summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorStanislav Malyshev <stas@php.net>2019-04-29 23:38:12 -0700
committerStanislav Malyshev <stas@php.net>2019-04-30 00:05:23 -0700
commitf80ad18afae2230c2c1802c7d829100af646874e (patch)
treee96da8354d3cb7700061b859a87580e3581795f9
parent6c631ccfef94f93259d474682f8bfa803e163c87 (diff)
downloadphp-git-f80ad18afae2230c2c1802c7d829100af646874e.tar.gz
Fix bug #77950 - Heap-buffer-overflow in _estrndup via exif_process_IFD_TAG
I do not completely understand what is going on there, but I am pretty sure dir_entry <= offset_base if not a normal situation, so we better not to rely on such dir_entry.
-rw-r--r--NEWS11
-rw-r--r--ext/exif/exif.c2
-rw-r--r--ext/exif/tests/bug77950.phpt12
-rw-r--r--ext/exif/tests/bug77950.tiffbin0 -> 1267 bytes
4 files changed, 22 insertions, 3 deletions
diff --git a/NEWS b/NEWS
index f529a71116..70ad9a7a6f 100644
--- a/NEWS
+++ b/NEWS
@@ -2,13 +2,20 @@ PHP NEWS
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
?? ??? 2019, PHP 7.1.29
+- EXIF
+. Fixed bug #77950 (Heap-buffer-overflow in _estrndup via exif_process_IFD_TAG).
+ (CVE-2019-11036) (Stas)
+- Mail
+. Fixed bug #77821 (Potential heap corruption in TSendMail()). (cmb)
04 Apr 2019, PHP 7.1.28
- EXIF:
- . Fixed bug #77753 (Heap-buffer-overflow in php_ifd_get32s). (Stas)
- . Fixed bug #77831 (Heap-buffer-overflow in exif_iif_add_value). (Stas)
+ . Fixed bug #77753 (Heap-buffer-overflow in php_ifd_get32s). (CVE-2019-11034)
+ (Stas)
+ . Fixed bug #77831 (Heap-buffer-overflow in exif_iif_add_value).
+ (CVE-2019-11035) (Stas)
- SQLite3:
. Added sqlite3.defensive INI directive. (BohwaZ)
diff --git a/ext/exif/exif.c b/ext/exif/exif.c
index a763f6c77b..d174def80c 100644
--- a/ext/exif/exif.c
+++ b/ext/exif/exif.c
@@ -2891,7 +2891,7 @@ static int exif_process_IFD_TAG(image_info_type *ImageInfo, char *dir_entry, cha
offset_base is ImageInfo->file.list[sn].data-dir_offset
dir_entry - offset_base is dir_offset+2+i*12
*/
- if (byte_count > IFDlength || offset_val > IFDlength-byte_count || value_ptr < dir_entry || offset_val < (size_t)(dir_entry-offset_base)) {
+ if (byte_count > IFDlength || offset_val > IFDlength-byte_count || value_ptr < dir_entry || offset_val < (size_t)(dir_entry-offset_base) || dir_entry <= offset_base) {
/* It is important to check for IMAGE_FILETYPE_TIFF
* JPEG does not use absolute pointers instead its pointers are
* relative to the start of the TIFF header in APP1 section. */
diff --git a/ext/exif/tests/bug77950.phpt b/ext/exif/tests/bug77950.phpt
new file mode 100644
index 0000000000..dc0f3549cb
--- /dev/null
+++ b/ext/exif/tests/bug77950.phpt
@@ -0,0 +1,12 @@
+--TEST--
+Bug #77950 (Heap-buffer-overflow in _estrndup via exif_process_IFD_TAG)
+--SKIPIF--
+<?php if (!extension_loaded('exif')) print 'skip exif extension not available';?>
+--FILE--
+<?php
+exif_read_data(__DIR__."/bug77950.tiff");
+?>
+DONE
+--EXPECTF--
+%A
+DONE \ No newline at end of file
diff --git a/ext/exif/tests/bug77950.tiff b/ext/exif/tests/bug77950.tiff
new file mode 100644
index 0000000000..5c8250ab04
--- /dev/null
+++ b/ext/exif/tests/bug77950.tiff
Binary files differ