j***@gmail.com
2018-07-22 12:24:32 UTC
Hello all,
I maintain an image processing library that supports HDR files. We've
been fuzzing it to find bugs, and HDR is one of the ones that seems
vulnerable to attack.
The obvious one is the globmatch() function in header.c -- during file
read, it expands into a 64-byte buffer here:
https://radiance-online.org/cgi-bin/viewcvs.cgi/ray/src/common/header.c?view=markup#l231
It's easy to make an HDR file which would overwrite this and let an
attacker take control of the user's machine (I think), since that
buffer is usually allocated on the stack.
Does this sound like something that should be fixed? I could try to
cook up a patch, if it would be useful.
John
I maintain an image processing library that supports HDR files. We've
been fuzzing it to find bugs, and HDR is one of the ones that seems
vulnerable to attack.
The obvious one is the globmatch() function in header.c -- during file
read, it expands into a 64-byte buffer here:
https://radiance-online.org/cgi-bin/viewcvs.cgi/ray/src/common/header.c?view=markup#l231
It's easy to make an HDR file which would overwrite this and let an
attacker take control of the user's machine (I think), since that
buffer is usually allocated on the stack.
Does this sound like something that should be fixed? I could try to
cook up a patch, if it would be useful.
John