|  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #65873 Integer overflow in exif_read_data()
Submitted: 2013-10-10 06:39 UTC Modified: 2013-12-16 19:45 UTC
Avg. Score:4.0 ± 0.0
Reproduced:1 of 1 (100.0%)
Same Version:1 (100.0%)
Same OS:0 (0.0%)
From: Assigned: stas
Status: Closed Package: EXIF related
PHP Version: 5.5Git-2013-10-10 (Git) OS: Linux
Private report: No CVE-ID:
 [2013-10-10 06:39 UTC]
exif_read_data() can crash or read data from arbitrary memory locations when presented with a large file with a tag value located before the relevant IFD. 

Throughout exif.c, the pointer offset_base is deliberately assigned a value before the start of its associated buffer. It is a kind of virtual start-of-file pointer -- when you add a file offset to offset_base, you get a pointer to the memory that holds the file data at that offset.

The bug occurs when the IFD offset is larger than the heap address for the file buffer. This only happens when both the heap address is small (e.g. if it is allocated from brk()) and the IFD offset is large. In this case, offset_base wraps around past the start of the address space and becomes a large positive pointer. This is mostly harmless, except for when a tag value is so far before the start of the IFD that its virtual pointer also wraps around to a large positive value. Then in exif_process_IFD_TAG():

if (byte_count > IFDlength || offset_val > IFDlength-byte_count || value_ptr < dir_entry) {

The "value_ptr < dir_entry" condition should be true, because the value is before the IFD in the file, but because value_ptr has wrapped around and dir_entry hasn't, it is false. So this code incorrectly assumes that value_ptr is inside the already-loaded buffer.

Our test file is here: . It was generated innocently, it is not "crafted". 

This bug was originally reported here:

Test script:

The use of brk() for allocation instead of mmap() is required for reproduction, and is more reliable across various systems and builds if the environment variable ZEND_MM_SEG_SIZE=65536 is specified:

ZEND_MM_SEG_SIZE=65536 php -r 'exif_read_data("/path/to/test.tiff");'


Add a Patch

Pull Requests

Pull requests:

Add a Pull Request


AllCommentsChangesGit/SVN commitsRelated reports
 [2013-10-10 22:49 UTC]
Note that this bug originates from the same line of code as bug #60150. The fix for bug #60150 fixed that particular test case, but didn't implement the required logic correctly.
 [2013-12-16 19:45 UTC]
-Status: Open +Status: Closed -Assigned To: +Assigned To: stas
 [2013-12-16 19:45 UTC]
The fix for this bug has been committed.

Snapshots of the sources are packaged every three hours; this change
will be in the next snapshot. You can grab the snapshot at

 For Windows:
Thank you for the report, and for helping us make PHP better.

PHP Copyright © 2001-2014 The PHP Group
All rights reserved.
Last updated: Thu Apr 17 12:01:59 2014 UTC