Tuesday, 3 May 2016

On 06:41 by admin   No comments
Linux vendors have been hit by two fresh security bugs, affecting a widely used graphics decoder and the Gaim instant-messaging client.

Separately, Red Hat, the biggest Linux developer, said attackers have begun targeting Red Hat users with an email-based scam similar to methods commonly used to target Windows.

The flaws in Gaim and libtiff, used by many Linux graphics programs to decode tiff images, follow a series of serious bugs patched last week. The earlier flaws affected Linux’s libpng, Xpdf and Cups components.

Researcher Chris Evans uncovered a series of boundary errors affecting the RLE-decoding components of libtiff, which could be exploited to cause heap-based buffer overflows. A malicious user could exploit these flaws by tricking a user into viewing a maliciously crafted tiff image with an application that uses libtiff, researchers said; such an image could crash the application and execute malicious code on the user’s computer.

Evans said the specific flaws he publicized are likely to be only the tip of the iceberg. “Unfortunately, due to the size of libtiff, only a limited scan for flaws was possible. These flaws are likely to typify others present,” he said in an advisory.

A second flaw in libtiff, a division-by-zero bug discovered by Matthias Claasen, could crash libtiff-linked applications. Finally, auditing by Dmitry Levin uncovered integer overflows which could also be used to execute arbitrary code on a user’s PC, according to an advisory from Danish security firm Secunia.

Novell’s Suse Linux and Red Hat issued advisories on the libtiff flaw late last week, along with patches for the component.


Post a comment