Alert: RAW File Security Issue

luke_churchluke_church Registered Users Posts: 507 Major grins
edited March 17, 2007 in Digital Darkroom
Hi All,

This applies esp. to Macs but the advice in red also to every other platform that handles RAW files (Photoshop, DxO, IrfanView etc. etc.)...

Apple's latest security fix (or litany of fixes: 2007-003) includes a patch to a potential vulnerability in processing RAW files that I discovered whilst doing some security research.

A brief discussion of the issue can be found here:

http://lukechurch.blogspot.com/2007/03/beware-of-raw-files.html

Headline message: Patch your computer, and then beware of RAW files that you can't completly trust.

If you have to handle RAW files from people who you can't fully trust, contact me and I'll discuss what you could do about the problem...

Apple's disclosure can be found here:

http://docs.info.apple.com/article.html?artnum=61798

Relevant bits copied below

CVE-ID: CVE-2007-0733
Available for: Mac OS X v10.4 through Mac OS X v10.4.8, Mac OS X Server v10.4 through Mac OS X Server v10.4.8
Impact: Viewing a maliciously-crafted RAW Image may lead to an unexpected application termination or arbitrary code execution
Description: A memory corruption issue exists in the process of handling RAW images. By enticing a user to open a maliciously-crafted image, an attacker can trigger the issue which may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue by performing additional validation of RAW images. This issue does not affect systems prior to Mac OS X v10.4. Credit to Luke Church of the Computer Laboratory, University of Cambridge, for reporting this issue.

By patching your machine, you not only help yourself, but also help to protect the general community. Please do it when you can. :)

Be safe....

Luke
«1

Comments

  • SystemSystem Registered Users Posts: 8,186 moderator
    edited March 13, 2007
    That's a rather nefarious plot. Thanks for the info.
  • luke_churchluke_church Registered Users Posts: 507 Major grins
    edited March 14, 2007
    truth wrote:
    That's a rather nefarious plot.

    Thanks, we do our best mwink.gif
  • gusgus Registered Users Posts: 16,209 Major grins
    edited March 14, 2007
    ne·far·i·ous (nə-fâr'ē-əs) pron.gif
    adj. Infamous by way of being extremely wicked.
    [Latin nefārius, from nefās, crime, transgression : ne-, not + fās, divine law.]
    nefariously ne·far'i·ous·ly adv.
    nefariousness ne·far'i·ous·ness n.
  • cabbeycabbey Registered Users Posts: 1,053 Major grins
    edited March 15, 2007
    buffer overrun?
    SmugMug Sorcerer - Engineering Team Champion for Commerce, Finance, Security, and Data Support
    http://wall-art.smugmug.com/
  • luke_churchluke_church Registered Users Posts: 507 Major grins
    edited March 16, 2007
    cabbey wrote:
    buffer overrun?

    Varies depending on the target platform.

    The MacOS memory manipulation issue is rather more subtle than that, but I'm not going to release any details as to what the error was in case someone decides to try to exploit it.
  • AndyAndy Registered Users Posts: 50,016 Major grins
    edited March 16, 2007
    bump
  • DoctorItDoctorIt Administrators Posts: 11,951 moderator
    edited March 16, 2007
    and that solidifies it: I ain't touchin anyone else's RAW files! eek7.gif
    Erik
    moderator of: The Flea Market [ guidelines ]


  • dogwooddogwood Registered Users Posts: 2,572 Major grins
    edited March 16, 2007
    DoctorIt wrote:
    and that solidifies it: I ain't touchin anyone else's RAW files! eek7.gif

    Oh, you can touch them, just not on a Mac. :D

    Portland, Oregon Photographer Pete Springer
    website blog instagram facebook g+

  • wxwaxwxwax Registered Users Posts: 15,471 Major grins
    edited March 16, 2007
    Talk about an esoteric attack.

    How many people or companies use RAW files not shot by themselves?
    Sid.
    Catapultam habeo. Nisi pecuniam omnem mihi dabis, ad caput tuum saxum immane mittam
    http://www.mcneel.com/users/jb/foghorn/ill_shut_up.au
  • Shay StephensShay Stephens Registered Users Posts: 3,165 Major grins
    edited March 16, 2007
    Interesting find Luke! I have a question. Is this a vulnerability that is Mac only and specific, or is there a chance it could happen with a windows machine or even (gasp) linux by changing something? How specific is the exploit, if you know?
    Creator of Dgrin's "Last Photographer Standing" contest
    "Failure is feedback. And feedback is the breakfast of champions." - fortune cookie
  • AndyAndy Registered Users Posts: 50,016 Major grins
    edited March 16, 2007
    Interesting find Luke! I have a question. Is this a vulnerability that is Mac only and specific, or is there a chance it could happen with a windows machine or even (gasp) linux by changing something? How specific is the exploit, if you know?
    Linux boxes in Orange and Rockland Counties are particularly vulnerable naughty.gif
  • DavidTODavidTO Registered Users, Retired Mod Posts: 19,160 Major grins
    edited March 16, 2007
    Are you saying that the latest update fixes the issue? IOW, if I'm updated to 10.4.9, is the RAW security hole patched?
    Moderator Emeritus
    Dgrin FAQ | Me | Workshops
  • Shay StephensShay Stephens Registered Users Posts: 3,165 Major grins
    edited March 16, 2007
    Andy wrote:
    Linux boxes in Orange and Rockland Counties are particularly vulnerable naughty.gif

    That is way to specific...they are finally after me! To the bunkers!!! eek7.gif
    Creator of Dgrin's "Last Photographer Standing" contest
    "Failure is feedback. And feedback is the breakfast of champions." - fortune cookie
  • DavidTODavidTO Registered Users, Retired Mod Posts: 19,160 Major grins
    edited March 16, 2007
    That is way to specific...they are finally after me! To the bunkers!!! eek7.gif


    Pack plenty of lattes.
    Moderator Emeritus
    Dgrin FAQ | Me | Workshops
  • Shay StephensShay Stephens Registered Users Posts: 3,165 Major grins
    edited March 16, 2007
    DavidTO wrote:
    Pack plenty of lattes.

    10,000 packets of freeze-dried latte mix...check thumb.gif
    Creator of Dgrin's "Last Photographer Standing" contest
    "Failure is feedback. And feedback is the breakfast of champions." - fortune cookie
  • luke_churchluke_church Registered Users Posts: 507 Major grins
    edited March 16, 2007
    wxwax wrote:
    Talk about an esoteric attack.

    I respectfully disagree.

    1. Whilst this isn't a very common usage, it suffers from a serious social engineering attack: 'Here's an image file (which most people assume are a 'safe' format), for you to look at'. We can even arrange it so that the preview looks valid, then as soon as you open it, we own your machine. Whilst this isn't very common, it's easy to trick people into performing...

    E.g. someone claims to be sending you in that format for any number of specious reasons, such as quality, proof of originality etc. Or just genuinely asking for help.

    In the most extreme case we can make the preview look like soft-pornography. This has a dramatic effect on uptake see the Anna-Kornakova (or however you spell it) virus.

    2. The serious problem is that Apple went and built the functionality into their OS. If it had been a 3rd party only exploit then it could only have been used for directed attacks due to the epidemology of population where less than 1% of the machines are vulnerable, unfortunately as MacOS built it into the platform, that's a 5% attack base for free.

    I have no idea what they have done with their server platform as I don't have a MacOS server to test. I also have no idea what-so-ever why RAW viewing code should be running on a server, I seriously hope it wasn't in the default build. But I hope not, and at least they've now fixed the issue....
    How many people or companies use RAW files not shot by themselves?

    So hopefully you see, that whilst I agree with you that the answer is not many, the social engineering potential means that this answer doesn't matter in order to make this exploit dangerous....

    The other issue is that we're beginning to see increasingly targetted attacks against companies, unless people apply the patch and the issue becomes known this would be an ideal vector as people consider RAW files to be 'safe'...

    Luke
  • luke_churchluke_church Registered Users Posts: 507 Major grins
    edited March 16, 2007
    Interesting find Luke!

    Thanks.
    I have a question. Is this a vulnerability that is Mac only and specific

    Absolutely not. :-(
    or is there a chance it could happen with a windows machine

    I reported related issues to over 10 different organisations, many on the Windows platform. Most of the issues are still outstanding. As I suggested in my blog post, many of the companies do not have a security response procedure, so it's unlikely that this vulnerability will be fixed in their products anytime soon. E.g. Many don't have a way of distributing patches. Attacks of greater severity have been demoed on Windows + 3rd party App test machines.

    The reasons I'm telling people this now is that anyone trying to exploit the issue maliciously now has enough information to search for the problem, so the race has already started and it's now an issue of how quickly can we get the majoirty of machines patched before they start trying to exploit things... (if they do)

    And ideally let the people who handle dubious RAW files know quickly, so that the 'targetted attack' issue is diminshed in severity as well...
    or even (gasp) linux by changing something?

    Sure. I have not seen any evidence that Linux platforms aren't vulnerable. Apple were you unique in that they went and built the issue into the default build of their OS, but that's the only thing that's different about them. (Oh and they've released a patch. thumb.gif to them for that)
    How specific is the exploit, if you know?

    So in summary, the exploit is fairly specific as almost all exploits are, but there is strong evidence of related vulnerabilities in every platform that I tested. Patching status is variable, with some organisations not replying to my emails, some organisations replying and then I hear nothing from them and some patching the issues.

    I would assume that all platforms and all 3rd party RAW processing code is vulnerable, unless you have any reason to think otherwise.

    I can't really state which patches have fixed which problems, but I would **strongly advise people to patch their 3rd party RAW processing engines** if a patch is available.

    Does that help?
  • luke_churchluke_church Registered Users Posts: 507 Major grins
    edited March 16, 2007
    DavidTO wrote:
    Are you saying that the latest update fixes the issue? IOW, if I'm updated to 10.4.9, is the RAW security hole patched?

    It's my belief that the patch fixes Apple's RAW hole.

    However I don't have an Apple box to test stuff on and Apple declined to lend me one.

    It is always possible that the patch is only a partial one, but my current understanding is that Apple believe that the patch fixes the issues in MacOS.

    If you view your RAW files in another application, e.g. Photoshop, then it's entirely possible that the issue has not been completly resolved.
  • DavidTODavidTO Registered Users, Retired Mod Posts: 19,160 Major grins
    edited March 16, 2007
    It's my belief that the patch fixes Apple's RAW hole.

    However I don't have an Apple box to test stuff on and Apple declined to lend me one.

    It is always possible that the patch is only a partial one, but my current understanding is that Apple believe that the patch fixes the issues in MacOS.

    If you view your RAW files in another application, e.g. Photoshop, then it's entirely possible that the issue has not been completly resolved.


    thumb.gif

    Thanks, Luke!
    Moderator Emeritus
    Dgrin FAQ | Me | Workshops
  • luke_churchluke_church Registered Users Posts: 507 Major grins
    edited March 16, 2007
    Andy wrote:
    Linux boxes in Orange and Rockland Counties are particularly vulnerable naughty.gif

    deal.gif

    Laughing.gif, good to see the sense of humour is still going strong Andy :D
  • Shay StephensShay Stephens Registered Users Posts: 3,165 Major grins
    edited March 16, 2007
    Ok, how about this then? If I get an untrusted RAW file, I could open it in a virtual machine, if it were a malicious RAW, it might hose the virtual machine, but could not touch the host machine. Does that sound right? Would that be a good way to mitigate the problem for now until there is a fix?
    Creator of Dgrin's "Last Photographer Standing" contest
    "Failure is feedback. And feedback is the breakfast of champions." - fortune cookie
  • wxwaxwxwax Registered Users Posts: 15,471 Major grins
    edited March 16, 2007
    I respectfully disagree.

    1. Whilst this isn't a very common usage,
    Hi Luke wave.gif

    This is my point. It isn't common usage, so a low probablility vulnerability. Pretty strange way to attack folks, not likely to get much penetration.

    e-mailing RAW files isn't easy to do, they tend to be rather large and many e-mail systems will reject them for reasons of file size. BTDT
    Sid.
    Catapultam habeo. Nisi pecuniam omnem mihi dabis, ad caput tuum saxum immane mittam
    http://www.mcneel.com/users/jb/foghorn/ill_shut_up.au
  • luke_churchluke_church Registered Users Posts: 507 Major grins
    edited March 16, 2007
    Ok, how about this then? If I get an untrusted RAW file, I could open it in a virtual machine, if it were a malicious RAW, it might hose the virtual machine, but could not touch the host machine. Does that sound right? Would that be a good way to mitigate the problem for now until there is a fix?

    This is my recomended solution. You then have to be careful to prevent cross-VM leakage/attacks (e.g. shared file spaces are a common target). You probably want to then throw your VM away, i.e. reboot it without commiting changes to the undo disk.

    This is the way I am advising people who have to handle any suspect files to deal with them.

    Essentially you're just assuming that the RAW file is a program, so viewing it executes that program. Then assume that it's trashed your VM, just as a hostile program could, and if your VM environment is remotely worth it's salt (e.g. Xen, VMWare or MS VPC) you're still OK.

    That's the way I do my testing....
  • Shay StephensShay Stephens Registered Users Posts: 3,165 Major grins
    edited March 16, 2007
    This is my recomended solution. You then have to be careful to prevent cross-VM leakage/attacks (e.g. shared file spaces are a common target). You probably want to then throw your VM away, i.e. reboot it without commiting changes to the undo disk.

    This is the way I am advising people who have to handle any suspect files to deal with them.

    Essentially you're just assuming that the RAW file is a program, so viewing it executes that program. Then assume that it's trashed your VM, just as a hostile program could, and if your VM environment is remotely worth it's salt (e.g. Xen, VMWare or MS VPC) you're still OK.

    That's the way I do my testing....

    Perfect! This is fantastic, thank you a billion times.
    Creator of Dgrin's "Last Photographer Standing" contest
    "Failure is feedback. And feedback is the breakfast of champions." - fortune cookie
  • luke_churchluke_church Registered Users Posts: 507 Major grins
    edited March 16, 2007
    wxwax wrote:
    Hi Luke wave.gif

    Hi wave.gif
    This is my point. It isn't common usage, so a low probablility vulnerability. Pretty strange way to attack folks, not likely to get much penetration.

    I agree that it isn't a common usage, I disagree that that makes it low enough probability not to worry.

    I'm not claiming that the world is going to end. But there are a number of factors that make this more serious than might generally be the case, and I don't think I agree with your analysis
    e-mailing RAW files isn't easy to do, they tend to be rather large and many e-mail systems will reject them for reasons of file size. BTDT

    I guess we're going to have to agree to disagree.

    -> We've seen attacks dealing with far more obscure files than RAW files that achieved substantial damage. And this is even worse than many of them, on many platforms you don't even have to open the damn things, just viewing a folder that contains one of the compromised files triggers the thumbnailer to kick in, and the attack is launched.

    -> emailing RAW files is only hard because of their size. We don't necessarily have to ship full RAW files in order to exploit the problem, even if we do, we might be able to pad them with a highly systematic pattern than a ZIP compressor would pack away to nothing.

    -> emailing links can be made to work rather well. Phisers don't seem to be doing too badly...

    -> The social engineering vector for this attack is unusally strong due to its nature of an image file. It's no where near as bad as the JPEG issues were, but we're dealing with a far less professional group of developers than we were back then.

    I refuse to gamble on low pentration these days, we've been wrong so many times that it's just a daft game to play (IMHO).
  • DavidTODavidTO Registered Users, Retired Mod Posts: 19,160 Major grins
    edited March 16, 2007
    Is part of your point, Luke, that the RAW file could be disguised as another type of file altogether?
    Moderator Emeritus
    Dgrin FAQ | Me | Workshops
  • Shay StephensShay Stephens Registered Users Posts: 3,165 Major grins
    edited March 16, 2007
    DavidTO wrote:
    Is part of your point, Luke, that the RAW file could be disguised as another type of file altogether?

    I think what he means is that the raw file itself can hide an executable.
    Creator of Dgrin's "Last Photographer Standing" contest
    "Failure is feedback. And feedback is the breakfast of champions." - fortune cookie
  • DavidTODavidTO Registered Users, Retired Mod Posts: 19,160 Major grins
    edited March 16, 2007
    I think what he means is that the raw file itself can hide an executable.


    Yep. But my question is more about the discussion he's having with Waxy. I mean, I NEVER get RAW files from untrusted sources. Never.

    BUT: I could easily get a file that I thought was something else...
    Moderator Emeritus
    Dgrin FAQ | Me | Workshops
  • luke_churchluke_church Registered Users Posts: 507 Major grins
    edited March 16, 2007
    DavidTO wrote:
    Yep. But my question is more about the discussion he's having with Waxy. I mean, I NEVER get RAW files from untrusted sources. Never.

    The question is that if you did get one would your procedures be OK. E.g. would you save it in a folder and then view that folder in a program that can preview RAW files?
    BUT: I could easily get a file that I thought was something else...

    The files can hide in a few ways. Compressed file packages (zip, gzip etc), and behind URLs are the most common ones.

    You probably don't want to rely on not getting such a file, people don't generally test to get things right first time when there's someone else (an attacker) trying every trick in the psychologists book to try and make them get it wrong. Eliminating the vulnerability through a combination of technical means and safe procedures is the way to go.

    So the answer to your question isn't a simple one. It rather depends on the level of hiding one might expect...
  • wxwaxwxwax Registered Users Posts: 15,471 Major grins
    edited March 16, 2007
    Luke, thanks for the careful and detailed responses, it's much appreciated. I've learned new stuff by reading this discussion. thumb.gif
    Sid.
    Catapultam habeo. Nisi pecuniam omnem mihi dabis, ad caput tuum saxum immane mittam
    http://www.mcneel.com/users/jb/foghorn/ill_shut_up.au
Sign In or Register to comment.