You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In the above code, if the value of the col variable exceeds 2064, a stack buffer overflow occurs. The col value is determined by the value of width, but since there is no limit to the value of width, a stack buffer overflow vulnerability occurs.
Hi.
We discovered that the LibRaw/LibRaw@fd63302 vulnerability (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5808), discovered in LibRaw, affects the latest version of dcraw_hack.
System Configuration
FLIF Version: Master branch (commit 0074d6f)
Test environment : Ubuntu 22.04.2 LTS 64bit
Description
FLIF/raw-tools/sony_arw/dcraw.c
Lines 8109 to 8132 in 0074d6f
In the above code, if the value of the col variable exceeds 2064, a stack buffer overflow occurs. The col value is determined by the value of width, but since there is no limit to the value of width, a stack buffer overflow vulnerability occurs.
The vulnerability can be fixed by patching as follows.
Due to issue upload file size limitations, the PoC is shared through Google Drive below.
PoC file : https://drive.google.com/file/d/1s5N0Ao2lAWO73bzVFmP6EMJ5LZ6Efo_Y/view?usp=drive_link
Credit : Seunghoon Woo & Kyeongseok Yang, CCS Lab
The text was updated successfully, but these errors were encountered: