RHEL 2.1 / 3 / 4 : libtiff (RHSA-2006:0603)

high Nessus Plugin ID 22149

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

Updated libtiff packages that fix several security flaws are now available for Red Hat Enterprise Linux.

This update has been rated as having important security impact by the Red Hat Security Response Team.

The libtiff package contains a library of functions for manipulating TIFF (Tagged Image File Format) files.

Tavis Ormandy of Google discovered a number of flaws in libtiff during a security audit. An attacker could create a carefully crafted TIFF file in such a way that it was possible to cause an application linked with libtiff to crash or possibly execute arbitrary code.
(CVE-2006-3459, CVE-2006-3460, CVE-2006-3461, CVE-2006-3462, CVE-2006-3463, CVE-2006-3464, CVE-2006-3465)

All users are advised to upgrade to these updated packages, which contain backported fixes for these issues.

Solution

Update the affected libtiff and / or libtiff-devel packages.

See Also

https://access.redhat.com/security/cve/cve-2006-2656

https://access.redhat.com/security/cve/cve-2006-3459

https://access.redhat.com/security/cve/cve-2006-3460

https://access.redhat.com/security/cve/cve-2006-3461

https://access.redhat.com/security/cve/cve-2006-3462

https://access.redhat.com/security/cve/cve-2006-3463

https://access.redhat.com/security/cve/cve-2006-3464

https://access.redhat.com/security/cve/cve-2006-3465

https://access.redhat.com/errata/RHSA-2006:0603

Plugin Details

Severity: High

ID: 22149

File Name: redhat-RHSA-2006-0603.nasl

Version: 1.29

Type: local

Agent: unix

Published: 8/4/2006

Updated: 1/14/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.5

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:libtiff-devel, cpe:/o:redhat:enterprise_linux:3, cpe:/o:redhat:enterprise_linux:4, p-cpe:/a:redhat:enterprise_linux:libtiff, cpe:/o:redhat:enterprise_linux:2.1

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/2/2006

Vulnerability Publication Date: 5/30/2006

Exploitable With

Metasploit (Apple iOS MobileMail LibTIFF Buffer Overflow)

Reference Information

CVE: CVE-2006-2656, CVE-2006-3459, CVE-2006-3460, CVE-2006-3461, CVE-2006-3462, CVE-2006-3463, CVE-2006-3464, CVE-2006-3465

BID: 19287

CWE: 119, 189

RHSA: 2006:0603