---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Debian update for tiff SECUNIA ADVISORY ID: SA31623 VERIFY ADVISORY: http://secunia.com/advisories/31623/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 4.0 http://secunia.com/product/13844/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for tiff. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a user's system. For more information: SA31610 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/t/tiff/tiff_3.8.2.orig.tar.gz Size/MD5 checksum: 1333780 e6ec4ab957ef49d5aabc38b7a376910b http://security.debian.org/pool/updates/main/t/tiff/tiff_3.8.2-7+etch1.dsc Size/MD5 checksum: 770 ae7a380959585d8a5034db1d488fe92d http://security.debian.org/pool/updates/main/t/tiff/tiff_3.8.2-7+etch1.diff.gz Size/MD5 checksum: 17476 7a2b7064067f462fe3c3e0212b7e59bf alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch1_alpha.deb Size/MD5 checksum: 521350 e9a8d515beea436f1c5714d5d55621c4 http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch1_alpha.deb Size/MD5 checksum: 296784 d25a95a2ee04ddf56245ec2f05f17cfb http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch1_alpha.deb Size/MD5 checksum: 5148 7d6f398e75ef40e29b8c8ca5d8cc634e http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch1_alpha.deb Size/MD5 checksum: 11284 7aae8c6f10cf564b87f6ae0bf586b533 http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch1_alpha.deb Size/MD5 checksum: 206802 3b78d5d7c37c68c287c1f47758df1a37 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch1_amd64.deb Size/MD5 checksum: 503074 3546846c37da9d10d92a0bee3b9e47e5 http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch1_amd64.deb Size/MD5 checksum: 10290 6362cc149e9d0303bf01d249f082e1c4 http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch1_amd64.deb Size/MD5 checksum: 184662 4011f0f2cca3a6ae0753a24fe2528c00 http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch1_amd64.deb Size/MD5 checksum: 248376 c7b256d38da9d497a677fac2f50359f5 http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch1_amd64.deb Size/MD5 checksum: 4926 4c30200928ab374c285135243960e347 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch1_hppa.deb Size/MD5 checksum: 5996 1ea4fc581e861fc4310b506ba38f7fd1 http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch1_hppa.deb Size/MD5 checksum: 10876 7952d1695b12c4f94a441e0bbc7e0841 http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch1_hppa.deb Size/MD5 checksum: 515280 790d82258fb2aeac736f16dc969fb83e http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch1_hppa.deb Size/MD5 checksum: 195268 7586a29e6dac1a5fb792569ecdaf1ad2 http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch1_hppa.deb Size/MD5 checksum: 267664 5482149084635adb52a67f65c9ec73c7 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch1_i386.deb Size/MD5 checksum: 5004 8843b208a604bdf206959659b80f12f9 http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch1_i386.deb Size/MD5 checksum: 483094 446c73c10b990c8fe254d344b74d720e http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch1_i386.deb Size/MD5 checksum: 9852 8345bd93b3e97de766952efb7402d11d http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch1_i386.deb Size/MD5 checksum: 175592 bd7a1cc32a60a78b600326c141168bd1 http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch1_i386.deb Size/MD5 checksum: 233456 7974f2bbc21c436cd1cbd8a18c091c7e ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch1_ia64.deb Size/MD5 checksum: 552216 fa4a4dc20e9aae562cf45d162252bcec http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch1_ia64.deb Size/MD5 checksum: 250698 7a15422b465b3e5a18e4a067095f06d0 http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch1_ia64.deb Size/MD5 checksum: 13168 d7f8222f2b5045171fb06b9d672527b6 http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch1_ia64.deb Size/MD5 checksum: 6716 ed072e26f3798dd178c33d6b6ad4983b http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch1_ia64.deb Size/MD5 checksum: 326164 27b4d01afafe60fded61f4c379d4efa9 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch1_mips.deb Size/MD5 checksum: 187416 18ba62f6a4edc236cffdff42b9b0cc63 http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch1_mips.deb Size/MD5 checksum: 10658 5dab9237ca90f9799665626566380630 http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch1_mips.deb Size/MD5 checksum: 500242 a178091c78f3961d62b6ff5ef00de2cd http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch1_mips.deb Size/MD5 checksum: 265370 e941ddaa662094b74d2f69b9c782b702 http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch1_mips.deb Size/MD5 checksum: 5150 c94c2621a78b8cc5879a7f1bf2e6eb5c mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch1_mipsel.deb Size/MD5 checksum: 5136 7819c5b07599b8181eb8fff0691eb0d5 http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch1_mipsel.deb Size/MD5 checksum: 188706 1715b19d851ced32bb631e4eb757f7c0 http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch1_mipsel.deb Size/MD5 checksum: 10642 a811021ca1277f6b11561e98b11b205f http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch1_mipsel.deb Size/MD5 checksum: 485238 e63ac232935f95b5cb7855f82d5af997 http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch1_mipsel.deb Size/MD5 checksum: 264550 3d180d616ec03bbfa1ca2f39dd56015f powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch1_powerpc.deb Size/MD5 checksum: 254574 2bd571a468e7c681210903adee826373 http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch1_powerpc.deb Size/MD5 checksum: 491216 d8ce2c65e8f70e074d0b1e8cac400d9c http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch1_powerpc.deb Size/MD5 checksum: 11814 52071581845d3cd43b36ee5bf94dabe2 http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch1_powerpc.deb Size/MD5 checksum: 6698 3ce576847f1aeee554fda52f52bb9594 http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch1_powerpc.deb Size/MD5 checksum: 203230 5922ac34b5f5d07c94908cbfb6a57113 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch1_s390.deb Size/MD5 checksum: 10722 4c80a47c46ce6f699f0e9ee0ce72045e http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch1_s390.deb Size/MD5 checksum: 497566 a892a93efd34ba59116e99f282c0f4a3 http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch1_s390.deb Size/MD5 checksum: 5228 00cec143b258139345450da7c02afb7b http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch1_s390.deb Size/MD5 checksum: 248718 3296c0c882a523bf167c2f66002bea29 http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch1_s390.deb Size/MD5 checksum: 182484 4786b0495cd7a749d89f1232dad42247 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/t/tiff/libtiff4-dev_3.8.2-7+etch1_sparc.deb Size/MD5 checksum: 236460 49927df44f21d7c705a103c7179627e8 http://security.debian.org/pool/updates/main/t/tiff/libtiff4_3.8.2-7+etch1_sparc.deb Size/MD5 checksum: 480938 3b2e36a5cbed1413decdd67e69e18b54 http://security.debian.org/pool/updates/main/t/tiff/libtiffxx0c2_3.8.2-7+etch1_sparc.deb Size/MD5 checksum: 4698 3cf416179f49186c54585f469356b625 http://security.debian.org/pool/updates/main/t/tiff/libtiff-tools_3.8.2-7+etch1_sparc.deb Size/MD5 checksum: 172524 3ec7e582b1bdcdd53dafa46af50b9ce6 http://security.debian.org/pool/updates/main/t/tiff/libtiff-opengl_3.8.2-7+etch1_sparc.deb Size/MD5 checksum: 10236 a76e27d0c4a80ce0e7d585491ceec44e -- Debian GNU/Linux unstable alias sid -- Reportedly, the problem will be fixed soon. ORIGINAL ADVISORY: http://lists.debian.org/debian-security-announce/2008/msg00218.html OTHER REFERENCES: SA31610: http://secunia.com/advisories/31610/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------