Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CACG6YS0Q_DcgZ+N9_X1PcdTZ45hkVDe4JYEF-hMaL92b2wh0rw@mail.gmail.com>
Date: Wed, 13 Jul 2016 10:05:26 +0200
From: Mathias Svensson <idolf@...gle.com>
To: oss-security@...ts.openwall.com
Subject: CVE request: Information leak in LibTIFF

Hello oss-security,

I would like to request a CVE number for an information leak in LibTIFF,
specifically in the file libtiff/tif_read.c.

The vulnerability allows an attacker to specify a negative index into the
file-content buffer and copy data from that position until the end of the
buffer.

This will allow an attacker to crash the process by accessing unmapped
memory and (depending on how LibTIFF is used) might also allow an attacker
to leak sensitive information.

The issue is fixed in CVS HEAD with the commit:

revision 1.49
date: 2016-07-10 20:00:21 +0200;  author: erouault;  state: Exp;  lines: +6
-3;  commitid: YhOZoKv5OA9gNNdz;
* libtiff/tif_read.c: Fix out-of-bounds read on
memory-mapped files in TIFFReadRawStrip1() and TIFFReadRawTile1()
when stripoffset is beyond tmsize_t max value (reported by
Mathias Svensson)


Kinds regards,
Mathias Svensson
Google Security Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.