Debian DLA-3513-1 : tiff - LTS security update

medium Nessus Plugin ID 179135

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-3513 advisory.

- libtiff 4.5.0 is vulnerable to Buffer Overflow via /libtiff/tools/tiffcrop.c:8499. Incorrect updating of buffer size after rotateImage() in tiffcrop cause heap-buffer-overflow and SEGV. (CVE-2023-25433)

- loadImage() in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based use after free via a crafted TIFF image. (CVE-2023-26965)

- libtiff 4.5.0 is vulnerable to Buffer Overflow in uv_encode() when libtiff reads a corrupted little-endian TIFF file and specifies the output to be big-endian. (CVE-2023-26966)

- A null pointer dereference issue was found in Libtiff's tif_dir.c file. This issue may allow an attacker to pass a crafted TIFF image file to the tiffcp utility which triggers a runtime error that causes undefined behavior. This will result in an application crash, eventually leading to a denial of service.
(CVE-2023-2908)

- A NULL pointer dereference in TIFFClose() is caused by a failure to open an output file (non-existent path or a path that requires permissions like /dev/null) while specifying zones. (CVE-2023-3316)

- A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to a buffer overflow in the Fax3Encode function in libtiff/tif_fax3.c, resulting in a denial of service.
(CVE-2023-3618)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the tiff packages.

For Debian 10 buster, these problems have been fixed in version 4.1.0+git191117-2~deb10u8.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1040945

https://security-tracker.debian.org/tracker/source-package/tiff

https://www.debian.org/lts/security/2023/dla-3513

https://security-tracker.debian.org/tracker/CVE-2023-25433

https://security-tracker.debian.org/tracker/CVE-2023-26965

https://security-tracker.debian.org/tracker/CVE-2023-26966

https://security-tracker.debian.org/tracker/CVE-2023-2908

https://security-tracker.debian.org/tracker/CVE-2023-3316

https://security-tracker.debian.org/tracker/CVE-2023-3618

https://security-tracker.debian.org/tracker/CVE-2023-38288

https://security-tracker.debian.org/tracker/CVE-2023-38289

https://packages.debian.org/source/buster/tiff

Plugin Details

Severity: Medium

ID: 179135

File Name: debian_DLA-3513.nasl

Version: 1.0

Type: local

Agent: unix

Published: 8/1/2023

Updated: 8/1/2023

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2023-3618

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:libtiff-dev, p-cpe:/a:debian:debian_linux:libtiff5, p-cpe:/a:debian:debian_linux:libtiff5-dev, p-cpe:/a:debian:debian_linux:libtiff-opengl, cpe:/o:debian:debian_linux:10.0, p-cpe:/a:debian:debian_linux:libtiff-tools, p-cpe:/a:debian:debian_linux:libtiff-doc, p-cpe:/a:debian:debian_linux:libtiffxx5

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/31/2023

Vulnerability Publication Date: 6/14/2023

Reference Information

CVE: CVE-2023-25433, CVE-2023-26965, CVE-2023-26966, CVE-2023-2908, CVE-2023-3316, CVE-2023-3618, CVE-2023-38288, CVE-2023-38289