54302 |
nessus-scan-192-168-10-10#20170210#1.csv |
36274 |
92682 |
CVE-2014-9655 |
7.5 |
High |
192.168.10.10 |
tcp |
0 |
CentOS 6 : libtiff (CESA-2016:1547) |
The remote CentOS host is missing one or more security updates. |
An update for libtiff is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security
impact of Important. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.
The libtiff packages contain a library of functions for manipulating
Tagged Image File Format (TIFF) files.
Security Fix(es) :
* Multiple flaws have been discovered in libtiff. A remote attacker
could exploit these flaws to cause a crash or memory corruption and,
possibly, execute arbitrary code by tricking an application linked
against libtiff into processing specially crafted files.
(CVE-2014-9655, CVE-2015-1547, CVE-2015-8784, CVE-2015-8683,
CVE-2015-8665, CVE-2015-8781, CVE-2015-8782, CVE-2015-8783,
CVE-2016-3990, CVE-2016-5320)
* Multiple flaws have been discovered in various libtiff tools
(bmp2tiff, pal2rgb, thumbnail, tiff2bw, tiff2pdf, tiffcrop,
tiffdither, tiffsplit, tiff2rgba). By tricking a user into processing
a specially crafted file, a remote attacker could exploit these flaws
to cause a crash or memory corruption and, possibly, execute arbitrary
code with the privileges of the user running the libtiff tool.
(CVE-2014-8127, CVE-2014-8129, CVE-2014-8130, CVE-2014-9330,
CVE-2015-7554, CVE-2015-8668, CVE-2016-3632, CVE-2016-3945,
CVE-2016-3991) |
Update the affected libtiff packages. |
http://www.nessus.org/u?7cff86ef |
Remote package installed : libtiff-3.9.4-10.el6_5 Should be : libtiff-3.9.4-18.el6_8 |
|