Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 25 Sep 2012 10:56:02 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Huzaifa Sidhpurwala <huzaifas@...hat.com>
Subject: Re: CVE Request: libtiff: Heap-buffer overflow when
 processing a TIFF image with PixarLog Compression

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 09/25/2012 03:06 AM, Huzaifa Sidhpurwala wrote:
> On 09/23/2012 08:29 AM, Solar Designer wrote:
> 
>> "libtiff 4.0.3 brings "various memory buffer access fixes". Does
>> it fix more than CVE-2012-3401?"
>> 
>> to which I have no answer.  The change log does in fact mention 
>> "Various memory buffer access fixes." as the very first change
>> listed for libtiff.  Perhaps someone should review code changes.
>> 
> 
> I had a look at the libtiff-4.0.3 commit logs and found one issue
> which seems to bring a possibility of heap-based buffer overflow
> when using a tiff file with PixarLog compression format.
> 
> More details at: 
> https://bugzilla.redhat.com/show_bug.cgi?id=860198
> 
> Though memory overwrite outside the heap-buffer is only a few
> bytes, one cannot really overwrite possible arbitrary code
> execution.
> 
> Can a CVE id be please assigned to the above flaw?
> 
> Found two other commits which seemed interesting, but i dont think 
> they could cause arbitrary code execution and i dont want to call 
> them security flaws.
> 
> 1. OOB read crash tif_packbits.c 2. Memory not properly initialised
> in tif_fax3.c. Again this one was partly fixed in 4.0.2 and
> completely fixed in 4.0.3
> 
> If anyone else wants to investigate these in more details, please
> be my guest :)
> 
> Thanks!
> 

Please use CVE-2012-4447 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://www.enigmail.net/
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=owEP
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ