First published: Wed Oct 31 2012(Updated: )
A flaw was found in the way ppm2tiff, a tool to create a TIFF file from PPM, PGM and PBM image files, did not check the return value of TIFFScanlineSize() function. When TIFFScanlineSize encountered an integer-overflow and returned zero, this value was not checked. A remote attacker could provide a specially-crafted PPM image format file, that when processed by ppm2tiff would lead to ppm2tiff executable crash or, potentially, arbitrary code execution with the privileges of the user running the ppm2tiff binary.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
TIFF | <=4.0.3 | |
Debian Linux | =6.0 | |
Debian Linux | =7.0 | |
Ubuntu | =8.04 | |
Ubuntu | =10.04 | |
Ubuntu | =11.10 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server EUS | =6.3 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =5.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
openSUSE | =11.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4564 is considered a moderate severity vulnerability due to potential exploitation risks.
To mitigate CVE-2012-4564, update the libtiff package to a version that is above 4.0.3.
CVE-2012-4564 affects libtiff versions up to 4.0.3 and several versions of Debian and Ubuntu Linux.
Yes, CVE-2012-4564 can potentially be exploited by remote attackers through specially crafted image files.
The vulnerability in CVE-2012-4564 is due to improper handling of the return value from the TIFFScanlineSize() function.