ID

VAR-201103-0291


CVE

CVE-2011-0192


TITLE

plural Apple Product LIBTIFF Vulnerable to buffer overflow

Trust: 0.8

sources: JVNDB: JVNDB-2011-001352

DESCRIPTION

Buffer overflow in Fax4Decode in LibTIFF 3.9.4 and possibly other versions, as used in ImageIO in Apple iTunes before 10.2 on Windows and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF Internet Fax image file that has been compressed using CCITT Group 4 encoding, related to the EXPAND2D macro in libtiff/tif_fax3.h. NOTE: some of these details are obtained from third party information. plural Apple Product LIBTIFF Is libtiff/tif_fax3.h. Silicon Graphics LibTIFF is a library for reading and writing TIFF (Tagged Image File Format) files from Silicon Graphics in the United States. This library contains some command line tools for working with TIFF files. A buffer overflow vulnerability exists in Fax4Decode in LibTIFF 3.9.4 and other versions used in ImageIO in versions prior to 10.2 of Apple iTunes on Windows. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2210-2 security@debian.org http://www.debian.org/security/ Luciano Bello June 25, 2011 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : tiff Vulnerability : several Problem type : local (remote) Debian-specific: no CVE ID : CVE-2011-0191 CVE-2011-0192 CVE-2011-1167 Debian Bug : 619614 630042 The recent tiff update DSA-2210-1 introduced a regression that could lead to encoding problems of tiff files. This issue affects the Debian 5.0 Lenny package only. For the oldstable distribution (lenny), this problem has been fixed in version 3.8.2-11.5. For the stable distribution (squeeze), this problem has been fixed in version 3.9.4-5+squeeze3. For the testing distribution (wheezy), this problem has been fixed in version 3.9.5-1. For the unstable distribution (sid), this problem has been fixed in version 3.9.5-1. We recommend that you upgrade your tiff packages. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . =========================================================== Ubuntu Security Notice USN-1085-2 March 15, 2011 tiff regression https://launchpad.net/bugs/731540 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS Ubuntu 8.04 LTS Ubuntu 9.10 Ubuntu 10.04 LTS Ubuntu 10.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: libtiff4 3.7.4-1ubuntu3.10 Ubuntu 8.04 LTS: libtiff4 3.8.2-7ubuntu3.8 Ubuntu 9.10: libtiff4 3.8.2-13ubuntu0.5 Ubuntu 10.04 LTS: libtiff4 3.9.2-2ubuntu0.5 Ubuntu 10.10: libtiff4 3.9.4-2ubuntu0.2 After a standard system update you need to restart your session to make all the necessary changes. Details follow: USN-1085-1 fixed vulnerabilities in the system TIFF library. The upstream fixes were incomplete and created problems for certain CCITTFAX4 files. We apologize for the inconvenience. Original advisory details: Sauli Pahlman discovered that the TIFF library incorrectly handled invalid td_stripbytecount fields. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could crash the application, leading to a denial of service. This issue only affected Ubuntu 10.04 LTS and 10.10. (CVE-2010-2482) Sauli Pahlman discovered that the TIFF library incorrectly handled TIFF files with an invalid combination of SamplesPerPixel and Photometric values. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could crash the application, leading to a denial of service. This issue only affected Ubuntu 10.10. (CVE-2010-2482) Nicolae Ghimbovschi discovered that the TIFF library incorrectly handled invalid ReferenceBlackWhite values. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could crash the application, leading to a denial of service. (CVE-2010-2595) Sauli Pahlman discovered that the TIFF library incorrectly handled certain default fields. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could crash the application, leading to a denial of service. (CVE-2010-2597, CVE-2010-2598) It was discovered that the TIFF library incorrectly validated certain data types. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could crash the application, leading to a denial of service. (CVE-2010-2630) It was discovered that the TIFF library incorrectly handled downsampled JPEG data. This issue only affected Ubuntu 10.04 LTS and 10.10. (CVE-2010-3087) It was discovered that the TIFF library incorrectly handled certain JPEG data. This issue only affected Ubuntu 6.06 LTS, 8.04 LTS and 9.10. (CVE-2011-0191) It was discovered that the TIFF library incorrectly handled certain TIFF FAX images. (CVE-2011-0191) Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.7.4-1ubuntu3.10.diff.gz Size/MD5: 24707 92ee677a20237cfdb17b5dcbe024fc81 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.7.4-1ubuntu3.10.dsc Size/MD5: 1445 19186c480eda8ade1d4fd194a7e08bf6 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.7.4.orig.tar.gz Size/MD5: 1280113 02cf5c3820bda83b35bb35b45ae27005 amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.7.4-1ubuntu3.10_amd64.deb Size/MD5: 220784 7b8f336c5190b816fb92f498b30755c9 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.7.4-1ubuntu3.10_amd64.deb Size/MD5: 283278 2633a7f81897814f7bddb303f6952b34 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.7.4-1ubuntu3.10_amd64.deb Size/MD5: 488554 bd11ebd5ae319660ec0eff4f22b55268 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.7.4-1ubuntu3.10_amd64.deb Size/MD5: 45210 2d75169ed1d84f4907d505780123691d http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.7.4-1ubuntu3.10_amd64.deb Size/MD5: 50372 d606202ec431cee4d43658887b7c53f7 i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.7.4-1ubuntu3.10_i386.deb Size/MD5: 206424 d346905ce628f3b5afdfe1a4b5e46ee8 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.7.4-1ubuntu3.10_i386.deb Size/MD5: 260146 f8a0af4bb2a87fab5833e8bea85b4179 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.7.4-1ubuntu3.10_i386.deb Size/MD5: 462812 81f1884d1f83fbc7cf670233e79e464b http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.7.4-1ubuntu3.10_i386.deb Size/MD5: 45144 047a98941044eb476ff601a50a94cb97 http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.7.4-1ubuntu3.10_i386.deb Size/MD5: 49650 0298317461310597a873c28bbe6c9c2d powerpc architecture (Apple Macintosh G3/G4/G5): http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.7.4-1ubuntu3.10_powerpc.deb Size/MD5: 240378 8f832fa2e7ca2122ea17b8440db407a3 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.7.4-1ubuntu3.10_powerpc.deb Size/MD5: 289250 7118c8a2b9ee67fb759d89631b80ec33 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.7.4-1ubuntu3.10_powerpc.deb Size/MD5: 477164 46d81e5cca275c4f9fa490bccf5e1b54 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.7.4-1ubuntu3.10_powerpc.deb Size/MD5: 47366 8f493b29a1c6af1ede1ae20bb340542e http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.7.4-1ubuntu3.10_powerpc.deb Size/MD5: 52018 9cbc82320c0fb9160a55d9e966935308 sparc architecture (Sun SPARC/UltraSPARC): http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.7.4-1ubuntu3.10_sparc.deb Size/MD5: 209294 1c075ff5d8fe054cfbe59767156f2b12 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.7.4-1ubuntu3.10_sparc.deb Size/MD5: 271226 083721bbf42b3a9c2ba0619725cdea1c http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.7.4-1ubuntu3.10_sparc.deb Size/MD5: 467842 244140481e39cbae1caeea1cbc7242fb http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.7.4-1ubuntu3.10_sparc.deb Size/MD5: 45072 0ecf1aa2519fd0f70a54e97299a9a2aa http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.7.4-1ubuntu3.10_sparc.deb Size/MD5: 50206 1fd3434ab16f251802c05e69b2ec4172 Updated packages for Ubuntu 8.04 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.8.2-7ubuntu3.8.diff.gz Size/MD5: 23098 1ee89aac13034400cc5f65bc82350576 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.8.2-7ubuntu3.8.dsc Size/MD5: 1534 db81aff18857a6a792e8e3d9f6419c25 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.8.2.orig.tar.gz Size/MD5: 1333780 e6ec4ab957ef49d5aabc38b7a376910b amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.8.2-7ubuntu3.8_amd64.deb Size/MD5: 186052 117b7fef507321d3b40f31e82121d65c http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.8.2-7ubuntu3.8_amd64.deb Size/MD5: 583498 356ff0e0f3fa15764371a8d0ffbd2574 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.8.2-7ubuntu3.8_amd64.deb Size/MD5: 132044 f21e514b5f9ffa5e083d48e3ff2876be http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.8.2-7ubuntu3.8_amd64.deb Size/MD5: 5060 bd0be2af72fb9789ef27a5cf3445a960 http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.8.2-7ubuntu3.8_amd64.deb Size/MD5: 10482 a49a0b07d12a18248a56d1c64322687b i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.8.2-7ubuntu3.8_i386.deb Size/MD5: 175314 d510325b149f2106114857e9cd1887a1 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.8.2-7ubuntu3.8_i386.deb Size/MD5: 552824 044e167a1106988f710d4b26cd480c13 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.8.2-7ubuntu3.8_i386.deb Size/MD5: 123468 8c41a5b4deb4daf59a27aa18bafc2a33 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.8.2-7ubuntu3.8_i386.deb Size/MD5: 5044 221fabdeb10a45b0e39b30fcd9876d57 http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.8.2-7ubuntu3.8_i386.deb Size/MD5: 9934 139ed154385849ed4a76c21f14d1824c lpia architecture (Low Power Intel Architecture): http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.8.2-7ubuntu3.8_lpia.deb Size/MD5: 177010 f861eceecd6f08085a7e66038b28d148 http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.8.2-7ubuntu3.8_lpia.deb Size/MD5: 555294 27b3f40726cd5cf866dd80b5fb5f652d http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.8.2-7ubuntu3.8_lpia.deb Size/MD5: 124582 a101756bd948bc2d526bbb3793655c46 http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.8.2-7ubuntu3.8_lpia.deb Size/MD5: 4916 0fde80306a67eb766b878040048003fa http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.8.2-7ubuntu3.8_lpia.deb Size/MD5: 9976 36fdc7a9337f4a5391a5d951624775df powerpc architecture (Apple Macintosh G3/G4/G5): http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.8.2-7ubuntu3.8_powerpc.deb Size/MD5: 223488 04f35d447aa797b255c249719f467896 http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.8.2-7ubuntu3.8_powerpc.deb Size/MD5: 577476 53e4f31126ecae60b54a2614c29a02ef http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.8.2-7ubuntu3.8_powerpc.deb Size/MD5: 135174 24d5e5f4e4903eae9ba2b4163eb0ab44 http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.8.2-7ubuntu3.8_powerpc.deb Size/MD5: 7512 a361eb4c3985a90189342aced3932676 http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.8.2-7ubuntu3.8_powerpc.deb Size/MD5: 13288 2f458ba98bbf136958d2a8cdc87a83ab sparc architecture (Sun SPARC/UltraSPARC): http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.8.2-7ubuntu3.8_sparc.deb Size/MD5: 178860 d48dc98bba2aaaf1830ad3a9d69b99db http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.8.2-7ubuntu3.8_sparc.deb Size/MD5: 558838 c9ffd065811bf117f5c57dae82c4173b http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.8.2-7ubuntu3.8_sparc.deb Size/MD5: 123254 e11f44522f5cef8b3f4a8a633be5437d http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.8.2-7ubuntu3.8_sparc.deb Size/MD5: 4796 498f87c694b19560fe59ee3afb605af4 http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.8.2-7ubuntu3.8_sparc.deb Size/MD5: 10700 5bb66a32a926f8fbd1a5b864a3d88cd7 Updated packages for Ubuntu 9.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.8.2-13ubuntu0.5.diff.gz Size/MD5: 43070 e8b35ecf046a7c3619e1d9929de8b830 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.8.2-13ubuntu0.5.dsc Size/MD5: 1978 d8a8180b56ba05c422d4b443afb1d44e http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.8.2.orig.tar.gz Size/MD5: 1333780 e6ec4ab957ef49d5aabc38b7a376910b Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-doc_3.8.2-13ubuntu0.5_all.deb Size/MD5: 348112 a84bc452f3a0eea39c87ac3ac744112c amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.8.2-13ubuntu0.5_amd64.deb Size/MD5: 191416 300ef146f5155ff8ccdf51e8a684ff34 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.8.2-13ubuntu0.5_amd64.deb Size/MD5: 252426 b78ec6fcac494ac67fb4b357632dace3 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.8.2-13ubuntu0.5_amd64.deb Size/MD5: 135940 d3f0cb6e3491b6d335e905ddb2139dfc http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.8.2-13ubuntu0.5_amd64.deb Size/MD5: 6332 b7da9edb5b42f9c08596a6b1966cb6e0 http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.8.2-13ubuntu0.5_amd64.deb Size/MD5: 12004 3107c05e0644d55184c568fbd205c8d4 i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.8.2-13ubuntu0.5_i386.deb Size/MD5: 176368 b2b0a5ed89fa9405dea1a1944bf4e606 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.8.2-13ubuntu0.5_i386.deb Size/MD5: 232588 71573f111b56ed24c2bb95e70cf24950 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.8.2-13ubuntu0.5_i386.deb Size/MD5: 125002 9127f1c5991d7bebf346d7996aa05549 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.8.2-13ubuntu0.5_i386.deb Size/MD5: 6446 8535ecbdf277f311afe69e053e7027eb http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.8.2-13ubuntu0.5_i386.deb Size/MD5: 11292 21192b1ec3a90204f70ac7e715f6ef94 armel architecture (ARM Architecture): http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.8.2-13ubuntu0.5_armel.deb Size/MD5: 182752 27e8c1ba005bb913056725f27afed10b http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.8.2-13ubuntu0.5_armel.deb Size/MD5: 233860 7bb2dfcf30084a32cfda47150de12820 http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.8.2-13ubuntu0.5_armel.deb Size/MD5: 124716 5bf3991de9df681e72aeb2b9cb0157e3 http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.8.2-13ubuntu0.5_armel.deb Size/MD5: 5966 f7269719e2c4b9f44abb54ea640452b9 http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.8.2-13ubuntu0.5_armel.deb Size/MD5: 11160 213b7115f391a62a039e86bd2aed21e3 lpia architecture (Low Power Intel Architecture): http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.8.2-13ubuntu0.5_lpia.deb Size/MD5: 177048 6f228aae0027ce228001ab1e03c1420f http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.8.2-13ubuntu0.5_lpia.deb Size/MD5: 234412 2be52c2f11d51dc60ebd6358921ed539 http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.8.2-13ubuntu0.5_lpia.deb Size/MD5: 126608 5b98943322e5546def050c29f0137c51 http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.8.2-13ubuntu0.5_lpia.deb Size/MD5: 6312 9dfcffd32f1aa8e42e6e5f94c8171333 http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.8.2-13ubuntu0.5_lpia.deb Size/MD5: 11340 69f92d56438e597d2733cca9fe192e09 powerpc architecture (Apple Macintosh G3/G4/G5): http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.8.2-13ubuntu0.5_powerpc.deb Size/MD5: 191484 3af0b1c5f8e037c97831d2321c144069 http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.8.2-13ubuntu0.5_powerpc.deb Size/MD5: 256554 94513c2b20ec5e2206d5b5476ac4b6e1 http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.8.2-13ubuntu0.5_powerpc.deb Size/MD5: 137434 0dd8d58ca4136b26395ec9619352cbf4 http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.8.2-13ubuntu0.5_powerpc.deb Size/MD5: 6724 752b5398be235d406db9b0070c8b4bcc http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.8.2-13ubuntu0.5_powerpc.deb Size/MD5: 12080 857d09fbe80934ec33149da04cf5b4fe sparc architecture (Sun SPARC/UltraSPARC): http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.8.2-13ubuntu0.5_sparc.deb Size/MD5: 184288 a83a8a638af348c50d3bb64a2c0490e4 http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.8.2-13ubuntu0.5_sparc.deb Size/MD5: 237164 9a5c6358c6c65dfc8e5154f79c5937a1 http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.8.2-13ubuntu0.5_sparc.deb Size/MD5: 125062 2e70ed4b0b98f15d9b6d4d1aa2c223fe http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.8.2-13ubuntu0.5_sparc.deb Size/MD5: 6096 e374e39bdeb2b16f8944713dc6b59ec2 http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.8.2-13ubuntu0.5_sparc.deb Size/MD5: 12036 3bd0ece44e01a49c32decff3d318bcc3 Updated packages for Ubuntu 10.04 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.9.2-2ubuntu0.5.diff.gz Size/MD5: 20142 b939eddaecc09a223f750ddc9ec300a7 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.9.2-2ubuntu0.5.dsc Size/MD5: 1974 0ab3539d8af96ca2ca23c1d74d79e8c6 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.9.2.orig.tar.gz Size/MD5: 1419742 93e56e421679c591de7552db13384cb8 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-doc_3.9.2-2ubuntu0.5_all.deb Size/MD5: 359126 ddf2cb68732e7fd96ea2078ce0ad4742 amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.9.2-2ubuntu0.5_amd64.deb Size/MD5: 250490 975aec44c621ff1e524a7d0c344c461d http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.9.2-2ubuntu0.5_amd64.deb Size/MD5: 269922 24ffd793f4f4cab1c419281358f95b06 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.9.2-2ubuntu0.5_amd64.deb Size/MD5: 149244 8de4b36f57fd254339472d92d58df436 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.9.2-2ubuntu0.5_amd64.deb Size/MD5: 6384 dd647e2d96b24485c9a3d512568a33e8 http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.9.2-2ubuntu0.5_amd64.deb Size/MD5: 12028 f312a06be417327ccaab3bc83fce43ee i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.9.2-2ubuntu0.5_i386.deb Size/MD5: 234120 b80a26f6acbf41fc2835dea7be97d332 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.9.2-2ubuntu0.5_i386.deb Size/MD5: 246962 2aced2d3476f07034714c32581451fca http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.9.2-2ubuntu0.5_i386.deb Size/MD5: 136750 9e662029ab9932f9bb5cf551c9a25c70 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.9.2-2ubuntu0.5_i386.deb Size/MD5: 6486 588d1bff01cbec45eefbfb25864b48c7 http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.9.2-2ubuntu0.5_i386.deb Size/MD5: 11282 028b976bcc83292a2a436961a26cff1b armel architecture (ARM Architecture): http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.9.2-2ubuntu0.5_armel.deb Size/MD5: 237816 b1bb7396d24ca82d5a72012e7f5902df http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.9.2-2ubuntu0.5_armel.deb Size/MD5: 238800 82ec468a735c037f758424ee05ab0eda http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.9.2-2ubuntu0.5_armel.deb Size/MD5: 129636 b6277537fd8ca0a7258d156b8185fc6c http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.9.2-2ubuntu0.5_armel.deb Size/MD5: 5980 5ee322e0d78f7f440501872a91e78c98 http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.9.2-2ubuntu0.5_armel.deb Size/MD5: 11300 c0120b282e1fa3c9922b9218a1d86271 powerpc architecture (Apple Macintosh G3/G4/G5): http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.9.2-2ubuntu0.5_powerpc.deb Size/MD5: 253514 208b8a67298bb8435b790579c2369258 http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.9.2-2ubuntu0.5_powerpc.deb Size/MD5: 275256 4ccb314e621e464c06a709fbd7632384 http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.9.2-2ubuntu0.5_powerpc.deb Size/MD5: 150724 4787f755ef29dd7198699c9456ca5fd0 http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.9.2-2ubuntu0.5_powerpc.deb Size/MD5: 6770 759c330d4a755d3d217ca8afef8cb191 http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.9.2-2ubuntu0.5_powerpc.deb Size/MD5: 12092 86dd9f88b6d3f4e3f7ee0c3f98ce4448 sparc architecture (Sun SPARC/UltraSPARC): http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.9.2-2ubuntu0.5_sparc.deb Size/MD5: 248776 0e081f6795686de636fdb537d0da0af3 http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.9.2-2ubuntu0.5_sparc.deb Size/MD5: 257346 b1cb2500a7b1ada561852e12546279a4 http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.9.2-2ubuntu0.5_sparc.deb Size/MD5: 143484 b24ccd56b9eee79c062d8a1e13e65326 http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.9.2-2ubuntu0.5_sparc.deb Size/MD5: 6226 28e807e1ae69640a7e0a35ea79b8913a http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.9.2-2ubuntu0.5_sparc.deb Size/MD5: 11922 1acad867116630bb02cf53831f49fb91 Updated packages for Ubuntu 10.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.9.4-2ubuntu0.2.debian.tar.gz Size/MD5: 18124 6b91f60b7bc92c8f0710f4088c1f38f3 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.9.4-2ubuntu0.2.dsc Size/MD5: 1991 020c2a94b61792b09f6d01752f2c7f5d http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.9.4.orig.tar.gz Size/MD5: 1436968 2006c1bdd12644dbf02956955175afd6 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-doc_3.9.4-2ubuntu0.2_all.deb Size/MD5: 342928 4d7df4c971ba92ab11d738820853fcc4 amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.9.4-2ubuntu0.2_amd64.deb Size/MD5: 248246 dd83a166330ad6268952b8e49f075012 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.9.4-2ubuntu0.2_amd64.deb Size/MD5: 270788 73525f6754327725fd2e93fe1fc0e4fb http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.9.4-2ubuntu0.2_amd64.deb Size/MD5: 149490 2da1a59a5a933e822256d2b6d89454c6 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.9.4-2ubuntu0.2_amd64.deb Size/MD5: 6310 b566e3ac1e893179519b2596798ad492 http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.9.4-2ubuntu0.2_amd64.deb Size/MD5: 11806 a523fb6ef9ac518e5869fdc9bd72d937 i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.9.4-2ubuntu0.2_i386.deb Size/MD5: 230148 a676650de4cfea04a7bfd000de0da151 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.9.4-2ubuntu0.2_i386.deb Size/MD5: 247138 95194c2ea2ab0ca87e6b8867dae07385 http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.9.4-2ubuntu0.2_i386.deb Size/MD5: 136668 f0931de0028f3538f92ef2547cde7bba http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.9.4-2ubuntu0.2_i386.deb Size/MD5: 6424 ad458d476aa6df65bfaec35f5cba9c0b http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.9.4-2ubuntu0.2_i386.deb Size/MD5: 11144 efd76c12cc9f9df3ba719e8f073a6bfa armel architecture (ARM Architecture): http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.9.4-2ubuntu0.2_armel.deb Size/MD5: 256880 6aedba603449a04715b504caac95ed22 http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.9.4-2ubuntu0.2_armel.deb Size/MD5: 271424 0587dc26b90416181bb71f0ee0acbed3 http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.9.4-2ubuntu0.2_armel.deb Size/MD5: 151800 0a97a3959787ce6e4d4a60db21f4bd19 http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.9.4-2ubuntu0.2_armel.deb Size/MD5: 5844 6efde8a677921feabc6dd5156181d72a http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.9.4-2ubuntu0.2_armel.deb Size/MD5: 11228 9e354f5270bc717488682dfc4712e74a powerpc architecture (Apple Macintosh G3/G4/G5): http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.9.4-2ubuntu0.2_powerpc.deb Size/MD5: 250366 6fa58ac5fb03e3b6866499f53cb3e79d http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.9.4-2ubuntu0.2_powerpc.deb Size/MD5: 275860 d4f92d8330e793d8056e4bc5c180fba9 http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.9.4-2ubuntu0.2_powerpc.deb Size/MD5: 150712 c47116bbde1de23b39bd86ce6733e033 http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.9.4-2ubuntu0.2_powerpc.deb Size/MD5: 6702 d9524527cbcbd6b38cb782d73adbdc3b http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.9.4-2ubuntu0.2_powerpc.deb Size/MD5: 11962 a31983d4e49adaa4fa0321c16105bae3 . Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149&products_id=490 The updated packages have been patched to correct these issues. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0192 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2347 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2065 http://support.apple.com/kb/HT4554 _______________________________________________________________________ Updated Packages: Mandriva Linux 2009.0: 6161b79e9a210ef10136cf522fcae735 2009.0/i586/libtiff3-3.8.2-12.4mdv2009.0.i586.rpm a4c724e9889a465d7c3f80618c137a6e 2009.0/i586/libtiff3-devel-3.8.2-12.4mdv2009.0.i586.rpm 59bd1f954344f75c89562942b8e67f26 2009.0/i586/libtiff3-static-devel-3.8.2-12.4mdv2009.0.i586.rpm f0e36e04e25d5f7194d51c8ec5aceace 2009.0/i586/libtiff-progs-3.8.2-12.4mdv2009.0.i586.rpm 4dba15dd4b9930f9eb8819feea83fdc2 2009.0/SRPMS/libtiff-3.8.2-12.4mdv2009.0.src.rpm Mandriva Linux 2009.0/X86_64: 43bd1b087e1bd33785e0391508958cc0 2009.0/x86_64/lib64tiff3-3.8.2-12.4mdv2009.0.x86_64.rpm a4c118fd83be8cc4e68bcfef5364c768 2009.0/x86_64/lib64tiff3-devel-3.8.2-12.4mdv2009.0.x86_64.rpm 134ae47488e549ef44b37467039d8c48 2009.0/x86_64/lib64tiff3-static-devel-3.8.2-12.4mdv2009.0.x86_64.rpm 96a726fe5e7bdd10c4add7b5b6a9765f 2009.0/x86_64/libtiff-progs-3.8.2-12.4mdv2009.0.x86_64.rpm 4dba15dd4b9930f9eb8819feea83fdc2 2009.0/SRPMS/libtiff-3.8.2-12.4mdv2009.0.src.rpm Mandriva Linux 2010.0: d473eec0df8bf76047b4cc9fd039517f 2010.0/i586/libtiff3-3.9.1-4.3mdv2010.0.i586.rpm 571154033ffa0756e3280822220a2903 2010.0/i586/libtiff-devel-3.9.1-4.3mdv2010.0.i586.rpm 7dbf407fb2ad92bbcc8e07dd50378145 2010.0/i586/libtiff-progs-3.9.1-4.3mdv2010.0.i586.rpm 6f00afaaa934688a567fb835fdba6408 2010.0/i586/libtiff-static-devel-3.9.1-4.3mdv2010.0.i586.rpm 476e72930534b39b3a233ff39d32b749 2010.0/SRPMS/libtiff-3.9.1-4.3mdv2010.0.src.rpm Mandriva Linux 2010.0/X86_64: 9b00125f6db8ef5f0007015f824a2297 2010.0/x86_64/lib64tiff3-3.9.1-4.3mdv2010.0.x86_64.rpm 5bce8273b1596a72b20762a2a10a4ba5 2010.0/x86_64/lib64tiff-devel-3.9.1-4.3mdv2010.0.x86_64.rpm 1dfce1fe83cc7e20fb28ed6b90620cb6 2010.0/x86_64/lib64tiff-static-devel-3.9.1-4.3mdv2010.0.x86_64.rpm e945257630a37a38ff6a182fcb9a3983 2010.0/x86_64/libtiff-progs-3.9.1-4.3mdv2010.0.x86_64.rpm 476e72930534b39b3a233ff39d32b749 2010.0/SRPMS/libtiff-3.9.1-4.3mdv2010.0.src.rpm Mandriva Linux 2010.1: 1ebefe4b147df76b2432e35efb6ccc68 2010.1/i586/libtiff3-3.9.2-2.3mdv2010.2.i586.rpm 3b3f043455d4fa867de179c0d445812f 2010.1/i586/libtiff-devel-3.9.2-2.3mdv2010.2.i586.rpm a4c9326657d3fa9c238c59a0a54c5fa5 2010.1/i586/libtiff-progs-3.9.2-2.3mdv2010.2.i586.rpm bec7660cf735caef3d795254ee12dfb8 2010.1/i586/libtiff-static-devel-3.9.2-2.3mdv2010.2.i586.rpm 11d15974ed4ffe30164791e0603dff7e 2010.1/SRPMS/libtiff-3.9.2-2.3mdv2010.2.src.rpm Mandriva Linux 2010.1/X86_64: 72ce70d9e1db8e677ec346e69aa57469 2010.1/x86_64/lib64tiff3-3.9.2-2.3mdv2010.2.x86_64.rpm b09392f442a6f79a3b7b668b15fb93b6 2010.1/x86_64/lib64tiff-devel-3.9.2-2.3mdv2010.2.x86_64.rpm fdfd079e10cfd09d27771bf6d95610f2 2010.1/x86_64/lib64tiff-static-devel-3.9.2-2.3mdv2010.2.x86_64.rpm 763fb491e5896c4c4cddb46e0935a69e 2010.1/x86_64/libtiff-progs-3.9.2-2.3mdv2010.2.x86_64.rpm 11d15974ed4ffe30164791e0603dff7e 2010.1/SRPMS/libtiff-3.9.2-2.3mdv2010.2.src.rpm Corporate 4.0: 3ff2e1a4ef40b7da017d2d508037434b corporate/4.0/i586/libtiff3-3.6.1-12.10.20060mlcs4.i586.rpm 64a74440c32e4dbd0f27148400b2277f corporate/4.0/i586/libtiff3-devel-3.6.1-12.10.20060mlcs4.i586.rpm 5849512079a3fccfd6794ad516585c0b corporate/4.0/i586/libtiff3-static-devel-3.6.1-12.10.20060mlcs4.i586.rpm 70fa38c74000f8c6a00c5f13611a41fb corporate/4.0/i586/libtiff-progs-3.6.1-12.10.20060mlcs4.i586.rpm d3cb50ab91beab6a422425dc024c41ef corporate/4.0/SRPMS/libtiff-3.6.1-12.10.20060mlcs4.src.rpm Corporate 4.0/X86_64: 09375d3d22f0e7486194927ecb219269 corporate/4.0/x86_64/lib64tiff3-3.6.1-12.10.20060mlcs4.x86_64.rpm 35badc0f9c59049faa0c47e2bf71a97e corporate/4.0/x86_64/lib64tiff3-devel-3.6.1-12.10.20060mlcs4.x86_64.rpm 96ec56339c5bb9e6ddbd98cdb179c397 corporate/4.0/x86_64/lib64tiff3-static-devel-3.6.1-12.10.20060mlcs4.x86_64.rpm 136c5faf1a6eb66b156986faf5782ec6 corporate/4.0/x86_64/libtiff-progs-3.6.1-12.10.20060mlcs4.x86_64.rpm d3cb50ab91beab6a422425dc024c41ef corporate/4.0/SRPMS/libtiff-3.6.1-12.10.20060mlcs4.src.rpm Mandriva Enterprise Server 5: db92b7deb5c1ebd74a8daf44437afaa1 mes5/i586/libtiff3-3.8.2-12.4mdvmes5.1.i586.rpm 31465ba8554e93c9f83857906c2ac485 mes5/i586/libtiff3-devel-3.8.2-12.4mdvmes5.1.i586.rpm 826524e4a99a8607075fb7969b100a66 mes5/i586/libtiff3-static-devel-3.8.2-12.4mdvmes5.1.i586.rpm 239db171a27266491b01d4709f6c3970 mes5/i586/libtiff-progs-3.8.2-12.4mdvmes5.1.i586.rpm e0b336563cf715de1750ac83eb852683 mes5/SRPMS/libtiff-3.8.2-12.4mdvmes5.1.src.rpm Mandriva Enterprise Server 5/X86_64: def4750ff7298b1c47690444eb3dab53 mes5/x86_64/lib64tiff3-3.8.2-12.4mdvmes5.1.x86_64.rpm 957e1a10a6785ce5c499e3baf50a674e mes5/x86_64/lib64tiff3-devel-3.8.2-12.4mdvmes5.1.x86_64.rpm 8f74482ce1c2468095de1994ba833e57 mes5/x86_64/lib64tiff3-static-devel-3.8.2-12.4mdvmes5.1.x86_64.rpm 93c37769ad6892568dd7370b9ed0a153 mes5/x86_64/libtiff-progs-3.8.2-12.4mdvmes5.1.x86_64.rpm e0b336563cf715de1750ac83eb852683 mes5/SRPMS/libtiff-3.8.2-12.4mdvmes5.1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2011-10-12-1 iOS 5 Software Update iOS 5 Software Update is now available and addresses the following: CalDAV Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: An attacker with a privileged network position may intercept user credentials or other sensitive information from a CalDAV calendar server Description: CalDAV did not check that the SSL certificate presented by the server was trusted. CVE-ID CVE-2011-3253 : Leszek Tasiemski of nSense Calendar Available for: iOS 4.2.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 4.2.0 through 4.3.5 for iPod touch (3rd generation) and later, iOS 4.2.0 through 4.3.5 for iPad Impact: Viewing a maliciously crafted calendar invitation may inject script in the local domain Description: A script injection issue existed in Calendar's handling of invitation notes. This issue is addressed through improved escaping of special characters in invitation notes. This issues does not affect devices prior to iOS 4.2.0. CVE-ID CVE-2011-3254 : Rick Deacon CFNetwork Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: User's AppleID password may be logged to a local file Description: A user's AppleID password and username were logged to a file that was readable by applications on the system. This is resolved by no longer logging these credentials. CVE-ID CVE-2011-3255 : Peter Quade of qdevelop CFNetwork Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: Visiting a maliciously crafted website may lead to the disclosure of sensitive information Description: An issue existed in CFNetwork's handling of HTTP cookies. When accessing a maliciously crafted HTTP or HTTPS URL, CFNetwork could incorrectly send the cookies for a domain to a server outside that domain. CVE-ID CVE-2011-3246 : Erling Ellingsen of Facebook CoreFoundation Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: Viewing a maliciously crafted website or e-mail message may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in CoreFoundation's handling of string tokenization. CVE-ID CVE-2011-0259 : Apple CoreGraphics Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: Viewing a document containing a maliciously crafted font may lead to arbitrary code execution Description: Multiple memory corruption existed in freetype, the most serious of which may lead to arbitrary code execution when processing a maliciously crafted font. CVE-ID CVE-2011-3256 : Apple CoreMedia Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: Visiting a maliciously crafted website may lead to the disclosure of video data from another site Description: A cross-origin issue existed in CoreMedia's handling of cross-site redirects. This issue is addressed through improved origin tracking. CVE-ID CVE-2011-0187 : Nirankush Panchbhai and Microsoft Vulnerability Research (MSVR) Data Access Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: An exchange mail cookie management issue could incorrectly cause data synchronization across different accounts Description: When multiple mail exchange accounts are configured which connect to the same server, a session could potentially receive a valid cookie corresponding to a different account. This issue is addressed by ensuring that cookies are separated across different accounts. CVE-ID CVE-2011-3257 : Bob Sielken of IBM Data Security Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: An attacker with a privileged network position may intercept user credentials or other sensitive information Description: Fraudulent certificates were issued by multiple certificate authorities operated by DigiNotar. This issue is addressed by removing DigiNotar from the list of trusted root certificates, from the list of Extended Validation (EV) certificate authorities, and by configuring default system trust settings so that DigiNotar's certificates, including those issued by other authorities, are not trusted. Data Security Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: Support for X.509 certificates with MD5 hashes may expose users to spoofing and information disclosure as attacks improve Description: Certificates signed using the MD5 hash algorithm were accepted by iOS. This algorithm has known cryptographic weaknesses. Further research or a misconfigured certificate authority could have allowed the creation of X.509 certificates with attacker controlled values that would have been trusted by the system. This would have exposed X.509 based protocols to spoofing, man in the middle attacks, and information disclosure. This update disables support for an X.509 certificate with an MD5 hash for any use other than as a trusted root certificate. CVE-ID CVE-2011-3427 Data Security Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: An attacker could decrypt part of a SSL connection Description: Only the SSLv3 and TLS 1.0 versions of SSL were supported. These versions are subject to a protocol weakness when using block ciphers. A man-in-the-middle attacker could have injected invalid data, causing the connection to close but revealing some information about the previous data. If the same connection was attempted repeatedly the attacker may eventually have been able to decrypt the data being sent, such as a password. This issue is addressed by adding support for TLS 1.2. CVE-ID CVE-2011-3389 Home screen Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: Switching between applications may lead to the disclosure of sensitive application information Description: When switching between applications with the four- finger app switching gesture, the display could have revealed the previous application state. This issue is addressed by ensuring that the system properly calls the applicationWillResignActive: method when transitioning between applications. CVE-ID CVE-2011-3431 : Abe White of Hedonic Software Inc. CVE-ID CVE-2011-0241 : Cyril CATTIAUX of Tessi Technologies International Components for Unicode Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: Applications that use ICU may be vulnerable to an unexpected application termination or arbitrary code execution Description: A buffer overflow issue existed in ICU's generation of collation keys for long strings of mostly uppercase letters. CVE-ID CVE-2011-0206 : David Bienvenu of Mozilla Kernel Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: A remote attacker may cause a device reset Description: The kernel failed to promptly reclaim memory from incomplete TCP connections. An attacker with the ability to connect to a listening service on an iOS device could exhaust system resources. CVE-ID CVE-2011-3259 : Wouter van der Veer of Topicus I&I, and Josh Enders Kernel Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: A local user may be able to cause a system reset Description: A null dereference issue existed in the handling of IPV6 socket options. CVE-ID CVE-2011-1132 : Thomas Clement of Intego Keyboards Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: A user may be able to determine information about the last character of a password Description: The keyboard used to type the last character of a password was briefly displayed the next time the keyboard was used. CVE-ID CVE-2011-3245 : Paul Mousdicas libxml Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: A one-byte heap buffer overflow existed in libxml's handling of XML data. CVE-ID CVE-2011-0216 : Billy Rios of the Google Security Team OfficeImport Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: Viewing a maliciously crafted Word file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in OfficeImport's handling of Microsoft Word documents. CVE-ID CVE-2011-3260 : Tobias Klein working with Verisign iDefense Labs OfficeImport Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: Viewing a maliciously crafted Excel file may lead to an unexpected application termination or arbitrary code execution Description: A double free issue existed in OfficeImport's handling of Excel files. CVE-ID CVE-2011-3261 : Tobias Klein of www.trapkit.de OfficeImport Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: Downloading a maliciously crafted Microsoft Office file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in OfficeImport's handling of Microsoft Office files. CVE-ID CVE-2011-0208 : Tobias Klein working with iDefense VCP OfficeImport Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: Downloading a maliciously crafted Excel file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in OfficeImport's handling of Excel files. CVE-ID CVE-2011-0184 : Tobias Klein working with iDefense VCP Safari Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: Opening maliciously crafted files on certain websites may lead to a cross-site scripting attack Description: iOS did not support the 'attachment' value for the HTTP Content-Disposition header. This header is used by many websites to serve files that were uploaded to the site by a third-party, such as attachments in web-based e-mail applications. Any script in files served with this header value would run as if the file had been served inline, with full access to other resources on the origin server. This issue is addressed by loading attachments in an isolated security origin with no access to resources on other sites. CVE-ID CVE-2011-3426 : Christian Matthies working with iDefense VCP, Yoshinori Oota from Business Architects Inc working with JP/CERT Settings Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: An attacker with physical access to a device may be able to recover the restrictions passcode Description: The parental restrictions functionality enforces UI restrictions. Configuring parental restrictions is protected by a passcode, which was previously stored in plaintext on disk. This issue is addressed by securely storing the parental restrictions passcode in the system keychain. CVE-ID CVE-2011-3429 : an anonymous reporter Settings Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: Misleading UI Description: Configurations and settings applied via configuration profiles did not appear to function properly under any non-English language. Settings could be improperly displayed as a result. This issue is addressed by fixing a localization error. CVE-ID CVE-2011-3430 : Florian Kreitmaier of Siemens CERT UIKit Alerts Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: Visiting a malicious website may cause an unexpected device hang Description: An excessive maximum text layout length permitted malicious websites to cause iOS to hang when drawing acceptance dialogs for very long tel: URIs. This issue is addressed by using a more reasonable maximum URI size. CVE-ID CVE-2011-3432 : Simon Young of Anglia Ruskin University WebKit Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in WebKit. CVE-ID CVE-2011-0218 : SkyLined of Google Chrome Security Team CVE-2011-0221 : Abhishek Arya (Inferno) of Google Chrome Security Team CVE-2011-0222 : Nikita Tarakanov and Alex Bazhanyuk of the CISS Research Team, and Abhishek Arya (Inferno) of Google Chrome Security Team CVE-2011-0225 : Abhishek Arya (Inferno) of Google Chrome Security Team CVE-2011-0232 : J23 working with TippingPoint's Zero Day Initiative CVE-2011-0233 : wushi of team509 working with TippingPoint's Zero Day Initiative CVE-2011-0234 : Rob King working with TippingPoint's Zero Day Initiative, wushi of team509 working with TippingPoint's Zero Day Initiative CVE-2011-0235 : Abhishek Arya (Inferno) of Google Chrome Security Team CVE-2011-0238 : Adam Barth of Google Chrome Security Team CVE-2011-0254 : An anonymous researcher working with TippingPoint's Zero Day Initiative CVE-2011-0255 : An anonymous reporter working with TippingPoint's Zero Day Initiative CVE-2011-0981 : Rik Cabanier of Adobe Systems, Inc CVE-2011-0983 : Martin Barbella CVE-2011-1109 : Sergey Glazunov CVE-2011-1114 : Martin Barbella CVE-2011-1115 : Martin Barbella CVE-2011-1117 : wushi of team509 CVE-2011-1121 : miaubiz CVE-2011-1188 : Martin Barbella CVE-2011-1203 : Sergey Glazunov CVE-2011-1204 : Sergey Glazunov CVE-2011-1288 : Andreas Kling of Nokia CVE-2011-1293 : Sergey Glazunov CVE-2011-1296 : Sergey Glazunov CVE-2011-1449 : Marek Majkowski CVE-2011-1451 : Sergey Glazunov CVE-2011-1453 : wushi of team509 working with TippingPoint's Zero Day Initiative CVE-2011-1457 : John Knottenbelt of Google CVE-2011-1462 : wushi of team509 CVE-2011-1797 : wushi of team509 CVE-2011-2338 : Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer CVE-2011-2339 : Cris Neckar of the Google Chrome Security Team CVE-2011-2341 : Apple CVE-2011-2351 : miaubiz CVE-2011-2352 : Apple CVE-2011-2354 : Apple CVE-2011-2356 : Adam Barth and Abhishek Arya of Google Chrome Security Team using AddressSanitizer CVE-2011-2359 : miaubiz CVE-2011-2788 : Mikolaj Malecki of Samsung CVE-2011-2790 : miaubiz CVE-2011-2792 : miaubiz CVE-2011-2797 : miaubiz CVE-2011-2799 : miaubiz CVE-2011-2809 : Abhishek Arya (Inferno) of Google Chrome Security Team CVE-2011-2813 : Cris Neckar of Google Chrome Security Team using AddressSanitizer CVE-2011-2814 : Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer CVE-2011-2816 : Apple CVE-2011-2817 : Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer CVE-2011-2818 : Martin Barbella CVE-2011-2820 : Raman Tenneti and Philip Rogers of Google CVE-2011-2823 : SkyLined of Google Chrome Security Team CVE-2011-2827 : miaubiz CVE-2011-2831 : Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer CVE-2011-3232 : Aki Helin of OUSPG CVE-2011-3234 : miaubiz CVE-2011-3235 : Dimitri Glazkov, Kent Tamura, Dominic Cooney of the Chromium development community, and Abhishek Arya (Inferno) of Google Chrome Security Team CVE-2011-3236 : Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer CVE-2011-3237 : Dimitri Glazkov, Kent Tamura, Dominic Cooney of the Chromium development community, and Abhishek Arya (Inferno) of Google Chrome Security Team CVE-2011-3244 : vkouchna WebKit Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: Visiting a maliciously crafted website may lead to a cross- site scripting attack Description: A cross-origin issue existed in the handling of URLs with an embedded username. This issue is addressed through improved handling of URLs with an embedded username. CVE-ID CVE-2011-0242 : Jobert Abma of Online24 WebKit Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: Visiting a maliciously crafted website may lead to a cross- site scripting attack Description: A cross-origin issue existed in the handling of DOM nodes. CVE-ID CVE-2011-1295 : Sergey Glazunov WebKit Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: A maliciously crafted website may be able to cause a different URL to be shown in the address bar Description: A URL spoofing issue existed in the handling of the DOM history object. CVE-ID CVE-2011-1107 : Jordi Chancel WebKit Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: Visiting a maliciously crafted website may lead to arbitrary code execution Description: A configuration issue existed in WebKit's use of libxslt. Visiting a maliciously crafted website may lead to arbitrary files being created with the privileges of the user, which may lead to arbitrary code execution. This issue is addressed through improved libxslt security settings. CVE-ID CVE-2011-1774 : Nicolas Gregoire of Agarri WebKit Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: Visiting a malicious website and dragging content in the page may lead to an information disclosure Description: A cross-origin issue existed in WebKit's handling of HTML5 drag and drop. This issue is addressed by disallowing drag and drop across different origins. CVE-ID CVE-2011-0166 : Michal Zalewski of Google Inc. WebKit Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: Visiting a maliciously crafted website may lead to an information disclosure Description: A cross-origin issue existed in the handling of Web Workers. CVE-ID CVE-2011-1190 : Daniel Divricean of divricean.ro WebKit Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: Visiting a maliciously crafted website may lead to a cross- site scripting attack Description: A cross-origin issue existed in the handling of the window.open method. CVE-ID CVE-2011-2805 : Sergey Glazunov WebKit Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: Visiting a maliciously crafted website may lead to a cross- site scripting attack Description: A cross-origin issue existed in the handling of inactive DOM windows. CVE-ID CVE-2011-3243 : Sergey Glazunov WebKit Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: Visiting a maliciously crafted website may lead to a cross- site scripting attack Description: A cross-origin issue existed in the handling of the document.documentURI property. CVE-ID CVE-2011-2819 : Sergey Glazunov WebKit Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: A maliciously crafted website may be able to track the URLs that a user visits within a frame Description: A cross-origin issue existed in the handling of the beforeload event. CVE-ID CVE-2011-2800 : Juho Nurminen WiFi Available for: iOS 3.0 through 4.3.5 for iPhone 3GS and iPhone 4, iOS 3.1 through 4.3.5 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.5 for iPad Impact: WiFi credentials may be logged to a local file Description: WiFi credentials including the passphrase and encryption keys were logged to a file that was readable by applications on the system. This is resolved by no longer logging these credentials. CVE-ID CVE-2011-3434 : Laurent OUDOT of TEHTRI Security Installation note: This update is only available through iTunes, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from www.apple.com/itunes/ iTunes will automatically check Apple's update server on its weekly schedule. When an update is detected, it will download it. When the iPhone, iPod touch or iPad is docked, iTunes will present the user with the option to install the update. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iPhone, iPod touch, or iPad. The automatic update process may take up to a week depending on the day that iTunes checks for updates. You may manually obtain the update via the Check for Updates button within iTunes. After doing this, the update can be applied when your iPhone, iPod touch, or iPad is docked to your computer. To check that the iPhone, iPod touch, or iPad has been updated: * Navigate to Settings * Select General * Select About. The version after applying this update will be "5 (9A334)". Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.16 (Darwin) iQEcBAEBAgAGBQJOldmtAAoJEGnF2JsdZQee/qMIAIPxmIiOqj+FMLFHZtPeC/Dp 3s4JliKOOgNnjXkxErfaNvYGmeVbDaUER5jdVrWccTauzlYmy8G4uK0An2GD2YiP gB5AiCQXpONdBCi38QNdRqrYoYjc8Sa0nUp4r5uWPoiHoj5KfxvBpgygEL+zjHXS fmnrONOCWhOYp0w4q6mdTg5BH2uJCbXscD/JjbmgHQI0Vs/iUZKSRyqFo2b0Mvze NiSyzcj/4l62Cxx7xM9VbdrYL7Al2yyHfNYJQsZmoeDUlJQcdgEgEMXvOuhY3sFK maxYr2oCp6Mtf53fplAeJIV4ijLynEWAKxTuTznAyW1k7oiGrDTfORSFKPEB9MQ= =LCQZ -----END PGP SIGNATURE-----

Trust: 2.34

sources: NVD: CVE-2011-0192 // JVNDB: JVNDB-2011-001352 // VULHUB: VHN-48137 // PACKETSTORM: 100027 // PACKETSTORM: 99031 // PACKETSTORM: 102606 // PACKETSTORM: 99337 // PACKETSTORM: 99068 // PACKETSTORM: 105737 // PACKETSTORM: 105736

AFFECTED PRODUCTS

vendor:applemodel:itunesscope:eqversion:10.1

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:9.2.1

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:9.0.1

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:10.0.1

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:9.2

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:10.1.1

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:9.0.2

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:10.0

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:9.0.3

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:6.0.4.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:6.0.5

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:8.1.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:6.0.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.8.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.7

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:8.0.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:5.0.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.3.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.1.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:8.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:5.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.6

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.0.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:8.2.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.4.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.7.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.5.0

Trust: 1.0

vendor:applemodel:itunesscope:lteversion:10.1.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.6.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.7.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.7

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.6.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.4.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:9.0.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.4.3

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:6.0.3

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.6.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.1.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.6.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.7.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:8.0.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.9.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.6

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.5.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.7.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.4

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.3.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:8.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.2.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.2.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:6.0.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.5

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:5.0.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:6.0.4

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:8.0.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.7.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:6.0.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.0.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.0.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.1.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.5

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.4.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.3.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.0.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.0.2

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:tvscope:eqversion:4.0

Trust: 0.8

vendor:applemodel:tvscope:eqversion:4.1

Trust: 0.8

vendor:applemodel:iosscope:eqversion:3.0 to 4.2.1 (iphone 3gs after )

Trust: 0.8

vendor:applemodel:iosscope:eqversion:3.1 to 4.2.1 (ipod touch (3rd generation) after )

Trust: 0.8

vendor:applemodel:iosscope:eqversion:3.2 to 4.2.1 (ipad for )

Trust: 0.8

vendor:applemodel:ipadscope: - version: -

Trust: 0.8

vendor:applemodel:iphonescope: - version: -

Trust: 0.8

vendor:applemodel:ipod touchscope: - version: -

Trust: 0.8

vendor:applemodel:itunesscope:eqversion:10

Trust: 0.8

vendor:applemodel:safariscope:eqversion:5

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4.8 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4.8 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:5 (server)

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:4.0

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:5.0 (client)

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:6

Trust: 0.8

vendor:red hatmodel:enterprise linux hpc nodescope:eqversion:6

Trust: 0.8

vendor:red hatmodel:enterprise linux serverscope:eqversion:6

Trust: 0.8

vendor:red hatmodel:enterprise linux workstationscope:eqversion:6

Trust: 0.8

vendor:red hatmodel:rhel desktop workstationscope:eqversion:5 (client)

Trust: 0.8

vendor:applemodel:itunesscope:eqversion:10.1.2

Trust: 0.6

sources: JVNDB: JVNDB-2011-001352 // CNNVD: CNNVD-201103-112 // NVD: CVE-2011-0192

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-0192
value: HIGH

Trust: 1.0

NVD: CVE-2011-0192
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201103-112
value: CRITICAL

Trust: 0.6

VULHUB: VHN-48137
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2011-0192
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-48137
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-48137 // JVNDB: JVNDB-2011-001352 // CNNVD: CNNVD-201103-112 // NVD: CVE-2011-0192

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-48137 // JVNDB: JVNDB-2011-001352 // NVD: CVE-2011-0192

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 99068 // CNNVD: CNNVD-201103-112

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201103-112

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-001352

PATCH

title:HT4554url:http://support.apple.com/kb/HT4554

Trust: 0.8

title:HT4566url:http://support.apple.com/kb/HT4566

Trust: 0.8

title:HT4564url:http://support.apple.com/kb/HT4564

Trust: 0.8

title:HT4565url:http://support.apple.com/kb/HT4565

Trust: 0.8

title:HT4581url:http://support.apple.com/kb/HT4581

Trust: 0.8

title:HT4566url:http://support.apple.com/kb/HT4566?viewlocale=ja_JP

Trust: 0.8

title:HT4564url:http://support.apple.com/kb/HT4564?viewlocale=ja_JP

Trust: 0.8

title:HT4565url:http://support.apple.com/kb/HT4565?viewlocale=ja_JP

Trust: 0.8

title:HT4581url:http://support.apple.com/kb/HT4581?viewlocale=ja_JP

Trust: 0.8

title:HT4554url:http://support.apple.com/kb/HT4554?viewlocale=ja_JP

Trust: 0.8

title:FTP Directoryurl:ftp://ftp.remotesensing.org/pub/libtiff/

Trust: 0.8

title:RHSA-2011:0318url:https://rhn.redhat.com/errata/RHSA-2011-0318.html

Trust: 0.8

title:Multiple vulnerabilities in LibTIFFurl:https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_libtiff

Trust: 0.8

title:iTunes 10.2url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=39588

Trust: 0.6

title:iTunes 10.2 for Windows (64 bit)url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=39587

Trust: 0.6

sources: JVNDB: JVNDB-2011-001352 // CNNVD: CNNVD-201103-112

EXTERNAL IDS

db:NVDid:CVE-2011-0192

Trust: 3.2

db:SECUNIAid:43593

Trust: 1.9

db:BIDid:46658

Trust: 1.9

db:SECUNIAid:43664

Trust: 1.1

db:SECUNIAid:50726

Trust: 1.1

db:SECUNIAid:43585

Trust: 1.1

db:SECUNIAid:44135

Trust: 1.1

db:SECUNIAid:43934

Trust: 1.1

db:SECUNIAid:44117

Trust: 1.1

db:VUPENid:ADV-2011-0960

Trust: 1.1

db:VUPENid:ADV-2011-0551

Trust: 1.1

db:VUPENid:ADV-2011-0599

Trust: 1.1

db:VUPENid:ADV-2011-0621

Trust: 1.1

db:VUPENid:ADV-2011-0845

Trust: 1.1

db:VUPENid:ADV-2011-0930

Trust: 1.1

db:VUPENid:ADV-2011-0905

Trust: 1.1

db:SECTRACKid:1025153

Trust: 1.1

db:JVNDBid:JVNDB-2011-001352

Trust: 0.8

db:CNNVDid:CNNVD-201103-112

Trust: 0.7

db:AUSCERTid:ESB-2020.2340

Trust: 0.6

db:PACKETSTORMid:105737

Trust: 0.2

db:PACKETSTORMid:99068

Trust: 0.2

db:VULHUBid:VHN-48137

Trust: 0.1

db:PACKETSTORMid:100027

Trust: 0.1

db:PACKETSTORMid:99031

Trust: 0.1

db:PACKETSTORMid:102606

Trust: 0.1

db:PACKETSTORMid:99337

Trust: 0.1

db:PACKETSTORMid:105736

Trust: 0.1

sources: VULHUB: VHN-48137 // JVNDB: JVNDB-2011-001352 // PACKETSTORM: 100027 // PACKETSTORM: 99031 // PACKETSTORM: 102606 // PACKETSTORM: 99337 // PACKETSTORM: 99068 // PACKETSTORM: 105737 // PACKETSTORM: 105736 // CNNVD: CNNVD-201103-112 // NVD: CVE-2011-0192

REFERENCES

url:http://www.securityfocus.com/bid/46658

Trust: 1.9

url:http://secunia.com/advisories/43593

Trust: 1.9

url:http://support.apple.com/kb/ht4554

Trust: 1.2

url:http://lists.apple.com/archives/security-announce/2011/mar/msg00000.html

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2011//mar/msg00003.html

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2011//mar/msg00004.html

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2011//mar/msg00005.html

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2011/mar/msg00006.html

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2011//oct/msg00001.html

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2011//oct/msg00002.html

Trust: 1.1

url:http://blackberry.com/btsc/kb27244

Trust: 1.1

url:http://support.apple.com/kb/ht4564

Trust: 1.1

url:http://support.apple.com/kb/ht4565

Trust: 1.1

url:http://support.apple.com/kb/ht4566

Trust: 1.1

url:http://support.apple.com/kb/ht4581

Trust: 1.1

url:http://support.apple.com/kb/ht4999

Trust: 1.1

url:http://support.apple.com/kb/ht5001

Trust: 1.1

url:https://bugzilla.redhat.com/show_bug.cgi?id=678635

Trust: 1.1

url:http://www.debian.org/security/2011/dsa-2210

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2011-march/055683.html

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2011-march/055240.html

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2011-april/057840.html

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2011-april/057763.html

Trust: 1.1

url:http://security.gentoo.org/glsa/glsa-201209-02.xml

Trust: 1.1

url:http://www.mandriva.com/security/advisories?name=mdvsa-2011:043

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2011-0318.html

Trust: 1.1

url:http://www.securitytracker.com/id?1025153

Trust: 1.1

url:http://secunia.com/advisories/43585

Trust: 1.1

url:http://secunia.com/advisories/43664

Trust: 1.1

url:http://secunia.com/advisories/43934

Trust: 1.1

url:http://secunia.com/advisories/44117

Trust: 1.1

url:http://secunia.com/advisories/44135

Trust: 1.1

url:http://secunia.com/advisories/50726

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html

Trust: 1.1

url:http://www.vupen.com/english/advisories/2011/0551

Trust: 1.1

url:http://www.vupen.com/english/advisories/2011/0599

Trust: 1.1

url:http://www.vupen.com/english/advisories/2011/0621

Trust: 1.1

url:http://www.vupen.com/english/advisories/2011/0845

Trust: 1.1

url:http://www.vupen.com/english/advisories/2011/0905

Trust: 1.1

url:http://www.vupen.com/english/advisories/2011/0930

Trust: 1.1

url:http://www.vupen.com/english/advisories/2011/0960

Trust: 1.1

url:http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.587820

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0192

Trust: 0.9

url:http://jvn.jp/cert/jvnvu643615

Trust: 0.8

url:http://jvn.jp/cert/jvnvu867452

Trust: 0.8

url:http://jvn.jp/cert/jvnvu636925

Trust: 0.8

url:http://jvn.jp/cert/jvnvu574588

Trust: 0.8

url:http://jvn.jp/cert/jvnvu556020

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0192

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2011-0192

Trust: 0.7

url:https://www.auscert.org.au/bulletins/esb-2020.2340/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2011-0191

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2011-1167

Trust: 0.2

url:http://www.debian.org/security/faq

Trust: 0.2

url:http://www.debian.org/security/

Trust: 0.2

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.8.2.orig.tar.gz

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-2630

Trust: 0.2

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.7.4.orig.tar.gz

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-3087

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-2595

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-2598

Trust: 0.2

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.9.2.orig.tar.gz

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-2482

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-2483

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-2597

Trust: 0.2

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.9.4.orig.tar.gz

Trust: 0.2

url:http://secunia.com/

Trust: 0.2

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-0216

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-0241

Trust: 0.2

url:https://www.apple.com/support/security/pgp/

Trust: 0.2

url:http://support.apple.com/kb/ht1222

Trust: 0.2

url:http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.587820

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.8.2-7ubuntu3.7.diff.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.8.2-7ubuntu3.7_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.9.4-2ubuntu0.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-doc_3.8.2-13ubuntu0.4_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.8.2-7ubuntu3.7_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.8.2-13ubuntu0.4_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.9.2-2ubuntu0.4_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.7.4-1ubuntu3.9_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.8.2-7ubuntu3.7_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.7.4-1ubuntu3.9_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.8.2-13ubuntu0.4_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.9.4-2ubuntu0.1_armel.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.8.2-13ubuntu0.4_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.8.2-13ubuntu0.4_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-doc_3.9.4-2ubuntu0.1_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.9.2-2ubuntu0.4_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.9.4-2ubuntu0.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.7.4-1ubuntu3.9_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.9.4-2ubuntu0.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.9.4-2ubuntu0.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.7.4-1ubuntu3.9_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.9.2-2ubuntu0.4_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.9.4-2ubuntu0.1_armel.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.9.2-2ubuntu0.4_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.8.2-7ubuntu3.7_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.7.4-1ubuntu3.9_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.8.2-7ubuntu3.7_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.8.2-7ubuntu3.7_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.8.2-7ubuntu3.7_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.7.4-1ubuntu3.9.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.7.4-1ubuntu3.9_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.9.2-2ubuntu0.4.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.9.2-2ubuntu0.4_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.8.2-7ubuntu3.7_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.8.2-13ubuntu0.4_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.8.2-7ubuntu3.7_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.8.2-13ubuntu0.4_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.8.2-13ubuntu0.4_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.7.4-1ubuntu3.9_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.8.2-7ubuntu3.7_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.9.4-2ubuntu0.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.8.2-13ubuntu0.4_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.8.2-7ubuntu3.7_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.9.2-2ubuntu0.4_armel.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.9.4-2ubuntu0.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.7.4-1ubuntu3.9_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.9.2-2ubuntu0.4_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.8.2-13ubuntu0.4_armel.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.8.2-13ubuntu0.4_armel.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.9.2-2ubuntu0.4_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.9.2-2ubuntu0.4_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.7.4-1ubuntu3.9.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.8.2-13ubuntu0.4_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.8.2-13ubuntu0.4_armel.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.8.2-13ubuntu0.4_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-doc_3.9.2-2ubuntu0.4_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.7.4-1ubuntu3.9_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.9.2-2ubuntu0.4_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.9.2-2ubuntu0.4_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.9.4-2ubuntu0.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.9.2-2ubuntu0.4_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.9.4-2ubuntu0.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.9.4-2ubuntu0.1_armel.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.7.4-1ubuntu3.9_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.7.4-1ubuntu3.9_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.9.2-2ubuntu0.4_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.8.2-13ubuntu0.4_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.9.4-2ubuntu0.1_armel.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.9.4-2ubuntu0.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.9.2-2ubuntu0.4_armel.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.8.2-7ubuntu3.7_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.9.4-2ubuntu0.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.9.2-2ubuntu0.4_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.9.4-2ubuntu0.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.8.2-13ubuntu0.4_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.8.2-7ubuntu3.7_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.7.4-1ubuntu3.9_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.8.2-13ubuntu0.4_armel.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.7.4-1ubuntu3.9_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.8.2-13ubuntu0.4_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.7.4-1ubuntu3.9_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.9.4-2ubuntu0.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.8.2-7ubuntu3.7.dsc

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.8.2-7ubuntu3.7_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.8.2-13ubuntu0.4_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.9.2-2ubuntu0.4_armel.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.9.4-2ubuntu0.1_armel.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.7.4-1ubuntu3.9_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.9.4-2ubuntu0.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.8.2-7ubuntu3.7_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.7.4-1ubuntu3.9_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.8.2-13ubuntu0.4_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.9.4-2ubuntu0.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.9.2-2ubuntu0.4_armel.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.9.4-2ubuntu0.1.debian.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.7.4-1ubuntu3.9_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.8.2-7ubuntu3.7_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.9.4-2ubuntu0.1.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.8.2-7ubuntu3.7_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.8.2-7ubuntu3.7_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.9.2-2ubuntu0.4_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.8.2-13ubuntu0.4_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.8.2-7ubuntu3.7_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.8.2-13ubuntu0.4_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.7.4-1ubuntu3.9_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.7.4-1ubuntu3.9_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.8.2-13ubuntu0.4_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.9.2-2ubuntu0.4_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.8.2-7ubuntu3.7_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.9.2-2ubuntu0.4_armel.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.8.2-13ubuntu0.4_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.8.2-13ubuntu0.4.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.8.2-7ubuntu3.7_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.8.2-13ubuntu0.4_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.8.2-13ubuntu0.4_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.8.2-7ubuntu3.7_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.8.2-7ubuntu3.7_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.9.2-2ubuntu0.4_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.8.2-13ubuntu0.4_armel.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.9.2-2ubuntu0.4_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.8.2-7ubuntu3.7_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.9.2-2ubuntu0.4_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.8.2-13ubuntu0.4_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.9.2-2ubuntu0.4.diff.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.8.2-13ubuntu0.4_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.9.2-2ubuntu0.4_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.8.2-13ubuntu0.4.diff.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.8.2-13ubuntu0.4_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.8.2-7ubuntu3.7_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.9.2-2ubuntu0.4_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.7.4-1ubuntu3.9_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.9.4-2ubuntu0.1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.8.2-13ubuntu0.4_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.8.2-7ubuntu3.8.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.8.2-13ubuntu0.5_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.8.2-7ubuntu3.8_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-doc_3.9.4-2ubuntu0.2_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.9.4-2ubuntu0.2_armel.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.7.4-1ubuntu3.10_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.9.2-2ubuntu0.5_armel.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.7.4-1ubuntu3.10_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.7.4-1ubuntu3.10_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.9.4-2ubuntu0.2.debian.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.7.4-1ubuntu3.10_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.8.2-7ubuntu3.8.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.7.4-1ubuntu3.10_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.8.2-13ubuntu0.5.dsc

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.8.2-13ubuntu0.5_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.8.2-13ubuntu0.5_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.9.2-2ubuntu0.5_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.9.4-2ubuntu0.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.9.2-2ubuntu0.5_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.7.4-1ubuntu3.10_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.8.2-13ubuntu0.5_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.9.2-2ubuntu0.5_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.8.2-13ubuntu0.5_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.7.4-1ubuntu3.10_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.9.4-2ubuntu0.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.8.2-7ubuntu3.8_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.8.2-13ubuntu0.5_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.9.2-2ubuntu0.5.diff.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.9.4-2ubuntu0.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.8.2-7ubuntu3.8_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.8.2-7ubuntu3.8_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.9.4-2ubuntu0.2.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.7.4-1ubuntu3.10_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.8.2-13ubuntu0.5_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.9.2-2ubuntu0.5_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.7.4-1ubuntu3.10.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.8.2-13ubuntu0.5_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.9.2-2ubuntu0.5_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.8.2-7ubuntu3.8_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.8.2-13ubuntu0.5_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.9.2-2ubuntu0.5_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.8.2-13ubuntu0.5_armel.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.9.4-2ubuntu0.2_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.8.2-13ubuntu0.5_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.9.4-2ubuntu0.2_armel.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.9.2-2ubuntu0.5_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.9.2-2ubuntu0.5_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.7.4-1ubuntu3.10_i386.deb

Trust: 0.1

url:https://launchpad.net/bugs/731540

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.9.2-2ubuntu0.5_armel.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.9.4-2ubuntu0.2_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.9.4-2ubuntu0.2_armel.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.7.4-1ubuntu3.10_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.8.2-13ubuntu0.5_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.8.2-13ubuntu0.5.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.7.4-1ubuntu3.10_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.7.4-1ubuntu3.10_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.7.4-1ubuntu3.10_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.8.2-13ubuntu0.5_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.9.4-2ubuntu0.2_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.8.2-13ubuntu0.5_armel.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.8.2-13ubuntu0.5_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.9.2-2ubuntu0.5_armel.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.7.4-1ubuntu3.10_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.8.2-13ubuntu0.5_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.9.2-2ubuntu0.5_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.9.4-2ubuntu0.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.9.2-2ubuntu0.5_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.8.2-7ubuntu3.8_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.9.4-2ubuntu0.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.9.2-2ubuntu0.5_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.8.2-7ubuntu3.8_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.9.4-2ubuntu0.2_armel.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.9.2-2ubuntu0.5.dsc

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.9.2-2ubuntu0.5_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.9.4-2ubuntu0.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.8.2-13ubuntu0.5_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.8.2-13ubuntu0.5_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.9.4-2ubuntu0.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.8.2-13ubuntu0.5_armel.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.9.4-2ubuntu0.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.7.4-1ubuntu3.10_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.9.2-2ubuntu0.5_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.9.4-2ubuntu0.2_armel.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.8.2-7ubuntu3.8_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.8.2-7ubuntu3.8_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.8.2-7ubuntu3.8_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.8.2-7ubuntu3.8_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.8.2-13ubuntu0.5_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.8.2-7ubuntu3.8_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.8.2-13ubuntu0.5_armel.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.8.2-7ubuntu3.8_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.8.2-7ubuntu3.8_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.9.2-2ubuntu0.5_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.9.2-2ubuntu0.5_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-doc_3.8.2-13ubuntu0.5_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.8.2-7ubuntu3.8_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.8.2-7ubuntu3.8_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.8.2-13ubuntu0.5_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.9.4-2ubuntu0.2_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.8.2-7ubuntu3.8_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.8.2-13ubuntu0.5_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.8.2-7ubuntu3.8_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.9.4-2ubuntu0.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.8.2-7ubuntu3.8_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4-dev_3.9.4-2ubuntu0.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.9.2-2ubuntu0.5_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.8.2-13ubuntu0.5_armel.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.9.2-2ubuntu0.5_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.9.4-2ubuntu0.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.8.2-7ubuntu3.8_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff-tools_3.9.2-2ubuntu0.5_armel.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.9.2-2ubuntu0.5_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.9.2-2ubuntu0.5_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.7.4-1ubuntu3.10_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.9.2-2ubuntu0.5_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.8.2-13ubuntu0.5_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.8.2-7ubuntu3.8_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.7.4-1ubuntu3.10_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/tiff_3.7.4-1ubuntu3.10.diff.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.9.2-2ubuntu0.5_armel.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.8.2-13ubuntu0.5_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.7.4-1ubuntu3.10_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.7.4-1ubuntu3.10_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiffxx0c2_3.8.2-13ubuntu0.5_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4-dev_3.8.2-13ubuntu0.5_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.8.2-7ubuntu3.8_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff4_3.8.2-13ubuntu0.5_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/t/tiff/libtiff-opengl_3.8.2-13ubuntu0.5_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/t/tiff/libtiff-opengl_3.8.2-7ubuntu3.8_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/t/tiff/libtiff4_3.8.2-7ubuntu3.8_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-doc_3.9.2-2ubuntu0.5_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiffxx0c2_3.8.2-7ubuntu3.8_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/t/tiff/libtiff-tools_3.7.4-1ubuntu3.10_powerpc.deb

Trust: 0.1

url:http://www.mandriva.com/security/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2347

Trust: 0.1

url:http://store.mandriva.com/product_info.php?cpath=149&products_id=490

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-2347

Trust: 0.1

url:http://www.mandriva.com/security/advisories

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2065

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2065

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3232

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3389

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3427

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3259

Trust: 0.1

url:https://www.apple.com/itunes/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0184

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0206

Trust: 0.1

url:https://www.trapkit.de

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0259

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0235

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0187

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0254

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0238

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0983

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1117

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1109

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1115

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0233

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0166

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0234

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0242

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0255

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0981

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1114

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0221

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1107

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0218

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0225

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0208

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0232

Trust: 0.1

sources: VULHUB: VHN-48137 // JVNDB: JVNDB-2011-001352 // PACKETSTORM: 100027 // PACKETSTORM: 99031 // PACKETSTORM: 102606 // PACKETSTORM: 99337 // PACKETSTORM: 99068 // PACKETSTORM: 105737 // PACKETSTORM: 105736 // CNNVD: CNNVD-201103-112 // NVD: CVE-2011-0192

CREDITS

Debian

Trust: 0.2

sources: PACKETSTORM: 100027 // PACKETSTORM: 102606

SOURCES

db:VULHUBid:VHN-48137
db:JVNDBid:JVNDB-2011-001352
db:PACKETSTORMid:100027
db:PACKETSTORMid:99031
db:PACKETSTORMid:102606
db:PACKETSTORMid:99337
db:PACKETSTORMid:99068
db:PACKETSTORMid:105737
db:PACKETSTORMid:105736
db:CNNVDid:CNNVD-201103-112
db:NVDid:CVE-2011-0192

LAST UPDATE DATE

2024-11-11T23:04:26.540000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-48137date:2014-02-21T00:00:00
db:JVNDBid:JVNDB-2011-001352date:2012-04-17T00:00:00
db:CNNVDid:CNNVD-201103-112date:2020-07-10T00:00:00
db:NVDid:CVE-2011-0192date:2014-02-21T04:39:24.093

SOURCES RELEASE DATE

db:VULHUBid:VHN-48137date:2011-03-03T00:00:00
db:JVNDBid:JVNDB-2011-001352date:2011-04-05T00:00:00
db:PACKETSTORMid:100027date:2011-04-04T16:47:55
db:PACKETSTORMid:99031date:2011-03-07T16:03:11
db:PACKETSTORMid:102606date:2011-06-27T23:06:48
db:PACKETSTORMid:99337date:2011-03-15T20:48:58
db:PACKETSTORMid:99068date:2011-03-08T15:34:03
db:PACKETSTORMid:105737date:2011-10-13T02:32:41
db:PACKETSTORMid:105736date:2011-10-13T02:28:22
db:CNNVDid:CNNVD-201103-112date:2011-03-04T00:00:00
db:NVDid:CVE-2011-0192date:2011-03-03T20:00:02.643