-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Package : tiff Version : 4.0.2-6+deb7u17 CVE ID : CVE-2017-9935 Debian Bug : 866109
In LibTIFF 4.0.8, there is a heap-based buffer overflow in the t2p_write_pdf function in tools/tiff2pdf.c. This heap overflow could lead to different damages. For example, a crafted TIFF document can lead to an out-of-bounds read in TIFFCleanup, an invalid free in TIFFClose or t2p_free, memory corruption in t2p_readwrite_pdf_image, or a double free in t2p_free. Given these possibilities, it probably could cause arbitrary code execution. This overflow is linked to an underlying assumption that all pages in a tiff document will have the same transfer function. There is nothing in the tiff standard that says this needs to be the case. For Debian 7 "Wheezy", these problems have been fixed in version 4.0.2-6+deb7u17. We recommend that you upgrade your tiff packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEE1jZRJqkttWDGJ6ztF4RXf4EfbqwFAlowwbMACgkQF4RXf4Ef bqzoTA/+OuuD3TQSZjW74RFswtOvIKMeBDdunwtV3T6XKNMVa0E6u36McTNXDan7 8Q0We7Nl8np+52vgJ7kDvtxSYGOv+kgx9x9kC5hz3ltLq3ELT1XmS3o/h5AVCTeC 940fHnMS3b6q/w3E2qhy0O+JiKYeLmzrjDeumDCCzJ9daZONzg9LHN9p7VHqdlnb oFW8ysqTQvP7vvTnz+fplrPNbF4VnMt6BddqhZWReY5nsgZ796jyg0V+sulnSj2g kuLuVWnakPt9GaRZW4/WJvs8Uq84DeOyOuGOXwRwHxWHBNUZJBa1cuvsyKKs/DEO 9owjm2lNiJmNkRmyj1gEorM4M5/wsyKSDRy0RLaERUhYNbYgte71lclHk890EjGS 82cf+18sXlJOeGu+WsSvLBY3yMWRNFNM72ar4yz/EcAczfHasks0X4qga5DjBQ58 Gt8waV/GfwVbe6+BVve9cYlri841zycQBKrc+kDh9LYZtd6YN8uP8k8EQOV2uBm5 n0DoAsyENptfXAL/lGFwg+Ns+uQZgE3oTQe8mn6ZS9ngOFguuieJ7gnE1sBJH4hS XWRkJdsXNw0l10SJjMs9i7fGN6+EgImCiguom6i0aYyEEwFQIMO2WEifs34gL1ZE Jn14Qy/neYLGiQAWIUsNxJSONMhLz2/feYpo3KhWfJqNs2TVW5o= =xcgH -----END PGP SIGNATURE-----
