LibTIFF:heap buffer overflow in combineSeparateSamples32bits
Description
LibTIFF This software provides support for the Tag Image File Format (TIFF), a widely used format for storing image data. The latest version of the TIFF specification is available on-line in several different formats.
A heap buffer overflow was found in function combineSeparateSamples32bits in tiffcrop.c,which allows attackers to cause a denial of service via a crafted file.
#tiffcrop $FILE out.tif
=================================================================
==56543==ERROR: AddressSanitizer: heap-buffer-overflow on address
0x61600000fbda at pc 0x00000041171b bp 0x7ffecd216d00 sp 0x7ffecd216cf8
READ of size 1 at 0x61600000fbda thread T0
#0 0x41171a in combineSeparateSamples32bits
/home/haojun/Downloads/testopensourcecode/tiff-4.0.7/tools/tiffcrop.c:4148
#1 0x4158e6 in readSeparateStripsIntoBuffer
/home/haojun/Downloads/testopensourcecode/tiff-4.0.7/tools/tiffcrop.c:4901
#2 0x41ebcb in loadImage
/home/haojun/Downloads/testopensourcecode/tiff-4.0.7/tools/tiffcrop.c:6175
#3 0x40a743 in main
/home/haojun/Downloads/testopensourcecode/tiff-4.0.7/tools/tiffcrop.c:2345
#4 0x7f0aa160bb34 in __libc_start_main (/lib64/libc.so.6+0x21b34)
#5 0x402e28
(/home/haojun/Downloads/testopensourcecode/tiff-4.0.7_build/bin/tiffcrop+0x402e28)
0x61600000fbda is located 0 bytes to the right of 602-byte region
[0x61600000f980,0x61600000fbda)
allocated by thread T0 here:
#0 0x7f0aa23ffbb8 in __interceptor_malloc
../../../../libsanitizer/asan/asan_malloc_linux.cc:62
#1 0x486286 in _TIFFmalloc
/home/haojun/Downloads/testopensourcecode/tiff-4.0.7/libtiff/tif_unix.c:316
#2 0x4150a2 in readSeparateStripsIntoBuffer
/home/haojun/Downloads/testopensourcecode/tiff-4.0.7/tools/tiffcrop.c:4821
#3 0x41ebcb in loadImage
/home/haojun/Downloads/testopensourcecode/tiff-4.0.7/tools/tiffcrop.c:6175
#4 0x40a743 in main
/home/haojun/Downloads/testopensourcecode/tiff-4.0.7/tools/tiffcrop.c:2345
#5 0x7f0aa160bb34 in __libc_start_main (/lib64/libc.so.6+0x21b34)
SUMMARY: AddressSanitizer: heap-buffer-overflow
/home/haojun/Downloads/testopensourcecode/tiff-4.0.7/tools/tiffcrop.c:4148 in
combineSeparateSamples32bits
Shadow bytes around the buggy address:
0x0c2c7fff9f20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c2c7fff9f30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2c7fff9f40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2c7fff9f50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2c7fff9f60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c2c7fff9f70: 00 00 00 00 00 00 00 00 00 00 00[02]fa fa fa fa
0x0c2c7fff9f80: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c2c7fff9f90: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c2c7fff9fa0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c2c7fff9fb0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c2c7fff9fc0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Heap right redzone: fb
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack partial redzone: f4
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==56543==ABORTING
Affected version:4.0.7
Fixed version:N/A
Commit fix:N/A
Credit: ADLab of Venustech.
CVE:N/A
Reproducer:
Timeline:
2017-04-20:bug discovered and reported upstream bugzilla
2017-06-21:blog post about the issue
Permalink:
http://somevulnsofadlab.blogspot.com/2017/06/libtiffheap-buffer-overflow-in.html
评论
发表评论