AWARE SYSTEMS
TIFF and LibTiff Mail List Archive

Thread

2005.09.28 00:49 "[Tiff] PSP libtiff hack?", by Frank Warmerdam
2005.09.28 02:21 "Re: [Tiff] PSP libtiff hack?", by Joris Van Damme
2005.09.28 04:04 "Re: [Tiff] PSP libtiff hack?", by
2005.09.28 13:50 "Re: [Tiff] PSP libtiff hack?", by Frank Warmerdam
2005.09.28 14:49 "Re: [Tiff] PSP libtiff hack?", by Bob Friesenhahn
2005.09.28 04:20 "Re: [Tiff] PSP libtiff hack?", by Chris Cox
2005.09.28 13:39 "Re: [Tiff] PSP libtiff hack?", by Dmitry V. Levin
2005.10.15 12:43 "[Tiff] Small bug report, and error handler parameter issue", by Joris Van Damme
2005.10.15 16:06 "[Tiff] Re: Small bug report, and error handler parameter issue", by Frank Warmerdam
2005.10.15 16:24 "[Tiff] Re: Small bug report, and error handler parameter issue", by Joris Van Damme
2005.10.15 16:26 "[Tiff] Re: Small bug report, and error handler parameter issue", by Frank Warmerdam
2005.10.15 16:28 "[Tiff] Re: Small bug report, and error handler parameter issue", by Joris Van Damme
2005.12.03 00:19 "[Tiff] possible bug in libtiff 3.7.4", by Joshua Muskovitz
2005.12.03 02:32 "Re: [Tiff] possible bug in libtiff 3.7.4", by Frank Warmerdam
2005.10.20 22:52 "Re: [Tiff] Read EXIF Tag", by Chris Losinger
2005.10.20 01:47 "[Tiff] Read EXIF Tag", by Chris Losinger
2005.10.20 12:34 "Re: [Tiff] Read EXIF Tag", by
2005.10.20 15:26 "Re: [Tiff] Read EXIF Tag", by Frank Warmerdam

2005.09.28 13:50 "Re: [Tiff] PSP libtiff hack?", by Frank Warmerdam

On 9/28/05, edward@sidefx.com <edward@sidefx.com> wrote:

I tried the file in question with TIFFOpen() and it seems to have no problem. That is TIFFOpen() properly identifies it as corrupt and gives up. So I think the vulnerability has already been corrected in the current libtiff.

Hmm... I would like to see valgrind run to be sure though. :)

Edward,

Tried that. :-)

warmerda@gdal2200[4]% vg tiffinfo overflow.tif ==3303== Memcheck, a memory error detector for x86-linux.

==3303== Copyright (C) 2002-2005, and GNU GPL'd, by Julian Seward et al. ==3303== Using valgrind-2.4.0, a program supervision framework for x86-linux.

==3303== Copyright (C) 2000-2005, and GNU GPL'd, by Julian Seward et al.

==3303== For more details, rerun with: -v
==3303==

overflow.tif: Warning, incorrect count for field "BitsPerSample" (16496, expecting 3); tag trimmed. overflow.tif: Error fetching data for field "BitsPerSample".

==3303==
==3303== FILE DESCRIPTORS: 3 open at exit.
==3303== Open file descriptor 2: /dev/pts/3
==3303== <inherited from parent>
==3303==
==3303== Open file descriptor 1: /dev/pts/3
==3303== <inherited from parent>
==3303==
==3303== Open file descriptor 0: /dev/pts/3
==3303== <inherited from parent>
==3303==
==3303==

==3303== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 20 from 1) ==3303== malloc/free: in use at exit: 0 bytes in 0 blocks.

==3303== malloc/free: 5 allocs, 5 frees, 34345 bytes allocated.

==3303== For counts of detected errors, rerun with: -v ==3303== No malloc'd blocks -- no leaks are possible.

Best regards,
--

---------------------------------------+--------------------------------------
I set the clouds in motion - turn up   | Frank Warmerdam, warmerdam@pobox.com
light and sound - activate the windows | http://pobox.com/~warmerdam
and watch the world go round - Rush    | Geospatial Programmer for Rent