A flaw was found in a way libtiff handled vertically flipped (i.e. with negative toskew) images on 64bit platforms. Numeric computation used to calculate buffer pointer was done in the way that incorrectly extended from 32bit type to 64bit, resulting in out-of-bounds writes.
For more details, refer to following bugs:
Not vulnerable. This issue did not affect the versions of libtiff as shipped with Red Hat Enterprise Linux 3, 4, or 5.
libtiff-3.9.4-1.fc12 has been submitted as an update for Fedora 12.
libtiff-3.9.4-1.fc13 has been submitted as an update for Fedora 13.
libtiff-3.9.4-1.fc13 has been pushed to the Fedora 13 stable repository. If problems still persist, please make note of it in this bug report.
CVE as described by Mitre:
tif_getimage.c in LibTIFF 3.9.0 and 3.9.2 on 64-bit platforms, as used
in ImageMagick, does not properly perform vertical flips, which allows
remote attackers to cause a denial of service (application crash) or
possibly execute arbitrary code via a crafted TIFF image, related to
"downsampled OJPEG input."
Reference to 3.9.4 changelog seems to be due to securitytracker.com page incorrectly stating that this is fixed in 3.9.4. This issue is not fixed in 3.9.4, the fix is not committed in upstream CVS yet.
libtiff-3.9.4-1.fc12 has been pushed to the Fedora 12 stable repository. If problems still persist, please make note of it in this bug report.