First published: Mon Aug 12 2013(Updated: )
Pedro Ribeiro discovered a use-after-free flaw in the t2p_readwrite_pdf_image() function in tiff2pdf, a tool for converting a TIFF image to a PDF document. A remote attacker could provide a specially-crafted TIFF file that, when processed by tiff2pdf, would cause tiff2pdf to crash or, potentially, execute arbitrary code with the privileges of the user running tiff2pdf. References: <a href="http://www.asmail.be/msg0055359936.html">http://www.asmail.be/msg0055359936.html</a> <a href="http://www.openwall.com/lists/oss-security/2013/08/08/6">http://www.openwall.com/lists/oss-security/2013/08/08/6</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libtiff Libtiff | =4.0.3 | |
Debian Debian Linux | =6.0 | |
Debian Debian Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.