LittleCMS vulnerabilities (OpenJDK, Firefox, GIMP, etc. impacted)
- To: full-disclosure <full-disclosure@xxxxxxxxxxxxxxxxx>, bugtraq@xxxxxxxxxxxxxxxxx
- Subject: LittleCMS vulnerabilities (OpenJDK, Firefox, GIMP, etc. impacted)
- From: Chris Evans <scarybeasts@xxxxxxxxx>
- Date: Thu, 19 Mar 2009 19:24:43 -0700
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:date:message-id:subject :from:to:content-type:content-transfer-encoding; bh=jX+U9VhwLxy44+m0l/MkWhn92Y4Qhnk82YAZacUIruI=; b=FsC3M2RAEx02dFPi1XxYPYNN5mOWIeSxjrvpd1MHfh/OD+h1KzJzI+CA3RfZ1oH/nY wRpUzQD+j3KxsKkWZ6U1A77B1wcRPOpIQuVAvvTliYBHzZudpoTgZZ3exmJcxlm6j6Ia YkCKdjDZXzkUoDdteIPCy9UbpmX2gDnmj9ZFk=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type :content-transfer-encoding; b=L77RS8V844Uo9FJniU3CffJ5yN83WT0YuTKbvbXNmVkveVdGS3jMqjypgHLh6zvvYg l/npfi0XK1HLH+tGguLtW+2VOy56EjUIzJIWOBGNT5wRv7C7qzohpsDvHtnCeWJipCyf VUBFyJlnwsigfpsbwQpGu81JvNfZbLgt7Mc04=
- List-help: <mailto:bugtraq-help@securityfocus.com>
- List-id: <bugtraq.list-id.securityfocus.com>
- List-post: <mailto:bugtraq@securityfocus.com>
- List-subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
- List-unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
- Mailing-list: contact bugtraq-help@xxxxxxxxxxxxxxxxx; run by ezmlm
Hi,
LittleCMS (or lcms) prior to v1.18beta2 contains various integer
overflow, buffer overflow and memory leak errors. At least one of
these bugs is a stack-based buffer overflow which is good for
arbitrary code execution. I have an exploit that works on my
Ubuntu-8.10 laptop but am holding off on releasing it just yet.
The most serious bug is a stack-based buffer overflow in
ReadSetOfCurves() in cmsio1.c. With some code paths, validation of the
number of channels in the ICC profile is not performed. This leads to
an overflow of the "Curves" stack buffer. The overflow data is not
arbitrarily user controlled; it's pointers to heap chunks where the
attacker has partial control over the contents of the heap chunks.
That's good enough for an exploit on many systems.
Full technical details: http://scary.beasts.org/security/CESA-2009-003.html
Blog post:
http://scarybeastsecurity.blogspot.com/2009/03/littlecms-vulnerabilities.html
The blog post goes into a little more detail on which attack surfaces
LittleCMS is present, and which system-level defenses mitigate this
vulnerability.
Cheers
Chris