Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]
- Ubuntu Security Notice USN-6644-1[6]
- Authored by Ubuntu[7] | Site security.ubuntu.com[8]
-
Ubuntu Security Notice 6644-1 - It was discovered that LibTIFF incorrectly handled certain files. If a user were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause the application to crash, resulting in a denial of service. It was discovered that LibTIFF incorrectly handled certain image files with the tiffcp utility. If a user were tricked into opening a specially crafted image file, an attacker could possibly use this issue to cause tiffcp to crash, resulting in a denial of service.
- systems | linux[9], ubuntu[10]
- advisories | CVE-2023-52356[11], CVE-2023-6228[12], CVE-2023-6277[13]
- SHA-256 |
ef3f4db4f26363a7b6f29905c846ae44e713361a0326d73013b608026cee7283
- Download[14] | Favorite[15] | View[16]
Change Mirror[17] Download[18]
==========================================================================
Ubuntu Security Notice USN-6644-1
February 19, 2024
tiff vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 23.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)
Summary:
Several security issues were fixed in LibTIFF.
Software Description:
- tiff: Tag Image File Format (TIFF) library
Details:
It was discovered that LibTIFF incorrectly handled certain files. If
a user were tricked into opening a specially crafted file, an attacker
could possibly use this issue to cause the application to crash, resulting
in a denial of service. (CVE-2023-52356)
It was discovered that LibTIFF incorrectly handled certain image files
with the tiffcp utility. If a user were tricked into opening a specially
crafted image file, an attacker could possibly use this issue to cause
tiffcp to crash, resulting in a denial of service. (CVE-2023-6228)
It was discovered that LibTIFF incorrectly handled certain files. If
a user were tricked into opening a specially crafted file, an attacker
could possibly use this issue to cause the application to consume
resources, resulting in a denial of service. (CVE-2023-6277)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 23.10:
libtiff-tools 4.5.1+git230720-1ubuntu1.1
libtiff6 4.5.1+git230720-1ubuntu1.1
Ubuntu 20.04 LTS:
libtiff-tools 4.1.0+git191117-2ubuntu0.20.04.12
libtiff5 4.1.0+git191117-2ubuntu0.20.04.12
Ubuntu 18.04 LTS (Available with Ubuntu Pro):
libtiff-tools 4.0.9-5ubuntu0.10+esm5
libtiff5 4.0.9-5ubuntu0.10+esm5
Ubuntu 16.04 LTS (Available with Ubuntu Pro):
libtiff-tools 4.0.6-1ubuntu0.8+esm15
libtiff5 4.0.6-1ubuntu0.8+esm15
Ubuntu 14.04 LTS (Available with Ubuntu Pro):
libtiff-tools 4.0.3-7ubuntu0.11+esm12
libtiff5 4.0.3-7ubuntu0.11+esm12
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6644-1
CVE-2023-52356, CVE-2023-6228, CVE-2023-6277
Package Information:
https://launchpad.net/ubuntu/+source/tiff/4.5.1+git230720-1ubuntu1.1
https://launchpad.net/ubuntu/+source/tiff/4.1.0+git191117-2ubuntu0.20.04.12
File Tags
- ActiveX[24] (933)
- Advisory[25] (84,223)
- Arbitrary[26] (16,545)
- BBS[27] (2,859)
- Bypass[28] (1,813)
- CGI[29] (1,031)
- Code Execution[30] (7,562)
- Conference[31] (687)
- Cracker[32] (844)
- CSRF[33] (3,368)
- DoS[34] (24,321)
- Encryption[35] (2,380)
- Exploit[36] (52,539)
- File Inclusion[37] (4,242)
- File Upload[38] (982)
- Firewall[39] (822)
- Info Disclosure[40] (2,826)
- Intrusion Detection[41] (905)
- Java[42] (3,114)
- JavaScript[43] (887)
- Kernel[44] (6,924)
- Local[45] (14,640)
- Magazine[46] (586)
- Overflow[47] (12,974)
- Perl[48] (1,430)
- PHP[49] (5,170)
- Proof of Concept[50] (2,364)
- Protocol[51] (3,683)
- Python[52] (1,590)
- Remote[53] (31,250)
- Root[54] (3,613)
- Rootkit[55] (519)
- Ruby[56] (616)
- Scanner[57] (1,647)
- Security Tool[58] (7,962)
- Shell[59] (3,231)
- Shellcode[60] (1,216)
- Sniffer[61] (899)
- Spoof[62] (2,236)
- SQL Injection[63] (16,476)
- TCP[64] (2,420)
- Trojan[65] (688)
- UDP[66] (896)
- Virus[67] (668)
- Vulnerability[68] (32,434)
- Web[69] (9,827)
- Whitepaper[70] (3,765)
- x86[71] (966)
- XSS[72] (18,114)
- Other[73]
File Archives
- February 2024[74]
- January 2024[75]
- December 2023[76]
- November 2023[77]
- October 2023[78]
- September 2023[79]
- August 2023[80]
- July 2023[81]
- June 2023[82]
- May 2023[83]
- April 2023[84]
- March 2023[85]
- Older[86]
Systems
- AIX[87] (429)
- Apple[88] (2,060)
- BSD[89] (375)
- CentOS[90] (57)
- Cisco[91] (1,926)
- Debian[92] (6,970)
- Fedora[93] (1,693)
- FreeBSD[94] (1,246)
- Gentoo[95] (4,458)
- HPUX[96] (880)
- iOS[97] (369)
- iPhone[98] (108)
- IRIX[99] (220)
- Juniper[100] (69)
- Linux[101] (48,639)
- Mac OS X[102] (691)
- Mandriva[103] (3,105)
- NetBSD[104] (256)
- OpenBSD[105] (487)
- RedHat[106] (15,114)
- Slackware[107] (941)
- Solaris[108] (1,611)
- SUSE[109] (1,444)
- Ubuntu[110] (9,295)
- UNIX[111] (9,371)
- UnixWare[112] (187)
- Windows[113] (6,627)
- Other[114]
- Services
- Security Services[125]
- Hosting By
- Rokasec[126]
Read more https://packetstormsecurity.com/files/177217/USN-6644-1.txt