[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CALx_OUAzXp7rsHTLMp2oEobA88Vtapkgfp2+RZwVCqnbyReZdg@mail.gmail.com>
Date: Mon, 22 Dec 2014 11:48:05 -0800
From: Michal Zalewski <lcamtuf@...edump.cx>
To: Project Zero Labs <labs@...jectzero.gr>
Cc: "fulldisclosure@...lists.org" <fulldisclosure@...lists.org>
Subject: Re: [FD] CVE-2014-9330: Libtiff integer overflow in bmp2tiff
> Fuzzing bmp2tiff, using the afl-fuzzer, revealed an integer overflow issue
> related to the dimensions of the input BMP image.
It's probably worth noting that although the bundled utilities are
pretty buggy, there are also several bugs affecting the libtiff
library itself that can be hit with afl if you clean up the
utility-level bugs first; these affect ImageMagick and any tools that
rely on libtiff to display untrusted images.
I reported some privately to the maintainers few weeks ago (before
your report, in fact), but haven't had a lot of success so far.
There's at least one other person who did the same.
/mz
_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists