Overview
The SuSe Linux version of LibTIFF is vulnerable to a buffer overflow that may allow a remote attacker to execute arbitrary code.
Description
| SuSe LibTIFF is a library used to encode and decode images in Tag Image File Format (TIFF) format on SuSE systems. A lack of input validation in the OJPEG (old JPEG) handling routine, OJPEGVSetField (in libtiff/tif_ojpeg.c), may cause a heap-based buffer overflow. Consequently, a remote attacker may be able to exploit this vulnerability by supplying an application using LibTIFF with a specially crafted TIFF image. Please note that OJPEG support is enabled by default in versions of the SuSE LibTIFF library without the latest security updates (announced at SUSE-SA:2004:038) installed. | 
Impact
| If a remote attacker can persuade a user to access a specially crafted TIFF image, that attacker may be able to execute arbitrary code with the privileges of the application linked to LibTIFF. | 
Solution
| Update SuSE 
 | 
| Disable OJPEG support 
 | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
Acknowledgements
This vulnerability was reported by iDefense.iDefense credits Andrei Nigmatulin for discovering this vulnerability.
This document was written by Jeff Gennari.
Other Information
| CVE IDs: | CVE-2004-0929 | 
| Severity Metric: | 3.24 | 
| Date Public: | 2004-10-22 | 
| Date First Published: | 2004-12-01 | 
| Date Last Updated: | 2004-12-01 15:40 UTC | 
| Document Revision: | 173 |