php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #65873 Integer overflow in exif_read_data()
Submitted: 2013-10-10 06:39 UTC Modified: 2013-12-16 19:45 UTC
Votes:1
Avg. Score:4.0 ± 0.0
Reproduced:1 of 1 (100.0%)
Same Version:1 (100.0%)
Same OS:0 (0.0%)
From: tstarling@php.net Assigned: stas (profile)
Status: Closed Package: EXIF related
PHP Version: 5.5Git-2013-10-10 (Git) OS: Linux
Private report: No CVE-ID: None
 [2013-10-10 06:39 UTC] tstarling@php.net
Description:
------------
exif_read_data() can crash or read data from arbitrary memory locations when presented with a large file with a tag value located before the relevant IFD. 

Throughout exif.c, the pointer offset_base is deliberately assigned a value before the start of its associated buffer. It is a kind of virtual start-of-file pointer -- when you add a file offset to offset_base, you get a pointer to the memory that holds the file data at that offset.

The bug occurs when the IFD offset is larger than the heap address for the file buffer. This only happens when both the heap address is small (e.g. if it is allocated from brk()) and the IFD offset is large. In this case, offset_base wraps around past the start of the address space and becomes a large positive pointer. This is mostly harmless, except for when a tag value is so far before the start of the IFD that its virtual pointer also wraps around to a large positive value. Then in exif_process_IFD_TAG():

if (byte_count > IFDlength || offset_val > IFDlength-byte_count || value_ptr < dir_entry) {

The "value_ptr < dir_entry" condition should be true, because the value is before the IFD in the file, but because value_ptr has wrapped around and dir_entry hasn't, it is false. So this code incorrectly assumes that value_ptr is inside the already-loaded buffer.

Our test file is here: https://noc.wikimedia.org/~reedy/segfault.tar.gz . It was generated innocently, it is not "crafted". 

This bug was originally reported here: https://bugzilla.wikimedia.org/show_bug.cgi?id=55541

Test script:
---------------
exif_read_data("/path/to/test.tiff");

The use of brk() for allocation instead of mmap() is required for reproduction, and is more reliable across various systems and builds if the environment variable ZEND_MM_SEG_SIZE=65536 is specified:

ZEND_MM_SEG_SIZE=65536 php -r 'exif_read_data("/path/to/test.tiff");'



Patches

Pull Requests

Pull requests:

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2013-10-10 22:49 UTC] tstarling@php.net
Note that this bug originates from the same line of code as bug #60150. The fix for bug #60150 fixed that particular test case, but didn't implement the required logic correctly.
 [2013-12-16 19:45 UTC] stas@php.net
-Status: Open +Status: Closed -Assigned To: +Assigned To: stas
 [2013-12-16 19:45 UTC] stas@php.net
The fix for this bug has been committed.

Snapshots of the sources are packaged every three hours; this change
will be in the next snapshot. You can grab the snapshot at
http://snaps.php.net/.

 For Windows:

http://windows.php.net/snapshots/
 
Thank you for the report, and for helping us make PHP better.


 [2014-07-29 21:57 UTC] johannes@php.net
Automatic comment on behalf of stas
Revision: http://git.php.net/?p=php-src.git;a=commit;h=eca037a51dd007032c9ef28bd931e02863e6440d
Log: Fix bug #65873 - Integer overflow in exif_read_data()
 [2014-08-14 15:34 UTC] johannes@php.net
Automatic comment on behalf of stas
Revision: http://git.php.net/?p=php-src.git;a=commit;h=eca037a51dd007032c9ef28bd931e02863e6440d
Log: Fix bug #65873 - Integer overflow in exif_read_data()
 [2014-08-14 19:32 UTC] dmitry@php.net
Automatic comment on behalf of stas
Revision: http://git.php.net/?p=php-src.git;a=commit;h=eca037a51dd007032c9ef28bd931e02863e6440d
Log: Fix bug #65873 - Integer overflow in exif_read_data()
 [2014-10-07 23:14 UTC] stas@php.net
Automatic comment on behalf of stas
Revision: http://git.php.net/?p=php-src-security.git;a=commit;h=eca037a51dd007032c9ef28bd931e02863e6440d
Log: Fix bug #65873 - Integer overflow in exif_read_data()
 [2014-10-07 23:16 UTC] stas@php.net
Automatic comment on behalf of stas
Revision: http://git.php.net/?p=php-src-security.git;a=commit;h=cbcf6e1880e35ed7cd052e127b037eee7cef61c9
Log: Fix bug #65873 - Integer overflow in exif_read_data()
 [2014-10-07 23:25 UTC] stas@php.net
Automatic comment on behalf of stas
Revision: http://git.php.net/?p=php-src-security.git;a=commit;h=eca037a51dd007032c9ef28bd931e02863e6440d
Log: Fix bug #65873 - Integer overflow in exif_read_data()
 [2014-10-07 23:27 UTC] stas@php.net
Automatic comment on behalf of stas
Revision: http://git.php.net/?p=php-src-security.git;a=commit;h=cbcf6e1880e35ed7cd052e127b037eee7cef61c9
Log: Fix bug #65873 - Integer overflow in exif_read_data()
 
PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Thu Nov 21 10:01:29 2024 UTC