Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2011-0392

Опубликовано: 28 мар. 2011
Источник: oracle-oval
Платформа: Oracle Linux 5
Платформа: Oracle Linux 6

Описание

ELSA-2011-0392: libtiff security and bug fix update (IMPORTANT)

[3.9.4-1.el6_0.2]

  • Fix incorrect fix for CVE-2011-0192 Resolves: #688829
  • Add fix for CVE-2011-1167 Resolves: #688742

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

libtiff

3.8.2-7.el5_6.7

libtiff-devel

3.8.2-7.el5_6.7

Oracle Linux x86_64

libtiff

3.8.2-7.el5_6.7

libtiff-devel

3.8.2-7.el5_6.7

Oracle Linux i386

libtiff

3.8.2-7.el5_6.7

libtiff-devel

3.8.2-7.el5_6.7

Oracle Linux 6

Oracle Linux x86_64

libtiff

3.9.4-1.el6_0.2

libtiff-devel

3.9.4-1.el6_0.2

libtiff-static

3.9.4-1.el6_0.2

Oracle Linux i686

libtiff

3.9.4-1.el6_0.2

libtiff-devel

3.9.4-1.el6_0.2

libtiff-static

3.9.4-1.el6_0.2

Связанные CVE

Связанные уязвимости

ubuntu
около 14 лет назад

Heap-based buffer overflow in the thunder (aka ThunderScan) decoder in tif_thunder.c in LibTIFF 3.9.4 and earlier allows remote attackers to execute arbitrary code via crafted THUNDER_2BITDELTAS data in a .tiff file that has an unexpected BitsPerSample value.

redhat
больше 14 лет назад

Heap-based buffer overflow in the thunder (aka ThunderScan) decoder in tif_thunder.c in LibTIFF 3.9.4 and earlier allows remote attackers to execute arbitrary code via crafted THUNDER_2BITDELTAS data in a .tiff file that has an unexpected BitsPerSample value.

nvd
около 14 лет назад

Heap-based buffer overflow in the thunder (aka ThunderScan) decoder in tif_thunder.c in LibTIFF 3.9.4 and earlier allows remote attackers to execute arbitrary code via crafted THUNDER_2BITDELTAS data in a .tiff file that has an unexpected BitsPerSample value.

debian
около 14 лет назад

Heap-based buffer overflow in the thunder (aka ThunderScan) decoder in ...

github
около 3 лет назад

Heap-based buffer overflow in the thunder (aka ThunderScan) decoder in tif_thunder.c in LibTIFF 3.9.4 and earlier allows remote attackers to execute arbitrary code via crafted THUNDER_2BITDELTAS data in a .tiff file that has an unexpected BitsPerSample value.