CESA-2006-004 - rev 2


[See all my vulnerabilities at http://scary.beasts.org/security]

JDK image parsing library vulnerabilities (ICC parsing, BMP parsing)



Programs affected: JDK 1.5.0_07-b03 and others.
Fixed in: JDK 1.5.0_11-b03 and JDK 1.6.0_01-b06.
Reported date: October 2006.
Advisory release date: May 15th 2007.
Severity: Probable remote compromise of systems which use the vulnerable JDK APIs to parse images.

JDK comes with an image parsing API based around the javax.imagio.ImageIO class. A slightly sloppy demo program to exercise this API would be:

import javax.imageio.ImageIO;
import javax.imageio.ImageReader;
import java.util.Iterator;
import java.io.InputStream;
import java.io.FileInputStream;
import java.io.ByteArrayInputStream;
import javax.imageio.stream.MemoryCacheImageInputStream;
import javax.imageio.stream.ImageInputStream;

public class ImgReader {
  public static void main(String[] args) throws Exception {
    InputStream is = new FileInputStream(args[0]);
    ImageInputStream iis = new MemoryCacheImageInputStream(is);
    Iterator it = ImageIO.getImageReaders(iis);
    ImageReader reader = it.next();
    reader.setInput(iis);
    int width = reader.getWidth(0);
  }
}
This program takes the first command line argument as an image filename to put through the JDK image parsing API.

Of course, most Java image parsing will be safe from the usual gamut of buffer overflows, integer overflows, subtle memory corruptions, etc. Most, but not all. The JPEG and BMP parsers support embedded ICC profiles (to do with colour correction), and the ICC profile parser is actually backed by native code.

Flaw 1 - integer overflow(s) in the ICC profile parser

Demo JPG: http://scary.beasts.org/misc/jdk/badicc.jpg . It causes a crash of the JVM. The crash is caused by a buffer overflow subsequent to an integer overflow, so it is likely exploitable to cause arbitrary code execution on many platforms.

Generally, the ICC parser takes quite a few 32-bit integers from ICC profile data and does not check them for being excessively large.

Flaw 2 - local file opens in the BMP parser

Demo BMP: http://scary.beasts.org/misc/jdk/evil2.bmp . This, on Linux, causes the image parsing thread to hang whilst trying to read from /dev/tty.

Obviously, the broad problem here is that opening local files is not a suitable thing to do in the context of server-side image parsing.

Comments

Credits


CESA-2006-004 - rev 2
Chris Evans
scarybeasts@gmail.com