You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The vulnerable function stbi_jpeg_load_from_memory in file O2ImageDecoder_JPEG_libjpeg.m is used to decompress jpegs and create a raw bitmap version of the image.
In stbi_jpeg_load_from_memory, the values for cinfo.image_width and cinfo.image_height are retrieved directly from a jpeg file's header.
cinfo.image_width and cinfo.image_height can be manipulated by editing the header of the jpeg file being processed. They are two bytes each in the image's header so their values can range from 0x0000 to 0xFFFF. These variables are multiplied by wantedPixelSize which has a value of 4.
An attacker is in control of the image's height, width, and contents. This allows an attacker to craft an exploit to overwrite data in memory with data they control.
The text was updated successfully, but these errors were encountered:
The vulnerable function
stbi_jpeg_load_from_memory
in file O2ImageDecoder_JPEG_libjpeg.m is used to decompress jpegs and create a raw bitmap version of the image.In
stbi_jpeg_load_from_memory
, the values forcinfo.image_width
andcinfo.image_height
are retrieved directly from a jpeg file's header.cinfo.image_width
andcinfo.image_height
can be manipulated by editing the header of the jpeg file being processed. They are two bytes each in the image's header so their values can range from 0x0000 to 0xFFFF. These variables are multiplied bywantedPixelSize
which has a value of 4.When these three values are multiplied together they can exceed the limit of a 32-bit unsigned integer, leading to an integer overflow vulnerability. This product is used to set the size of the
outputImage
buffer, which will store the decompressed jpeg. When the sizing arguments overflow, the buffer becomes too small to store the decompressed data.The program writes the decompressed image to the buffer using the
jpeg_read_scanlines
function. If an integer overflow occurs, the function ends up writing to out-of-bounds memory due to the buffer's small size. This causes data in memory adjacent to the buffer to be overwritten.An attacker is in control of the image's height, width, and contents. This allows an attacker to craft an exploit to overwrite data in memory with data they control.
The text was updated successfully, but these errors were encountered: