oss-sec mailing list archives

Re: DoS in libtiff


From: Gustavo Grieco <gustavo.grieco () gmail com>
Date: Wed, 23 Sep 2015 12:35:00 +0200

2015-09-22 22:52 GMT+02:00 <cve-assign () mitre org>:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

We found a DoS using a crafted tiff file that causes a OOM kill

If you run it with ltrace, you can see some very large reallocs

Use CVE-2015-7313.


Thanks! I got some interesting response from upstream:

"FYI, the file has a # of image lines around four billion.  I didn't dig
into it
closely when first reported, but it might be that auto-strip-chopping is
creating an expensive/large data structure.

I'm not entirely confident whether to treat library requests for large
amounts
of memory as a defect in the library.  It makes me sad that modern operating
systems seem to have trouble just return NULL for malloc() calls for which
there isn't enough memory available.  (If my assumptions are correct)."

Current thread: