ESB-2018.3736 - [Debian] tiff: Multiple vulnerabilities 2018-12-03

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.3736
                           tiff security update
                              3 December 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           tiff
Publisher:         Debian
Operating System:  Debian GNU/Linux 9
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-18557 CVE-2018-17101 CVE-2018-16335
                   CVE-2018-15209 CVE-2018-10963 CVE-2018-8905
                   CVE-2018-7456 CVE-2018-5784 CVE-2017-17095
                   CVE-2017-11613  

Reference:         ESB-2018.3308
                   ESB-2018.1914
                   ESB-2018.1662
                   ESB-2018.1461

Original Bulletin: 
   http://www.debian.org/security/2018/dsa-4349

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4349-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
November 30, 2018                     https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : tiff
CVE ID         : CVE-2017-11613 CVE-2017-17095 CVE-2018-5784
                 CVE-2018-7456  CVE-2018-8905  CVE-2018-10963
		 CVE-2018-17101 CVE-2018-18557 CVE-2018-15209
		 CVE-2018-16335

Multiple vulnerabilities have been discovered in the libtiff library and
the included tools, which may result in denial of service or the
execution of arbitrary code if malformed image files are processed.

For the stable distribution (stretch), these problems have been fixed in
version 4.0.8-2+deb9u4.

We recommend that you upgrade your tiff packages.

For the detailed security status of tiff please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/tiff

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=lsLu
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=95Er
-----END PGP SIGNATURE-----

« Back to bulletins