Libtiff

Libtiff is a library for reading and writing Tagged Image File Format (abbreviated TIFF) files. The set also contains command line tools for processing TIFFs. It is distributed in source code and can be found as binary builds for all kinds of platforms. The libtiff software was originally written by Sam Leffler while working for Silicon Graphics.

Libtiff
Original author(s)Sam Leffler,
Silicon Graphics
Initial release1988 (1988)
Stable release
4.1.0 / November 3, 2019 (2019-11-03)
Repository
Written inC
LicenseBSD-like licence
Websitesimplesystems.org/libtiff/

Features

Support for BigTIFF, files larger than 4 GiB, was included for Libtiff 4.0.

Exploits

A TIFF file is composed of small descriptor blocks containing offsets into the file which point to a variety of data types. Incorrect offset values can cause programs to attempt to read erroneous portions of the file or attempt to read past the physical end of file. Improperly encoded packet or line lengths within the file can cause rendering programs which lack appropriate boundary checks to overflow their internal buffers.

Multiple buffer overflows have been found in Libtiff.[1][2][3] Some of these have also been used to execute unsigned code on the PlayStation Portable,[4] as well as run third-party applications on the iPhone and iPod Touch firmware.[5]

Website hijacking

Around January 2004, the original libtiff website has been hijacked, after it had disappeared in September 2003 due to ISP problems.[6][7] The libtiff dot org site contains a very outdated mirror of the real site, and much of the information contained therein is incorrect, including the current version number, authors, mailing list address, and the CVS information.

In September 2016, the libtiff maintainers lost control of remotesensing.org/libtiff/,[8] which had been the main site since 2003.

gollark: This is such a bizarre and pointless conversation.
gollark: What did they do, talk about TF2 a bit?
gollark: Yeeeees.
gollark: * hijäcked
gollark: NSA recordings would also be acceptable.

References

  1. libTIFF BitsPerSample Tag Buffer Overflow Vulnerability Release Date:2005-05-11 - Secunia Advisories
  2. Stack-based buffer overflow in libTIFF before 3.7.2 allows remote attackers to execute arbitrary code via a TIFF file with a malformed BitsPerSample tag. - CVE - CVE-2005-1544 (under review) Assigned (20050514)
  3. libTIFF Multiple Vulnerabilities Release Date: 2006-08-02 - Secunia Advisories
  4. Sony PSP TIFF Image Viewing Code Execution Vulnerability Release Date: 2006-08-31 - Secunia Advisories
  5. http://www.macnn.com/articles/07/10/17/iphone.tiff.exploit.detail/
  6. http://www.asmail.be/msg0055472296.html
  7. http://www.asmail.be/msg0054554091.html
  8. McGath, Gary (8 September 2016). "Libtiff goes offline". Mad File Format Science. Archived from the original on 13 April 2019. Retrieved 13 April 2019. It was located at remotesensing.org, a domain whose owner apparently was willing to host it without having any close connection to the project. The domain fell into someone else’s hands, and the content changed completely, breaking all links to Libtiff material.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.