From d4e4288d839d0d9546a05986771f8738c382060c Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Dan=20=C4=8Cerm=C3=A1k?= Date: Sat, 7 Oct 2017 23:08:36 +0200 Subject: Fix for CVE-2017-14864, CVE-2017-14862 and CVE-2017-14859 The invalid memory dereference in Exiv2::getULong()/Exiv2::StringValueBase::read()/Exiv2::DataValue::read() is caused further up the call-stack, by v->read(pData, size, byteOrder) in TiffReader::readTiffEntry() passing an invalid pData pointer (pData points outside of the Tiff file). pData can be set out of bounds in the (size > 4) branch where baseOffset() and offset are added to pData_ without checking whether the result is still in the file. As offset comes from an untrusted source, an attacker can craft an arbitrarily large offset into the file. This commit adds a check into the problematic branch, whether the result of the addition would be out of bounds of the Tiff file. Furthermore the whole operation is checked for possible overflows. diff --git a/src/tiffvisitor.cpp b/src/tiffvisitor.cpp index 4ab733d4..ef13542e 100644 --- a/src/tiffvisitor.cpp +++ b/src/tiffvisitor.cpp @@ -47,6 +47,7 @@ EXIV2_RCSID("@(#) $Id$") #include #include #include +#include // ***************************************************************************** namespace { @@ -1517,7 +1518,19 @@ namespace Exiv2 { size = 0; } if (size > 4) { + // setting pData to pData_ + baseOffset() + offset can result in pData pointing to invalid memory, + // as offset can be arbitrarily large + if ((static_cast(baseOffset()) > std::numeric_limits::max() - static_cast(offset)) + || (static_cast(baseOffset() + offset) > std::numeric_limits::max() - reinterpret_cast(pData_))) + { + throw Error(59); + } + if (pData_ + static_cast(baseOffset()) + static_cast(offset) > pLast_) { + throw Error(58); + } pData = const_cast(pData_) + baseOffset() + offset; + + // check for size being invalid if (size > static_cast(pLast_ - pData)) { #ifndef SUPPRESS_WARNINGS EXV_ERROR << "Upper boundary of data for "