- --------------------------------------------------------------------------
Debian-Edu/Skolelinux Security Advisory DESA 2005-002
http://www.skolelinux.no/security/                       Finn-Arne Johansen
January 6th, 2005               [EMAIL PROTECTED]
- --------------------------------------------------------------------------

Package             : tiff (libtiff3g)
Vulnerability       : unsanitised input
Problem-Type        : remote
Need reboot         : no
Debian-Edu-specific : no
CVE ID              : CAN-2004-1183
DSA ID              : DSA-626-1

Dmitry V. Levin discovered a buffer overflow in libtiff, the Tag Image
File Format library for processing TIFF graphics files.  Upon reading
a TIFF file it is possible to crash the application, and maybe also to
execute arbitrary code.

We recommend that you upgrade your libtiff3g packages.

Upgrade Instructions
- --------------------

Make sure the line

  deb http://security.debian.org/ stable/updates main contrib non-free

is present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists. 
If you only want to upgrade libtiff3g, you may run 'apt-get install
libtiff3g' to upgrade your package.

- --------------------------------------------------------------------------
Mailing list: [EMAIL PROTECTED], [email protected],
              [EMAIL PROTECTED], [EMAIL PROTECTED],
              [EMAIL PROTECTED]
Package info: `apt-cache show <pkg>'

Attachment: signature.asc
Description: Digital signature

Reply via email to