Skip to content

Support attacking basic structural binary formats (JUMBF, CBOR) used in c2pa manifests #37

@samuelwenker

Description

@samuelwenker

Both JUMBF and CBOR have numerous binary formatting requirements that could result in buffer overruns if malicious values are set and a memory-unsafe parser is used without appropriate checks.

A couple very simple examples:

  • JUMBF field indicating that its size is longer than the remainder of the entire manifest
  • CBOR array length longer than the number of items in the actual array

As such, attack manifests that have malicious values for these types of things should be included in any security test suite.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions