*** This bug is a security vulnerability *** Public security bug reported:
A heap-based buffer overflow flaw was found in the way tiff2pdf, a TIFF image to a PDF document conversion tool, of libtiff, a library of functions for manipulating TIFF (Tagged Image File Format) image format files, performed write of TIFF image content into particular PDF document file, when not properly initialized T2P context struct pointer has been provided by tiff2pdf (application requesting the conversion) as one of parameters for the routine performing the write. A remote attacker could provide a specially-crafted TIFF image format file, that when processed by tiff2pdf would lead to tiff2pdf executable crash or, potentially, arbitrary code execution with the privileges of the user running the tiff2pdf binary. This issue has been assigned CVE-2012-3401. Reference: https://bugzilla.redhat.com/show_bug.cgi?id=837577 The relevant patch for the issue has been applied to upstream libtiff-4.0.2 branch ** Affects: tiff (Ubuntu) Importance: Undecided Status: New ** Affects: tiff (Fedora) Importance: Unknown Status: Unknown ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2012-3401 ** Bug watch added: Red Hat Bugzilla #837577 https://bugzilla.redhat.com/show_bug.cgi?id=837577 ** Also affects: tiff (Fedora) via https://bugzilla.redhat.com/show_bug.cgi?id=837577 Importance: Unknown Status: Unknown ** Visibility changed to: Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1026438 Title: (CVE-2012-3401) libtiff (tiff2pdf): Heap-based buffer overflow due to improper initialization of T2P context struct pointer To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/1026438/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs