libTIFF: Multiple buffer overflows
Gentoo Linux Security Advisory
||GLSA 200607-03 / tiff
||July 09, 2006
||July 09, 2006: 01
All supported architectures
libTIFF contains buffer overflows that could result in arbitrary code
libTIFF provides support for reading and manipulating TIFF images.
A buffer overflow has been found in the t2p_write_pdf_string function
in tiff2pdf, which can been triggered with a TIFF file containing a
DocumentName tag with UTF-8 characters. An additional buffer overflow
has been found in the handling of the parameters in tiffsplit.
A remote attacker could entice a user to load a specially crafted TIFF
file, resulting in the possible execution of arbitrary code.
There is no known workaround at this time.
All libTIFF users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/tiff-3.8.2-r1"