First published: Mon Aug 11 2008(Updated: )
Drew Yao of Apple Product Security reported a flaw in the LZW decoder used by libtiff to handle LZW-encoded images. Translation table used by decoding algorithm is not properly re-initialized after "code clear" code is read from the stream being decoded. When reading that code, decoder should discard previous translation table and start filling it again. Later during the processing, no longer valid table entries may be indexed by the input stream, causing libtiff to follow no longer valid pointer. This can result in crash, memory corruption and possibly allow code execution. References: <a href="http://www.remotesensing.org/libtiff/">http://www.remotesensing.org/libtiff/</a> <a href="http://en.wikipedia.org/wiki/Lzw">http://en.wikipedia.org/wiki/Lzw</a> Acknowledgements: Red Hat would like to thank Drew Yao of the Apple Product Security team for reporting this issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
tiff | <=3.8.2 | |
tiff | =3.4 | |
tiff | =3.5.1 | |
tiff | =3.5.2 | |
tiff | =3.5.3 | |
tiff | =3.5.4 | |
tiff | =3.5.5 | |
tiff | =3.5.6 | |
tiff | =3.5.7 | |
tiff | =3.6.0 | |
tiff | =3.6.1 | |
tiff | =3.7.0 | |
tiff | =3.7.1 | |
tiff | =3.8.0 | |
tiff | =3.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2327 is considered to have a moderate severity level due to its potential impact on the integrity of LZW-encoded images.
To fix CVE-2008-2327, upgrade libtiff to version 3.8.3 or later.
CVE-2008-2327 affects libtiff versions up to and including 3.8.2, as well as specific earlier versions including 3.4, 3.5.1 to 3.8.1.
The impact of CVE-2008-2327 can lead to application crashes or execution of arbitrary code when handling LZW-encoded images.
There is no known workaround for CVE-2008-2327, so updating to a patched version is strongly recommended.