Ispravljen je sigurnosni propust vezan uz programski paket LibTiff. Spomenuti propust je udaljeni napadač mogao iskoristiti za pokretanje zlonamjernog programskog koda.
Paket:
LibTIFF 3.x
Operacijski sustavi:
Fedora 15
Kritičnost:
4.4
Problem:
preljev međuspremnika
Iskorištavanje:
udaljeno
Posljedica:
proizvoljno izvršavanje programskog koda
Rješenje:
programska zakrpa proizvođača
CVE:
CVE-2012-1173
Izvorni ID preporuke:
FEDORA-2012-5406
Izvor:
Fedora
Problem:
Propust je posljedica pogrešaka pri obradi tiff datoteka, a dovodi do pojave prepisivanja memorije.
Posljedica:
Udaljeni korisnik može zlouporabiti ranjivost za izvršavanje proizvoljnog programskog koda.
Rješenje:
Svim korisnicima se savjetuje korištenje programske nadogradnje koja otklanja opisani propust.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-5406
2012-04-06 20:56:13
--------------------------------------------------------------------------------
Name : libtiff
Product : Fedora 15
Version : 3.9.5
Release : 3.fc15
URL : http://www.remotesensing.org/libtiff/
Summary : Library of functions for manipulating TIFF format image files
Description :
The libtiff package contains a library of functions for manipulating
TIFF (Tagged Image File Format) image format files. TIFF is a widely
used file format for bitmapped images. TIFF files usually end in the
.tif extension and they are often quite large.
The libtiff package should be installed if you need to manipulate TIFF
format image files.
--------------------------------------------------------------------------------
Update Information:
Add fix for CVE-2012-1173
--------------------------------------------------------------------------------
ChangeLog:
* Thu Apr 5 2012 Tom Lane <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 3.9.5-3
- Add fix for CVE-2012-1173
Resolves: #CVE-2012-1173
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #803078 - CVE-2012-1173 libtiff: Heap-buffer overflow due to
TileSize calculation when parsing tiff files
https://bugzilla.redhat.com/show_bug.cgi?id=803078
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update libtiff' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke