|
Message-ID: <5094044B.7090400@redhat.com> Date: Fri, 02 Nov 2012 11:35:07 -0600 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com CC: Huzaifa Sidhpurwala <huzaifas@...hat.com> Subject: Re: libtiff: Missing return value check in ppm2tiff leading to heap-buffer overflow when reading a tiff file -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 11/02/2012 04:23 AM, Huzaifa Sidhpurwala wrote: > Hi All, > > A flaw was found in the way ppm2tiff, a tool to create a TIFF file > from PPM, PGM and PBM image files, did not check the return value > of TIFFScanlineSize() function. When TIFFScanlineSize encountered > an integer-overflow and returned zero, this value was not checked. > A remote attacker could provide a specially-crafted PPM image > format file, that when processed by ppm2tiff would lead to ppm2tiff > executable crash or, potentially, arbitrary code execution with the > privileges of the user running the ppm2tiff binary. > > Reference: https://bugzilla.redhat.com/show_bug.cgi?id=871700 Just for the sake of clarity, this was previously assigned CVE-2012-4564. - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBAgAGBQJQlARKAAoJEBYNRVNeJnmTKWoP/iMzL9crn2SK2AVd7k6DEdRE 4+4qBiljbyolgn7PPhOVST/1CWq2C09MBToDdyiThLwEbaDI/OCWlmeQjPz/K5dS SZ3pEhDJuH4hdwpKb1jR3AnE6i2Ukv+uAHG6PshdX7TyvVf8AnAGsASOT9AEVqsl F0uVd/0GXfKO+wJBxmedNUPLJLnQI4vkFBaUYxscKRQ97mN2ffvHumpovNjBsZpZ jy+tG1o0rZsNJ8coSuqRkj06Jz00dD9+I2ip+jTX10HKwksmPB6tft/TO7G6FRxh gvxuRRGmqThZFuK/LmfLt0U7L9xSMhUY4Iz5Hf7emmc5EL5dsdUp53a8cAVLZQTa qM64eYAXti88v4yj6l+ID3mb28hlX0wK7ARKDoKpsu84bJ1cr4UVQj0L53Fsl+7z gfem0r0OZj21JS3uxKyF9Wu6Nd0Qviugaw1q720y117AuM1nYy/PKdt/HVxgZjEg 5uFfVM9vUV73J1CwS6zIPMmKUxvk/O/78j2+IJdVznA0pLawTFkhbPJXWVR6b+/B HmKK04m/Ij0VDK1EwlaQYRq6lun+1a0HyF35vylLtraAZ8LVYdITHc2sHQYPu7lb iISka81hzyAR35wPr5tUo6CY/FEFy91/cw/eVKCiBY1XeIeChG/7IcUAPI9QmayE nYrINymCTmfXqbmOvaFb =86UH -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.