ALAS-2012-106


Amazon Linux 1 Security Advisory: ALAS-2012-106
Advisory Release Date: 2012-07-06 16:18 Pacific
Advisory Updated Date: 2014-09-14 16:44 Pacific
Severity: Important

Issue Overview:

libtiff did not properly convert between signed and unsigned integer values, leading to a buffer overflow. An attacker could use this flaw to create a specially-crafted TIFF file that, when opened, would cause an application linked against libtiff to crash or, possibly, execute arbitrary code. (CVE-2012-2088)

Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in the tiff2pdf tool. An attacker could use these flaws to create a specially-crafted TIFF file that would cause tiff2pdf to crash or, possibly, execute arbitrary code. (CVE-2012-2113)


Affected Packages:

libtiff


Issue Correction:
Run yum update libtiff to update your system.

New Packages:
i686:
    libtiff-devel-3.9.4-6.10.amzn1.i686
    libtiff-3.9.4-6.10.amzn1.i686
    libtiff-debuginfo-3.9.4-6.10.amzn1.i686
    libtiff-static-3.9.4-6.10.amzn1.i686

src:
    libtiff-3.9.4-6.10.amzn1.src

x86_64:
    libtiff-3.9.4-6.10.amzn1.x86_64
    libtiff-debuginfo-3.9.4-6.10.amzn1.x86_64
    libtiff-static-3.9.4-6.10.amzn1.x86_64
    libtiff-devel-3.9.4-6.10.amzn1.x86_64