete Vigil@nce bulletin....
Share this bulletin
Computer vulnerabilities tracking service
Vigil@nce provides a computer vulnerability alert
. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.