Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1344069 - (CVE-2016-5319) CVE-2016-5319 libtiff: Heap-based buffer overflow in bmp2tiff
CVE-2016-5319 libtiff: Heap-based buffer overflow in bmp2tiff
Status: CLOSED WONTFIX
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20160427,repor...
: Security
Depends On: 1344072 1344070 1344071
Blocks: 1344073
  Show dependency treegraph
 
Reported: 2016-06-08 12:32 EDT by Adam Mariš
Modified: 2017-01-20 00:25 EST (History)
3 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2017-01-16 01:27:56 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Adam Mariš 2016-06-08 12:32:27 EDT
Heap-based buffer overflow vulnerability was found in tif_packbits.c in PackBitsEncode function. Memory corruption can be triggered when bmp2tiff is handling maliciously crafted bmp file causing application to crash.

CVE assignment:

http://seclists.org/oss-sec/2016/q2/486
Comment 1 Adam Mariš 2016-06-08 12:33:45 EDT
Created libtiff tracking bugs for this issue:

Affects: fedora-all [bug 1344070]
Comment 2 Adam Mariš 2016-06-08 12:33:49 EDT
Created mingw-libtiff tracking bugs for this issue:

Affects: fedora-all [bug 1344071]
Affects: epel-7 [bug 1344072]
Comment 3 Huzaifa S. Sidhpurwala 2017-01-16 01:27:56 EST
https://github.com/vadz/libtiff/ -> the forked version of libtiff, reacted to this flaw by removing the bmp2tiff utility from the package.

Note You need to log in before you can comment on or make changes to this bug.