|
Message-ID: <CACG6YS0Q_DcgZ+N9_X1PcdTZ45hkVDe4JYEF-hMaL92b2wh0rw@mail.gmail.com> Date: Wed, 13 Jul 2016 10:05:26 +0200 From: Mathias Svensson <idolf@...gle.com> To: oss-security@...ts.openwall.com Subject: CVE request: Information leak in LibTIFF Hello oss-security, I would like to request a CVE number for an information leak in LibTIFF, specifically in the file libtiff/tif_read.c. The vulnerability allows an attacker to specify a negative index into the file-content buffer and copy data from that position until the end of the buffer. This will allow an attacker to crash the process by accessing unmapped memory and (depending on how LibTIFF is used) might also allow an attacker to leak sensitive information. The issue is fixed in CVS HEAD with the commit: revision 1.49 date: 2016-07-10 20:00:21 +0200; author: erouault; state: Exp; lines: +6 -3; commitid: YhOZoKv5OA9gNNdz; * libtiff/tif_read.c: Fix out-of-bounds read on memory-mapped files in TIFFReadRawStrip1() and TIFFReadRawTile1() when stripoffset is beyond tmsize_t max value (reported by Mathias Svensson) Kinds regards, Mathias Svensson Google Security Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.