A heap-based buffer overflow was found in the way TIFF (Tagged Image File Format) image files manipulating library expanded certain rows of 2D-encoded data, when processing TIFF Internet Fax image files, compressed with CCITT group 4 compression algorithm. If an attacker created a specially-crafted image file and tricked a local, unsuspecting user into loading the image file in an application that uses the TIFF image manipulating library, it could cause that application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.
This issue affects the version of the libtiff package, as shipped with Red Hat Enterprise Linux 4, 5, and 6. -- This issue affects the versions of the libtiff package, as shipped with Fedora release of 13 and 14.
Acknowledgements: Red Hat would like to thank Apple Product Security for reporting this issue.
Created libtiff tracking bugs for this issue Affects: fedora-all [bug 681672]
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 4 Via RHSA-2011:0318 https://rhn.redhat.com/errata/RHSA-2011-0318.html
This fix is believed to cause a regression when reading CCITFAX4 compressed TIFF file that could be read successfully before. See http://bugzilla.maptools.org/show_bug.cgi?id=2297
Sigh. Even is right: this fix is busted and will reject files that should be accepted, including some produced by libtiff itself. See analysis and corrected patch at the upstream bug linked in comment #23.
(In reply to comment #23) > This fix is believed to cause a regression when reading CCITFAX4 compressed > TIFF file that could be read successfully before. See > http://bugzilla.maptools.org/show_bug.cgi?id=2297 This regression was fixed in RHSA-2011:0392: https://rhn.redhat.com/errata/RHSA-2011-0392.html