Mandriva: 2011:043: libtiff


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) Mandriva: 2011:043: libtiff
# 1  
Old 03-08-2011
Mandriva: 2011:043: libtiff

LinuxSecurity.com: A buffer overflow was discovered in libtiff which allows remoteattackers to execute arbitrary code or cause a denial of service(application crash) via a crafted TIFF image with CCITT Group 4encoding (CVE-2011-0192).[More...]

More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
GIF2TIFF(1)						      General Commands Manual						       GIF2TIFF(1)

NAME
gif2tiff - create a TIFF file from a GIF87 format image file SYNOPSIS
gif2tiff [ options ] input.gif output.tif DESCRIPTION
Gif2tiff converts a file in the GIF87 format to TIFF. The TIFF image is created as a palette image, with samples compressed with the Lem- pel-Ziv & Welch algorithm (Compression=5). These characteristics can overridden, or explicitly specified with the options described below. OPTIONS
-c Specify a compression scheme to use when writing image data: -c none for no compression, -c packbits for the PackBits compression algorithm, -c zip for the Deflate compression algorithm, and -c lzw for Lempel-Ziv & Welch (the default). -r Write data with a specified number of rows per strip; by default the number of rows/strip is selected so that each strip is approxi- mately 8 kilobytes. NOTES
The program is based on Paul Haeberli's fromgif program which, in turn, is based on Marcel J.E. Mol's GIF reader. BUGS
Should have more options to control output format. SEE ALSO
pal2rgb(1), tiffinfo(1), tiffcp(1), tiffmedian(1), libtiff(3) Libtiff library home page: http://www.remotesensing.org/libtiff/ libtiff November 2, 2005 GIF2TIFF(1)