CVE-2006-2193
CVSS7.5
发布时间 :2006-06-08 15:06:00
修订时间 :2013-08-17 01:06:33
NMCOPS    

[原文]Buffer overflow in the t2p_write_pdf_string function in tiff2pdf in libtiff 3.8.2 and earlier allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a TIFF file with a DocumentName tag that contains UTF-8 characters, which triggers the overflow when a character is sign extended to an integer that produces more digits than expected in an sprintf call.


[CNNVD]LibTIFF tiff2pdf函数 远程溢出漏洞(CNNVD-200606-187)

         LibTiff是负责对TIFF图象格式进行编码/解码的应用库。
         LibTiff的tiff2pdf函数在将TIFF文件转换为PDF文档时存在溢出漏洞。远程攻击者可以诱骗用户访问特制的TIFF图形文件导致执行任意代码。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:libtiff:libtiff:3.7.1LibTIFF 3.7.1
cpe:/a:libtiff:libtiff:3.7.0LibTIFF 3.7.0
cpe:/a:libtiff:libtiff:3.8.0LibTIFF 3.8.0
cpe:/a:libtiff:libtiff:3.6.1LibTIFF 3.6.1
cpe:/a:libtiff:libtiff:3.8.2LibTIFF 3.8.2
cpe:/a:libtiff:libtiff:3.8.1LibTIFF 3.8.1
cpe:/a:libtiff:libtiff:3.6.0LibTIFF 3.6.0
cpe:/a:libtiff:libtiff:3.5.1LibTIFF 3.5.1
cpe:/a:libtiff:libtiff:3.4LibTIFF 3.4
cpe:/a:libtiff:libtiff:3.5.3LibTIFF 3.5.3
cpe:/a:libtiff:libtiff:3.5.2LibTIFF 3.5.2
cpe:/a:libtiff:libtiff:3.5.6LibTIFF 3.5.6
cpe:/a:libtiff:libtiff:3.5.7LibTIFF 3.5.7
cpe:/a:libtiff:libtiff:3.5.4LibTIFF 3.5.4
cpe:/a:libtiff:libtiff:3.5.5LibTIFF 3.5.5

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:9788Buffer overflow in the t2p_write_pdf_string function in tiff2pdf in libtiff 3.8.2 and earlier allows attackers to cause a denial of service ...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2193
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-2193
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200606-187
(官方数据源) CNNVD

- 其它链接及资源

http://www.debian.org/security/2006/dsa-1091
(VENDOR_ADVISORY)  DEBIAN  DSA-1091
http://secunia.com/advisories/20488
(VENDOR_ADVISORY)  SECUNIA  20488
http://bugzilla.remotesensing.org/show_bug.cgi?id=1196
(PATCH)  CONFIRM  http://bugzilla.remotesensing.org/show_bug.cgi?id=1196
http://www.vupen.com/english/advisories/2007/4034
(UNKNOWN)  VUPEN  ADV-2007-4034
http://www.vupen.com/english/advisories/2007/3486
(UNKNOWN)  VUPEN  ADV-2007-3486
http://www.vupen.com/english/advisories/2006/2197
(UNKNOWN)  VUPEN  ADV-2006-2197
http://www.redhat.com/support/errata/RHSA-2008-0848.html
(UNKNOWN)  REDHAT  RHSA-2008:0848
http://secunia.com/advisories/31670
(UNKNOWN)  SECUNIA  31670
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=370355
(UNKNOWN)  CONFIRM  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=370355
http://xforce.iss.net/xforce/xfdb/26991
(UNKNOWN)  XF  libtiff-tiff2pdf-bo(26991)
http://www.ubuntulinux.org/support/documentation/usn/usn-289-1
(UNKNOWN)  UBUNTU  USN-289-1
http://www.securityfocus.com/bid/18331
(UNKNOWN)  BID  18331
http://www.mandriva.com/security/advisories?name=MDKSA-2006:102
(UNKNOWN)  MANDRIVA  MDKSA-2006:102
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201331-1
(UNKNOWN)  SUNALERT  201331
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103160-1
(UNKNOWN)  SUNALERT  103160
http://security.gentoo.org/glsa/glsa-200607-03.xml
(UNKNOWN)  GENTOO  GLSA-200607-03
http://secunia.com/advisories/27832
(UNKNOWN)  SECUNIA  27832
http://secunia.com/advisories/27222
(UNKNOWN)  SECUNIA  27222
http://secunia.com/advisories/27181
(UNKNOWN)  SECUNIA  27181
http://secunia.com/advisories/21002
(UNKNOWN)  SECUNIA  21002
http://secunia.com/advisories/20766
(UNKNOWN)  SECUNIA  20766
http://secunia.com/advisories/20693
(UNKNOWN)  SECUNIA  20693
http://secunia.com/advisories/20520
(UNKNOWN)  SECUNIA  20520
http://secunia.com/advisories/20501
(UNKNOWN)  SECUNIA  20501
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0008.html
(UNKNOWN)  SUSE  SUSE-SR:2006:014

- 漏洞信息

LibTIFF tiff2pdf函数 远程溢出漏洞
高危 缓冲区溢出
2006-06-08 00:00:00 2006-06-09 00:00:00
远程  
         LibTiff是负责对TIFF图象格式进行编码/解码的应用库。
         LibTiff的tiff2pdf函数在将TIFF文件转换为PDF文档时存在溢出漏洞。远程攻击者可以诱骗用户访问特制的TIFF图形文件导致执行任意代码。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载
        http://www.debian.org/security/2006/dsa-1091
        

- 漏洞信息 (F47653)

TLSA-2006-0036.txt (PacketStormID:F47653)
2006-06-26 00:00:00
 
advisory,vulnerability
linux
CVE-2006-2193,CVE-2006-2656
[点击下载]

Trustix Secure Linux Security Advisory #2006-0036 - fcron and libtiff suffer from multiple vulnerabilities.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2006-0036

Package names:	   fcron, libtiff 
Summary:           Multiple vulnerabilities
Date:              2006-06-16
Affected versions: Trustix Secure Linux 2.2
                   Trustix Secure Linux 3.0
                   Trustix Operating System - Enterprise Server 2

- --------------------------------------------------------------------------
Package description:
  fcron
  Fcron is a scheduler. It aims at replacing Vixie Cron, so it implements
  most of its functionalities. But contrary to Vixie Cron, fcron does not
  need your system to be up 7 days a week, 24 hours a day : it also works
  well with systems which are not running neither all the time nor 
  regularly (contrary to anacrontab).

  libtiff
  The libtiff package contains a library of functions for manipulating
  TIFF (Tagged Image File Format) image format files.  TIFF is a widely
  used file format for bitmapped images.  TIFF files usually end in the
  .tif extension and they are often quite large.

Problem description:
  fcron < TSL 3.0 > < TSL 2.2 > < TSEL 2 >
  - Patched to fix buffer overflow due to a bug in make_msg(), Bug #1754.

  libtiff < TSL 3.0 > < TSL 2.2 > < TSEL 2 >
  - SECURITY Fix: gpe92 has discovered a vulnerability in LibTIFF caused
    due to a boundary error within tiff2pdf when handling a TIFF file with
    a "DocumentName" tag that contains UTF-8 characters. This can be
    exploited to cause a stack-based buffer overflow and may allow
    arbitrary code execution.
  - Stack-based buffer overflow in the tiffsplit command in libtiff might
    allow attackers to execute arbitrary code via a long filename.

    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the names CVE-2006-2193 and CVE-2006-2656 these issues. 

Action:
  We recommend that all systems with this package installed be upgraded.
  Please note that if you do not need the functionality provided by this
  package, you may want to remove it from your system.


Location:
  All Trustix Secure Linux updates are available from
  <URI:http://http.trustix.org/pub/trustix/updates/>
  <URI:ftp://ftp.trustix.org/pub/trustix/updates/>


About Trustix Secure Linux:
  Trustix Secure Linux is a small Linux distribution for servers. With focus
  on security and stability, the system is painlessly kept safe and up to
  date from day one using swup, the automated software updater.


Automatic updates:
  Users of the SWUP tool can enjoy having updates automatically
  installed using 'swup --upgrade'.


Questions?
  Check out our mailing lists:
  <URI:http://www.trustix.org/support/>


Verification:
  This advisory along with all Trustix packages are signed with the
  TSL sign key.
  This key is available from:
  <URI:http://www.trustix.org/TSL-SIGN-KEY>

  The advisory itself is available from the errata pages at
  <URI:http://www.trustix.org/errata/trustix-2.2/> and
  <URI:http://www.trustix.org/errata/trustix-3.0/>
  or directly at
  <URI:http://www.trustix.org/errata/2006/0036/>


MD5sums of the packages:
- --------------------------------------------------------------------------
ef9c418538fe7078fd0aef828242e94c  3.0/rpms/fcron-2.9.6-13tr.i586.rpm
8a4ecedfff22da6b1c4760a34aa519dc  3.0/rpms/libtiff-3.7.3-3tr.i586.rpm
9d1e3065f727303f684c075d1d58b582  3.0/rpms/libtiff-devel-3.7.3-3tr.i586.rpm
b1531880559bd9b9416df88f24f51b00  3.0/rpms/libtiff-docs-3.7.3-3tr.i586.rpm

b5432c9e8a0e7dc0f14d5d0ba56fae88  2.2/rpms/fcron-2.9.5.1-5tr.i586.rpm
7203c833a5d80a08ccfd240530c91e17  2.2/rpms/libtiff-3.7.3-3tr.i586.rpm
257f3daa5eb28d0567f741e7570dca6a  2.2/rpms/libtiff-devel-3.7.3-3tr.i586.rpm
- --------------------------------------------------------------------------


Trustix Security Team


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEkqLEi8CEzsK9IksRAk7FAJwJuKPsOcTHMBFr8QsvZlYEm01vAQCdGD1W
/XnBafSycZESp61S8DZz1+k=
=RYEA
-----END PGP SIGNATURE-----
    

- 漏洞信息

26031
LibTIFF tools/tiff2pdf.c tiff2pdf t2p_write_pdf_string() Function Buffer Overflow
Input Manipulation
Loss of Integrity
Vendor Verified

- 漏洞描述

- 时间线

2006-06-04 Unknow
Unknow 2007-07-13

- 解决方案

It has been reported that this issue has been fixed. Upgrade to version 3.9.0beta, 4.0.0alpha, or higher, to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

LibTIFF tiff2pdf Remote Buffer Overflow Vulnerability
Boundary Condition Error 18331
Yes No
2006-06-08 12:00:00 2008-08-29 02:56:00
SuSE is credited with the discovery of this vulnerability.

- 受影响的程序版本

Ubuntu Ubuntu Linux 5.10 powerpc
Ubuntu Ubuntu Linux 5.10 i386
Ubuntu Ubuntu Linux 5.10 amd64
Ubuntu Ubuntu Linux 5.0 4 powerpc
Ubuntu Ubuntu Linux 5.0 4 i386
Ubuntu Ubuntu Linux 5.0 4 amd64
Ubuntu Ubuntu Linux 6.06 LTS powerpc
Ubuntu Ubuntu Linux 6.06 LTS i386
Ubuntu Ubuntu Linux 6.06 LTS amd64
Trustix Secure Linux 3.0
Trustix Secure Linux 2.2
Trustix Secure Enterprise Linux 2.0
SuSE SUSE Linux Enterprise Server 8
+ Linux kernel 2.4.21
+ Linux kernel 2.4.19
Sun Solaris 9_x86
Sun Solaris 9
Sun Solaris 8_x86
Sun Solaris 8_sparc
Sun Solaris 10_x86
Sun Solaris 10
S.u.S.E. UnitedLinux 1.0
S.u.S.E. SuSE Linux Standard Server 8.0
S.u.S.E. SuSE Linux School Server for i386
S.u.S.E. SUSE LINUX Retail Solution 8.0
S.u.S.E. SuSE Linux Openexchange Server 4.0
S.u.S.E. SuSE Linux Open-Xchange 4.1
S.u.S.E. SUSE CORE 9 for x86
S.u.S.E. Open-Enterprise-Server 9.0
S.u.S.E. Open-Enterprise-Server 1
S.u.S.E. Office Server
S.u.S.E. Novell Linux Desktop 9.0
S.u.S.E. Novell Linux Desktop 1.0
S.u.S.E. Linux Professional 10.0 OSS
S.u.S.E. Linux Professional 10.0
S.u.S.E. Linux Professional 9.3 x86_64
S.u.S.E. Linux Professional 9.3
S.u.S.E. Linux Professional 9.2 x86_64
S.u.S.E. Linux Professional 9.2
S.u.S.E. Linux Professional 9.1 x86_64
S.u.S.E. Linux Professional 9.1
S.u.S.E. Linux Professional 9.0 x86_64
S.u.S.E. Linux Professional 9.0
S.u.S.E. Linux Professional 10.1
S.u.S.E. Linux Personal 10.0 OSS
S.u.S.E. Linux Personal 9.3 x86_64
S.u.S.E. Linux Personal 9.3
S.u.S.E. Linux Personal 9.2 x86_64
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1 x86_64
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Personal 10.1
S.u.S.E. Linux Openexchange Server
S.u.S.E. Linux Office Server
S.u.S.E. Linux Enterprise Server for S/390 9.0
S.u.S.E. Linux Enterprise Server for S/390
S.u.S.E. Linux Enterprise Server 9
S.u.S.E. Linux Desktop 1.0
S.u.S.E. Linux Database Server 0
S.u.S.E. Linux Connectivity Server
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux ES 4
RedHat Desktop 4.0
Red Hat Fedora Core5
Red Hat Enterprise Linux AS 4
Mandriva Linux Mandrake 2006.0 x86_64
Mandriva Linux Mandrake 2006.0
Mandriva Linux Mandrake 10.2 x86_64
Mandriva Linux Mandrake 10.2
LibTIFF LibTIFF 3.8.1
+ Debian Linux 3.1 sparc
+ Debian Linux 3.1 s/390
+ Debian Linux 3.1 ppc
+ Debian Linux 3.1 mipsel
+ Debian Linux 3.1 mips
+ Debian Linux 3.1 m68k
+ Debian Linux 3.1 ia-64
+ Debian Linux 3.1 ia-32
+ Debian Linux 3.1 hppa
+ Debian Linux 3.1 arm
+ Debian Linux 3.1 alpha
+ Debian Linux 3.1
LibTIFF LibTIFF 3.8
+ Debian Linux 3.1 sparc
+ Debian Linux 3.1 s/390
+ Debian Linux 3.1 ppc
+ Debian Linux 3.1 mipsel
+ Debian Linux 3.1 mips
+ Debian Linux 3.1 m68k
+ Debian Linux 3.1 ia-64
+ Debian Linux 3.1 ia-32
+ Debian Linux 3.1 hppa
+ Debian Linux 3.1 arm
+ Debian Linux 3.1 alpha
+ Debian Linux 3.1
LibTIFF LibTIFF 3.7.3
+ Debian Linux 3.1 sparc
+ Debian Linux 3.1 s/390
+ Debian Linux 3.1 ppc
+ Debian Linux 3.1 mipsel
+ Debian Linux 3.1 mips
+ Debian Linux 3.1 m68k
+ Debian Linux 3.1 ia-64
+ Debian Linux 3.1 ia-32
+ Debian Linux 3.1 hppa
+ Debian Linux 3.1 arm
+ Debian Linux 3.1 alpha
+ Debian Linux 3.1
LibTIFF LibTIFF 3.7.2
+ Debian Linux 3.1 sparc
+ Debian Linux 3.1 s/390
+ Debian Linux 3.1 ppc
+ Debian Linux 3.1 mipsel
+ Debian Linux 3.1 mips
+ Debian Linux 3.1 m68k
+ Debian Linux 3.1 ia-64
+ Debian Linux 3.1 ia-32
+ Debian Linux 3.1 hppa
+ Debian Linux 3.1 arm
+ Debian Linux 3.1 alpha
+ Debian Linux 3.1
LibTIFF LibTIFF 3.7.1
LibTIFF LibTIFF 3.7
+ Slackware Linux 10.0
+ Slackware Linux -current
LibTIFF LibTIFF 3.6.1
+ Gentoo Linux 1.4
+ Gentoo Linux
+ OpenPKG OpenPKG Current
+ Turbolinux Turbolinux Server 10.0
+ Ubuntu Ubuntu Linux 5.0 4 powerpc
+ Ubuntu Ubuntu Linux 5.0 4 i386
+ Ubuntu Ubuntu Linux 5.0 4 amd64
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
LibTIFF LibTIFF 3.6 .0
LibTIFF LibTIFF 3.5.7
LibTIFF LibTIFF 3.5.5
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
+ Turbolinux Turbolinux Server 7.0
+ Turbolinux Turbolinux Workstation 8.0
+ Turbolinux Turbolinux Workstation 7.0
LibTIFF LibTIFF 3.5.4
LibTIFF LibTIFF 3.5.3
LibTIFF LibTIFF 3.5.2
LibTIFF LibTIFF 3.5.1
LibTIFF LibTIFF 3.4
Gentoo media-libs/tiff 3.8.1-r2
Fcron Fcron 2.9.5
Debian Linux 3.1 sparc
Debian Linux 3.1 s/390
Debian Linux 3.1 ppc
Debian Linux 3.1 mipsel
Debian Linux 3.1 mips
Debian Linux 3.1 m68k
Debian Linux 3.1 ia-64
Debian Linux 3.1 ia-32
Debian Linux 3.1 hppa
Debian Linux 3.1 arm
Debian Linux 3.1 amd64
Debian Linux 3.1 alpha
Debian Linux 3.1
Debian Linux 3.0 sparc
Debian Linux 3.0 s/390
Debian Linux 3.0 ppc
Debian Linux 3.0 mipsel
Debian Linux 3.0 mips
Debian Linux 3.0 m68k
Debian Linux 3.0 ia-64
Debian Linux 3.0 ia-32
Debian Linux 3.0 hppa
Debian Linux 3.0 arm
Debian Linux 3.0 alpha
Debian Linux 3.0

- 漏洞讨论

The tiff2pdf utility is prone to a buffer-overflow vulnerability because the application fails to do proper boundary checks before copying user-supplied data into a finite-sized buffer.

Exploiting this issue allows remote attackers to execute arbitrary machine code in the context of the affected application. Failed exploit attempts will likely crash the application, denying service to legitimate users.

- 漏洞利用

Currently we are not aware of any working exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 解决方案

Please see the referenced advisories for information on obtaining and applying fixes.


Sun Solaris 10

Sun Solaris 10_x86

Fcron Fcron 2.9.5

LibTIFF LibTIFF 3.5.5

LibTIFF LibTIFF 3.6.1

LibTIFF LibTIFF 3.7.2

LibTIFF LibTIFF 3.7.3

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站