Multiple security vulnerabilities in the Solaris Tag Image File Format library (libtiff(3)) may allow a local or remote unprivileged user to crash applications that dynamically link to the "libtiff" library and execute arbitrary code with the privileges of a local user. The ability to crash an application that links to the "libtiff" library is a type of Denial of Service (DoS). Solaris ships several applications as part of the GNOME Desktop Environment that dynamically link with the "libtiff" library.
These issues are described in the following documents:
CVE-2006-2024 at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2024
CVE-2006-2025 at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2025
CVE-2006-2026 at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2026
Sun acknowledges with thanks, Tavis Ormandy from the Google Security Team for bringing these issues to our attention.