A boundary error within the "parsetiffifd()" function (internal/dcraw_common.cpp) in LibRaw versions before 0.18.2 can be exploited to cause a memory corruption via e.g. a specially crafted KDC file with model set to "DSLR-A100" and containing multiple sequences of 0x100 and 0x14A TAGs.
[
{
"signature_version": "v1",
"id": "CVE-2017-6887-07f0dd62",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"330483907310885657851638621784502241594",
"98297358945102826810003107118541587412",
"13538086109817097211732976274570932189",
"140070819662391359961719678473990694994",
"40273550911795736478718628460633290601",
"242256858762420658105829523284864040693",
"157899024790148287550800316389812572087",
"222565264877867960609186580260913843692",
"40686553183327440519215951091695956570",
"230815494714399470105896906696210971826",
"201572566780869375995244731736247661949",
"145021184640497432325317046080675481440"
]
},
"target": {
"file": "internal/dcraw_common.cpp"
},
"source": "https://github.com/libraw/libraw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251",
"deprecated": false
},
{
"signature_version": "v1",
"id": "CVE-2017-6887-345db300",
"signature_type": "Function",
"digest": {
"length": 836.0,
"function_hash": "223952729540945911801236471202363549232"
},
"target": {
"file": "dcraw/dcraw.c",
"function": "parse_jpeg"
},
"source": "https://github.com/libraw/libraw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251",
"deprecated": false
},
{
"signature_version": "v1",
"id": "CVE-2017-6887-3bf7c58f",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"330483907310885657851638621784502241594",
"98297358945102826810003107118541587412",
"13538086109817097211732976274570932189",
"140070819662391359961719678473990694994",
"40273550911795736478718628460633290601",
"242256858762420658105829523284864040693",
"157899024790148287550800316389812572087",
"222565264877867960609186580260913843692",
"40686553183327440519215951091695956570",
"230815494714399470105896906696210971826",
"201572566780869375995244731736247661949",
"145021184640497432325317046080675481440"
]
},
"target": {
"file": "dcraw/dcraw.c"
},
"source": "https://github.com/libraw/libraw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251",
"deprecated": false
},
{
"signature_version": "v1",
"id": "CVE-2017-6887-62aafd68",
"signature_type": "Function",
"digest": {
"length": 31716.0,
"function_hash": "270558865765251762118260754155532321526"
},
"target": {
"file": "dcraw/dcraw.c",
"function": "parse_tiff_ifd"
},
"source": "https://github.com/libraw/libraw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251",
"deprecated": false
},
{
"signature_version": "v1",
"id": "CVE-2017-6887-70b33685",
"signature_type": "Function",
"digest": {
"length": 836.0,
"function_hash": "223952729540945911801236471202363549232"
},
"target": {
"file": "internal/dcraw_common.cpp",
"function": "parse_jpeg"
},
"source": "https://github.com/libraw/libraw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251",
"deprecated": false
},
{
"signature_version": "v1",
"id": "CVE-2017-6887-78c14c72",
"signature_type": "Function",
"digest": {
"length": 31716.0,
"function_hash": "270558865765251762118260754155532321526"
},
"target": {
"file": "internal/dcraw_common.cpp",
"function": "parse_tiff_ifd"
},
"source": "https://github.com/libraw/libraw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251",
"deprecated": false
}
]