Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2A704EDCB5C64F40AF988060A961492BBB311E@EXMBX-TJ007.tencent.com>
Date: Mon, 26 Sep 2016 05:17:41 +0000
From: pwchen(陈佩文) <pwchen@...cent.com>
To: oss-security <oss-security@...ts.openwall.com>
Subject: CVE-2016-6823 - ImageMagick BMP Coder Out-Of-Bounds Write
 Vulnerability

Hi.

This is PwChen of Tencent's Xuanwu Lab & RayZhong of Tencent's Keen Lab.

During our research, we found an Out-Of-Bounds write vulnerability in
ImageMagick's BMP coders.

When ImageMagick is converting other format to BMP format, it will
pass image's height and width parameter into 'BMP coder'.

There is an arithmetic overflow vulnerability when the BMP coder is
calculating the image size by multiplying the height and width. This
can directly cause an Out-Of-Bounds Write.

The ImageMagick team has fixed the vulnerability we reported.

Attached is a proof of concept.

python -c 'print "P3\x0a14096\x201048576\x0a255\x00"' > PoC.ppm
convert PoC.ppm crash.bmp


Upstream fix:
https://github.com/ImageMagick/ImageMagick/commit/e7094d16cd8aee6bb48cf1d369f617f7edf89993
https://github.com/ImageMagick/ImageMagick/commit/4cc6ec8a4197d4c008577127736bf7985d632323

Debian Bug report:
https://bugs.debian.org/834504


Regards,
Peiwen Chen
Tencent's Xuanwu Lab

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.