CVE-2024-48854

5.3 MEDIUM

📋 TL;DR

An off-by-one error in the TIFF image codec in QNX SDP versions 8.0, 7.1, and 7.0 could allow an unauthenticated attacker to cause information disclosure in the context of the process using the image codec. This affects systems running vulnerable QNX SDP versions that process TIFF images.

💻 Affected Systems

Products:
  • QNX Software Development Platform (SDP)
Versions: 8.0, 7.1, 7.0
Operating Systems: QNX Neutrino RTOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable when processing TIFF images. Systems not using TIFF image processing are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive memory contents from the process handling the TIFF image could be disclosed, potentially revealing credentials, keys, or other confidential data.

🟠

Likely Case

Limited information disclosure from the process memory space, potentially exposing non-critical data or causing application instability.

🟢

If Mitigated

No impact if TIFF image processing is disabled or systems are patched.

🌐 Internet-Facing: MEDIUM - If TIFF image processing is exposed to untrusted sources, attackers could trigger the vulnerability remotely.
🏢 Internal Only: LOW - Requires TIFF image processing from untrusted sources within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires crafting a malicious TIFF image to trigger the off-by-one error. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://support.blackberry.com/pkb/s/article/140334

Restart Required: Yes

Instructions:

1. Review the BlackBerry advisory. 2. Apply the recommended patches from QNX. 3. Restart affected systems. 4. Verify the patch is applied correctly.

🔧 Temporary Workarounds

Disable TIFF image processing

all

Prevent TIFF images from being processed by the vulnerable codec

Configuration depends on specific application usage - consult QNX documentation

Input validation for TIFF images

all

Implement strict validation of TIFF images before processing

Implement file validation in applications using TIFF processing

🧯 If You Can't Patch

  • Isolate systems from untrusted TIFF image sources
  • Implement network segmentation to limit exposure

🔍 How to Verify

Check if Vulnerable:

Check QNX SDP version using 'uname -a' or system documentation. Versions 8.0, 7.1, or 7.0 are vulnerable.

Check Version:

uname -a

Verify Fix Applied:

Verify patch installation through QNX package management and confirm version is no longer vulnerable.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing TIFF images
  • Memory access violations in TIFF processing

Network Indicators:

  • Unexpected TIFF image transfers to vulnerable systems

SIEM Query:

Search for application crashes related to TIFF processing or memory access violations

🔗 References

📤 Share & Export