-
Notifications
You must be signed in to change notification settings - Fork 294
Description
I was looking at a photo taken with an Android phone this morning and it appeared to trigger an overflow exploit after hitting the comment block.
I know 0.25 is an older version, but I was wondering if this is/was a known issue? A quick search seems to indicate that EXIF exploits were pretty popular last year, but the build I am running is the version currently packaged with Arch Linux. I would not be surprised to learn other distros ship that or even older versions.
~ ❯❯❯ exiv2 pr ~/Downloads/test3.jpg ⏎
File name : /home/[redacted]/Downloads/test3.jpg
File size : 4544798 Bytes
MIME type : image/jpeg
Image size : 5312 x 2988
Camera make : samsung
Camera model : SM-N915G
Image timestamp : 2017:05:19 12:45:36
Image number :
Exposure time : 1/246 s
Aperture : F2.2
Exposure bias : 0 EV
Flash : Fired
Flash bias :
Focal length : 4.8 mm (35 mm equivalent: 31.0 mm)
Subject distance:
ISO speed : 40
Exposure mode : Auto
Metering mode : Multi-segment
Macro mode :
Image quality :
Exif Resolution : 5312 x 2988
White balance : Auto
Thumbnail : image/jpeg, 14701 Bytes
Copyright :
Exif comment :
JKJK :\<§¼^ÞjòïüÌÄÿÿ5"@Ëÿÿ»bÒÿÿ£
ÿÿ¿Û1"!"" "!""p"p!"!" " " " " " "!"1"1" "1"!"!" " " "00 " " " " "!"A"!" """"" " " " " " " " "!"1" """""""""" "0 " ""pA""""""""""0 " " " """"""""""" "`3p 0 """""""" " " " "p 0 "!" " " " " " " " " "000""!"1" " " " "0 " " " " """ " "1"Q3 " " " "0 "00000 "001"`3`3af " " "0000A"0A"A"A"`3`3`3`3af " " "A"Q3Q3A"1"Q3Q3`3af`3`3`3`3 " `ß}l¯ê¬B×{wGðöy4ñRlkkkkkkFAFA|P0pFAFAeÿ/ª ®dåaÿ/qj=¸%ÿ/ý®oÛÙ$ÿ/ېuê$ÿ/9-|Y1"ÿ/"pA"`3`3afafafafqfqfafQ3afafafafSñT
®¾ÿ/ûC/ ÿ/Ût(|5½"ÿ/}Òu*#ÿ/Q¦Üoì_#ÿ/À1jËa#ÿ/õRjÀ7"ÿ/õRjÀ7"ÿ/õRjÀ7"ÿ/õRFAFA.
H
|Z-ìjH
FZpìè3ÜQyjçpÿFAFA®®®®FýC
JÊ J [èèò.8¨ 8W[Õ2$J
SV]*:^[[?1;2c²9
^[[?1;2cþÿÿÿ (ö]ò¼¥¯
òvsùÿÿÿ|
4
J
7
¡kP02596487H16USHA00VM51FFCFDDF80ssois63AH05 63AH05 63AH05 0 2 3
^[[?1;2c^[[?1;2c^[[?1;2c^[[?1;2c^[[?1;2c^[[?1;2c^[[?1;2c^[[?1;2c^[[?1;2c% ~ ❯❯❯ 1;2c1;2c1;2c1;2c1;2c1;2c1;2c1;2c1;2c1;2c1;2c
cd: no such entry in dir stack
zsh: command not found: 2c1
zsh: command not found: 2c1
zsh: command not found: 2c1
zsh: command not found: 2c1
zsh: command not found: 2c1
zsh: command not found: 2c1
zsh: command not found: 2c1
zsh: command not found: 2c1
zsh: command not found: 2c1
zsh: command not found: 2c1
zsh: command not found: 2c
I guess this is mostly gibberish, the payload wasn't crafted for this platform, luckily. But to my eyes this looks like it could be used to successfully perform an exploit.
Building from the github source, I don't see anything anywhere near as scary (just an EXIF comment full of "junk" characters) which makes me wonder whether there was a known fix since 0.25?