|
|
340e69 |
From 7f5b0778fa301b68c1c88e3820ec3afbd09dd0a5 Mon Sep 17 00:00:00 2001
|
|
|
340e69 |
From: clanmills <robin@clanmills.com>
|
|
|
340e69 |
Date: Wed, 27 Sep 2017 09:20:13 +0100
|
|
|
340e69 |
Subject: Fix https://github.com/Exiv2/exiv2/issues/55
|
|
|
340e69 |
|
|
|
340e69 |
(cherry picked from commit 6e3855aed7ba8bb4731fc4087ca7f9078b2f3d97)
|
|
|
340e69 |
|
|
|
340e69 |
diff --git a/include/exiv2/value.hpp b/include/exiv2/value.hpp
|
|
|
340e69 |
index 2078c6bd..b7d76fef 100644
|
|
|
340e69 |
--- a/include/exiv2/value.hpp
|
|
|
340e69 |
+++ b/include/exiv2/value.hpp
|
|
|
340e69 |
@@ -1659,11 +1659,13 @@ namespace Exiv2 {
|
|
|
340e69 |
ok_ = true;
|
|
|
340e69 |
return static_cast<long>(value_[n]);
|
|
|
340e69 |
}
|
|
|
340e69 |
+// #55 crash when value_[n].first == LONG_MIN
|
|
|
340e69 |
+#define LARGE_INT 1000000
|
|
|
340e69 |
// Specialization for rational
|
|
|
340e69 |
template<>
|
|
|
340e69 |
inline long ValueType<Rational>::toLong(long n) const
|
|
|
340e69 |
{
|
|
|
340e69 |
- ok_ = (value_[n].second != 0 && INT_MIN < value_[n].first && value_[n].first < INT_MAX );
|
|
|
340e69 |
+ ok_ = (value_[n].second != 0 && -LARGE_INT < value_[n].first && value_[n].first < LARGE_INT);
|
|
|
340e69 |
if (!ok_) return 0;
|
|
|
340e69 |
return value_[n].first / value_[n].second;
|
|
|
340e69 |
}
|
|
|
340e69 |
@@ -1671,7 +1673,7 @@ namespace Exiv2 {
|
|
|
340e69 |
template<>
|
|
|
340e69 |
inline long ValueType<URational>::toLong(long n) const
|
|
|
340e69 |
{
|
|
|
340e69 |
- ok_ = (value_[n].second != 0);
|
|
|
340e69 |
+ ok_ = (value_[n].second != 0 && value_[n].first < LARGE_INT);
|
|
|
340e69 |
if (!ok_) return 0;
|
|
|
340e69 |
return value_[n].first / value_[n].second;
|
|
|
340e69 |
}
|
|
|
340e69 |
diff --git a/src/basicio.cpp b/src/basicio.cpp
|
|
|
340e69 |
index 95589cd2..f2e1518b 100644
|
|
|
340e69 |
--- a/src/basicio.cpp
|
|
|
340e69 |
+++ b/src/basicio.cpp
|
|
|
340e69 |
@@ -990,6 +990,7 @@ namespace Exiv2 {
|
|
|
340e69 |
DataBuf FileIo::read(long rcount)
|
|
|
340e69 |
{
|
|
|
340e69 |
assert(p_->fp_ != 0);
|
|
|
340e69 |
+ if ( (size_t) rcount > size() ) throw Error(57);
|
|
|
340e69 |
DataBuf buf(rcount);
|
|
|
340e69 |
long readCount = read(buf.pData_, buf.size_);
|
|
|
340e69 |
buf.size_ = readCount;
|
|
|
340e69 |
diff --git a/src/error.cpp b/src/error.cpp
|
|
|
340e69 |
index 80378c19..e90a9c0a 100644
|
|
|
340e69 |
--- a/src/error.cpp
|
|
|
340e69 |
+++ b/src/error.cpp
|
|
|
340e69 |
@@ -106,6 +106,9 @@ namespace {
|
|
|
340e69 |
{ 52, N_("%1 has invalid XMP value type `%2'") }, // %1=key, %2=value type
|
|
|
340e69 |
{ 53, N_("Not a valid ICC Profile") },
|
|
|
340e69 |
{ 54, N_("Not valid XMP") },
|
|
|
340e69 |
+ { 55, N_("tiff directory length is too large") },
|
|
|
340e69 |
+ { 56, N_("invalid type value detected in Image::printIFDStructure") },
|
|
|
340e69 |
+ { 57, N_("invalid memory allocation request") },
|
|
|
340e69 |
};
|
|
|
340e69 |
|
|
|
340e69 |
}
|
|
|
340e69 |
diff --git a/src/image.cpp b/src/image.cpp
|
|
|
340e69 |
index 0d828045..ec5b873e 100644
|
|
|
340e69 |
--- a/src/image.cpp
|
|
|
340e69 |
+++ b/src/image.cpp
|
|
|
340e69 |
@@ -399,7 +399,13 @@ namespace Exiv2 {
|
|
|
340e69 |
;
|
|
|
340e69 |
|
|
|
340e69 |
// if ( offset > io.size() ) offset = 0; // Denial of service?
|
|
|
340e69 |
- DataBuf buf(size*count + pad+20); // allocate a buffer
|
|
|
340e69 |
+
|
|
|
340e69 |
+ // #55 memory allocation crash test/data/POC8
|
|
|
340e69 |
+ long long allocate = (long long) (size*count + pad+20);
|
|
|
340e69 |
+ if ( allocate > (long long) io.size() ) {
|
|
|
340e69 |
+ throw Error(57);
|
|
|
340e69 |
+ }
|
|
|
340e69 |
+ DataBuf buf(allocate); // allocate a buffer
|
|
|
340e69 |
std::memcpy(buf.pData_,dir.pData_+8,4); // copy dir[8:11] into buffer (short strings)
|
|
|
340e69 |
if ( count*size > 4 ) { // read into buffer
|
|
|
340e69 |
size_t restore = io.tell(); // save
|