[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] Re: DoS in libtiff
From:       Gustavo Grieco <gustavo.grieco () gmail ! com>
Date:       2015-09-23 10:35:00
Message-ID: CACn5sdRXukTcKXKcnUt_xPNPPJ7nVeb1HRi+7poJoBu1d1GnNA () mail ! gmail ! com
[Download RAW message or body]


2015-09-22 22:52 GMT+02:00 <cve-assign@mitre.org>:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
> > We found a DoS using a crafted tiff file that causes a OOM kill
>
> > If you run it with ltrace, you can see some very large reallocs
>
> Use CVE-2015-7313.
>

Thanks! I got some interesting response from upstream:

"FYI, the file has a # of image lines around four billion.  I didn't dig
into it
closely when first reported, but it might be that auto-strip-chopping is
creating an expensive/large data structure.

I'm not entirely confident whether to treat library requests for large
amounts
of memory as a defect in the library.  It makes me sad that modern operating
systems seem to have trouble just return NULL for malloc() calls for which
there isn't enough memory available.  (If my assumptions are correct)."


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic