Source: tiff
Version: 4.0.7-4
Severity: important
Tags: security patch upstream

Hi,

the following vulnerability was published for tiff.

CVE-2017-5225[0]:
| LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the
| tools/tiffcp resulting in DoS or code execution via a crafted
| BitsPerSample value.

For 4.0.7, reproducible with an ASAN build and the reproducers given
in the upstream bug reports [1], [2].

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-5225
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5225
[1] http://bugzilla.maptools.org/show_bug.cgi?id=2656
[2] http://bugzilla.maptools.org/show_bug.cgi?id=2657

Please adjust the affected versions in the BTS as needed. Only found
time to check 4.0.7 source.

Regards,
Salvatore

_______________________________________________
Secure-testing-team mailing list
Secure-testing-team@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team

Reply via email to