oss-sec mailing list archives
Re: CVE Request: libtiff: Heap-buffer overflow when processing a TIFF image with PixarLog Compression
From: Kurt Seifried <kseifried () redhat com>
Date: Tue, 25 Sep 2012 10:56:02 -0600
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 09/25/2012 03:06 AM, Huzaifa Sidhpurwala wrote:
On 09/23/2012 08:29 AM, Solar Designer wrote:"libtiff 4.0.3 brings "various memory buffer access fixes". Does it fix more than CVE-2012-3401?" to which I have no answer. The change log does in fact mention "Various memory buffer access fixes." as the very first change listed for libtiff. Perhaps someone should review code changes.I had a look at the libtiff-4.0.3 commit logs and found one issue which seems to bring a possibility of heap-based buffer overflow when using a tiff file with PixarLog compression format. More details at: https://bugzilla.redhat.com/show_bug.cgi?id=860198 Though memory overwrite outside the heap-buffer is only a few bytes, one cannot really overwrite possible arbitrary code execution. Can a CVE id be please assigned to the above flaw? Found two other commits which seemed interesting, but i dont think they could cause arbitrary code execution and i dont want to call them security flaws. 1. OOB read crash tif_packbits.c 2. Memory not properly initialised in tif_fax3.c. Again this one was partly fixed in 4.0.2 and completely fixed in 4.0.3 If anyone else wants to investigate these in more details, please be my guest :) Thanks!
Please use CVE-2012-4447 for this issue. - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://www.enigmail.net/ iQIcBAEBAgAGBQJQYeIiAAoJEBYNRVNeJnmTYxIQAKseYz981VGzSbT/rivo11yc uRwKbp0L37589oNaKbvRR6EhJUJDcOrR4TB7uSSV99DRZb8h50Fe05ZfTul94ws0 bNkFSm3dAA2RhJDN/Zorpz49PODVYUlZCvPOp8gQttQGXBtqvnPG+FIHgApjIYP8 7j2JN+H0fB4ZpgV0JmsDnto/N1mDCTj8S9B70L5gnVSxCo5qaDyV2cis/tyJLaeT oM3sJaJY9RDFXqexWhhCJIdzel/ho8II4aDRaLiCYuqL4kMFE3bun1dpIwDT2CxV bJyxxoI/3els5bslGnxTUWRDkVKSAgK3XfLaytnpAheMBFd2nlOG+6tA2ozoxoxz GZQ1SJd6eSoHkoEGU8XB7q4DS+wKSDXVWeziWI0V2BnaC07Ri08ShsNlav1p/9s3 Yv/PzfzpMjiuRrXdGwP4K5YjaKar0kSY61f7alFP9UdlSX04sDskiKXWPXVWFBoK eHJbZRvDxzut2qO3DTkvISe3ek78V3V7uuUz85FhG5c6vevpoIcW/dGMFgVoWpnW HuhbqaAAljW/m6NzoExaJqUQUO2ppx5g+K7DUtNG6JrYfljB8ygOf6edn+bWqnAj wUPbnQcdoDwLUn2QLBYQ8ZCvOG3yQhdhrYnjoZaqtHPMx6pHoqDaeDhsr2t+FrFS rTedSPpoJtJXefPg46RZ =owEP -----END PGP SIGNATURE-----
Current thread:
- tiff2pdf: Heap-based buffer overflow due to improper initialization of T2P context struct pointer Huzaifa Sidhpurwala (Jul 18)
- Re: tiff2pdf: Heap-based buffer overflow due to improper initialization of T2P context struct pointer Henri Salo (Jul 19)
- Re: tiff2pdf: Heap-based buffer overflow due to improper initialization of T2P context struct pointer Huzaifa Sidhpurwala (Jul 19)
- Re: tiff2pdf: Heap-based buffer overflow due to improper initialization of T2P context struct pointer Solar Designer (Sep 22)
- CVE Request: libtiff: Heap-buffer overflow when processing a TIFF image with PixarLog Compression Huzaifa Sidhpurwala (Sep 25)
- Re: CVE Request: libtiff: Heap-buffer overflow when processing a TIFF image with PixarLog Compression Kurt Seifried (Sep 25)
- Re: CVE Request: libtiff: Heap-buffer overflow when processing a TIFF image with PixarLog Compression Sebastian Krahmer (Sep 25)
- Re: CVE Request: libtiff: Heap-buffer overflow when processing a TIFF image with PixarLog Compression Huzaifa Sidhpurwala (Sep 26)
- Re: CVE Request: libtiff: Heap-buffer overflow when processing a TIFF image with PixarLog Compression Tom Lane (Sep 26)
- CVE Request: libtiff: Heap-buffer overflow when processing a TIFF image with PixarLog Compression Huzaifa Sidhpurwala (Sep 25)
- Re: tiff2pdf: Heap-based buffer overflow due to improper initialization of T2P context struct pointer Henri Salo (Jul 19)