Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2018.1662 [SECURITY] [DLA 1391-1] tiff security update 4 June 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: tiff Publisher: Debian Operating System: Debian GNU/Linux 7 Impact/Access: Denial of Service -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2018-5784 CVE-2017-11613 Reference: ESB-2018.0864 ESB-2018.0800 Original Bulletin: https://lists.debian.org/debian-lts-announce/2018/05/msg00022.html - --------------------------BEGIN INCLUDED TEXT-------------------- Package : tiff Version : 4.0.2-6+deb7u21 CVE ID : CVE-2017-11613 CVE-2018-5784 Debian Bug : #869823 #890441 Multiple vulnerabilities have been discovered in the libtiff library and the included tools, which may result in denial of service: CVE-2017-11613 Ddenial of service vulnerability in the TIFFOpen function. A crafted input will lead to a denial of service attack and can either make the system hand or trigger the OOM killer. CVE-2018-5784 There is an uncontrolled resource consumption in TIFFSetDirectory function of src/libtiff/tif_dir.c, which can cause denial of service through a crafted tif file. For Debian 7 "Wheezy", these problems have been fixed in version 4.0.2-6+deb7u21. We recommend that you upgrade your tiff packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS cheers, Holger - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWxSWDWaOgq3Tt24GAQheTQ//ZypZhZwbKhNy5vDEhqR9wp8UVye+4jcW xIVpx5wvb6V6JxW4ACMfMqmVJvhW6Mt6Ee8lf41k2OQVyF8wCIkAZTM5R9fkNdSg hODwUPADwHuPN9VTGdIJS3cqBGbghdsjDptCSvzVgD/F+4C0naWEUHI4iDfDCGMs qqEpLpKGh90D0Fk0oePGABDOwfvTH21l/6ZikapJDLLVG+EwKRJDgVRvhSVCqTzj nP+oUAtTfTGqPQPeruqz0wJQ4/Bbim4+OrXRSINpU9woJr/ZEtoeo4dCqvppjrNX nH0fcv0KZAz55uVHJagIoN9LSFD+7iErwpzH5GKCv8tMWDoQXD1MFw7/8jUnv+JM nbrYbrDvEmKTfmZ7LKqTTV4nDACMnkkhneXZLbPG3kHEPnXMorck1JWxFGCcf48F ztDLtXQIljYHQ+1HpQNfB/H6VMNvn1w1LYK1cObiFZdJa8y56gfQPEnzZ8Lq0hVj nOIayGHnWAFCPkDVwa2jwxr7thYMOPFcfOfM89GU+xsx6fk9LehtTO7sREY65n5F 6HcMDAzc3r3sHGA/q/y1UOkwI0B/6vJJ38IyPv16EMW1F+rURhGLEgHxn1bAUOaT kBk4DEKs+H0ezFTycKeUlLBIkb1FF481DA2rt4Y3fa3iUkJ2XI7EN4Ix+HJ5yUQN diYnZ/vg2U8= =keTt -----END PGP SIGNATURE-----