First published: Mon Aug 11 2008(Updated: )
Drew Yao of Apple Product Security reported a flaw in the LZW decoder used by libtiff to handle LZW-encoded images. Translation table used by decoding algorithm is not properly re-initialized after "code clear" code is read from the stream being decoded. When reading that code, decoder should discard previous translation table and start filling it again. Later during the processing, no longer valid table entries may be indexed by the input stream, causing libtiff to follow no longer valid pointer. This can result in crash, memory corruption and possibly allow code execution. References: <a href="http://www.remotesensing.org/libtiff/">http://www.remotesensing.org/libtiff/</a> <a href="http://en.wikipedia.org/wiki/Lzw">http://en.wikipedia.org/wiki/Lzw</a> Acknowledgements: Red Hat would like to thank Drew Yao of the Apple Product Security team for reporting this issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libtiff Libtiff | =3.6.1 | |
Libtiff Libtiff | =3.8.0 | |
Libtiff Libtiff | =3.8.1 | |
Libtiff Libtiff | =3.4 | |
Libtiff Libtiff | =3.5.7 | |
Libtiff Libtiff | =3.7.0 | |
Libtiff Libtiff | =3.6.0 | |
Libtiff Libtiff | =3.5.3 | |
Libtiff Libtiff | =3.7.1 | |
Libtiff Libtiff | =3.5.4 | |
Libtiff Libtiff | =3.5.2 | |
Libtiff Libtiff | =3.5.5 | |
Libtiff Libtiff | =3.5.1 | |
Libtiff Libtiff | =3.5.6 | |
Libtiff Libtiff | <=3.8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.