|
|
| |
Credit:
The information has been provided by Dan Rosenberg.
The original article can be found at: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=874
|
| |
Vulnerable Systems:
* libTIFF version 3.9.2
This vulnerability is due to insufficient bounds checking when copying data into a stack allocated buffer. During the processing of a certain EXIF tag a fixed sized stack buffer is used as a destination location for a memory copy. This memory copy can cause the bounds of a stack buffer to be overflown and this condition may lead to arbitrary code execution.
Patch Availability:
Multiple vendors have released patches to address this issue. Information about downloadable vendor updates can be found by clicking on the following URLs:
http://www.remotesensing.org/libtiff/v3.9.4.html#libtiff
http://www.ubuntu.com/usn/usn-954-1
https://bugzilla.redhat.com/show_bug.cgi?id=599576
CVE Information:
CVE-2010-2067
Disclosure Timeline:
05/27/2010 Initial Vendor Notification
05/27/2010 Initial Vendor Reply
06/21/2010 Coordinated Public Disclosure
|
|
|