漏洞信息详情
Silicon Graphics LibTIFF 输入验证错误漏洞
漏洞简介
Silicon Graphics LibTIFF是美国Silicon Graphics公司的一个读写TIFF(标签图像文件格式)文件的库。该库包含一些处理TIFF文件的命令行工具。
LibTIFF 存在输入验证错误漏洞,攻击者可利用该漏洞通过LibTIFF的gtTileContig()触发缓冲区溢出,从而触发拒绝服务,并可能运行代码。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://bugzilla.redhat.com/show_bug.cgi?id=1932040
参考网址
来源:MISC
链接:https://gitlab.com/libtiff/libtiff/-/merge_requests/160
来源:MISC
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1932040
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2021/06/msg00023.html
来源:DEBIAN
链接:https://www.debian.org/security/2021/dsa-4869
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20210521-0009/
来源:MISC
链接:https://gitlab.com/libtiff/libtiff/-/commit/c8d613ef497058fe653c467fc84c70a62a4a71b2
来源:GENTOO
链接:https://security.gentoo.org/glsa/202104-06
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-35523
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/164880/Red-Hat-Security-Advisory-2021-4241-03.html
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/LibTIFF-buffer-overflow-via-gtTileContig-34694
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/162415/Gentoo-Linux-Security-Advisory-202104-06.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0893
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021050104
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.2247
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3905
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/161578/Ubuntu-Security-Notice-USN-4755-1.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0715
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3814
受影响实体
暂无
补丁
- LibTIFF 安全漏洞的修复措施<!--2021-2-25-->
还没有评论,来说两句吧...