Bug 1294425 - (CVE-2015-8668) CVE-2015-8668 libtiff: OOB read in bmp2tiff
CVE-2015-8668 libtiff: OOB read in bmp2tiff
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20151228,reported=2...
: Security
Depends On: 1299918 1299919 1299920 1299921 1335098 1335099
Blocks: 1294418
  Show dependency treegraph
 
Reported: 2015-12-28 02:51 EST by Huzaifa S. Sidhpurwala
Modified: 2016-10-13 05:27 EDT (History)
8 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-10-13 05:25:36 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Huzaifa S. Sidhpurwala 2015-12-28 02:51:28 EST
A heap-buffer oveflow was found in bmp2tiff, A tool used to created TIFF format files from BMP format image files. An attacker could provide a specially-crafted BMP format file, which when converted to TIFF format, using the bmp2tiff tool, could lead to bmp2tiff executable to crash.

Reference:

http://seclists.org/bugtraq/2015/Dec/138
Comment 1 Stefan Cornelius 2016-01-05 10:19:32 EST
I haven't completed my analysis yet, but for now I tend to say that this is only OOB read.
Comment 11 errata-xmlrpc 2016-08-02 12:41:02 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2016:1547 https://rhn.redhat.com/errata/RHSA-2016-1547.html
Comment 12 errata-xmlrpc 2016-08-02 13:00:00 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2016:1546 https://rhn.redhat.com/errata/RHSA-2016-1546.html
Comment 13 Even Rouault 2016-08-04 05:26:45 EDT
I think the patch is incomplete. See http://bugzilla.maptools.org/show_bug.cgi?id=2563#c2

Note You need to log in before you can comment on or make changes to this bug.