"A vulnerability in LibTIFF can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. The vulnerability is caused due to a boundary error within tiff2pdf when handling a TIFF file with a "DocumentName" tag that contains UTF-8 characters. This can be exploited to cause a stack-based buffer overflow and may allow arbitrary code execution." http://secunia.com/advisories/20488/ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2193 Patch from Ubuntu.
15 lines
564 B
Text
15 lines
564 B
Text
$NetBSD: patch-au,v 1.5 2006/06/08 11:05:14 salo Exp $
|
|
|
|
Security fix for CVE-2006-2193, from Ubuntu.
|
|
|
|
--- tools/tiff2pdf.c.orig 2006-03-21 17:42:51.000000000 +0100
|
|
+++ tools/tiff2pdf.c 2006-06-08 12:39:11.000000000 +0200
|
|
@@ -3668,7 +3668,7 @@
|
|
written += TIFFWriteFile(output, (tdata_t) "(", 1);
|
|
for (i=0;i<len;i++){
|
|
if((pdfstr[i]&0x80) || (pdfstr[i]==127) || (pdfstr[i]<32)){
|
|
- sprintf(buffer, "\\%.3o", pdfstr[i]);
|
|
+ sprintf(buffer, "\\%.3hho", pdfstr[i]);
|
|
written += TIFFWriteFile(output, (tdata_t) buffer, 4);
|
|
} else {
|
|
switch (pdfstr[i]){
|