Bug 202690 - CVE-2006-2193 tiff2pdf buffer overflow
Summary: CVE-2006-2193 tiff2pdf buffer overflow
Keywords:
Status: CLOSED RAWHIDE
Alias: None
Product: Fedora
Classification: Fedora
Component: libtiff
Version: 6
Hardware: All
OS: Linux
medium
low
Target Milestone: ---
Assignee: Jindrich Novy
QA Contact:
URL:
Whiteboard: impact=low,public=20060607,reported=2...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2006-08-15 20:37 UTC by Mark J. Cox
Modified: 2013-07-02 23:17 UTC (History)
1 user (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2006-09-05 12:58:54 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Mark J. Cox 2006-08-15 20:37:51 UTC
Fix needed for FC6

+++ This bug was initially created as a clone of Bug #194363 +++

tiff2pdf buffer overflow

A buffer overflow flaw has been found in tiff2pdf.
Thomas Biege told vendor-sec about this (it came from a colleague of
his)

The code in question is as such:

char buffer[5];
...
sprintf(buffer, "\\%.3o", pdfstr[i]);


pdfstr[i] is signed char, therefore would write \37777777741


This issue also affects FC4

Comment 1 Jindrich Novy 2006-09-05 12:58:54 UTC
Fixed since libtiff-3.8.2-6.fc6.


Note You need to log in before you can comment on or make changes to this bug.