First published: Mon Apr 15 2013(Updated: )
A stack-based buffer overflow was found in the way tiff2pdf, a TIFF image to a PDF document conversion tool, of libtiff, a library of functions for manipulating TIFF (Tagged Image File Format) image format files, performed write of TIFF image content into particular PDF document file, when malformed image-length and resolution values are used in the TIFF file. A remote attacker could provide a specially-crafted TIFF image format file, that when processed by tiff2pdf would lead to tiff2pdf executable crash. Acknowledgements: Red Hat would like to thank Emmanuel Bouillon (NCI Agency) for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
TIFF | ||
tiff2pdf |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-952131 is categorized as high due to the stack-based buffer overflow vulnerability.
To fix REDHAT-BUG-952131, update the libtiff and tiff2pdf packages to the latest versions provided by Red Hat.
REDHAT-BUG-952131 affects systems running Red Hat versions of the libtiff and tiff2pdf software.
The impact of REDHAT-BUG-952131 can lead to arbitrary code execution due to the buffer overflow in the tiff2pdf tool.
You can determine if your system is vulnerable to REDHAT-BUG-952131 by checking the versions of libtiff and tiff2pdf installed on your system.