Blame tests/bugfixes/github/test_CVE_2017_11337.py
|
Packit |
01d647 |
# -*- coding: utf-8 -*-
|
|
Packit |
01d647 |
|
|
Packit |
01d647 |
import system_tests
|
|
Packit |
01d647 |
|
|
Packit |
01d647 |
|
|
Packit |
01d647 |
class TestCvePoC(metaclass=system_tests.CaseMeta):
|
|
Packit |
01d647 |
|
|
Packit |
01d647 |
url = "https://github.com/Exiv2/exiv2/issues/50"
|
|
Packit |
01d647 |
|
|
Packit |
01d647 |
filename = "$data_path/POC3"
|
|
Packit |
01d647 |
commands = ["$exiv2 $filename"]
|
|
Packit |
01d647 |
stdout = [
|
|
Packit |
01d647 |
"""File name : $filename
|
|
Packit |
01d647 |
File size : 28 Bytes
|
|
Packit |
01d647 |
MIME type : image/tiff
|
|
Packit |
01d647 |
Image size : 0 x 0
|
|
Packit |
01d647 |
"""
|
|
Packit |
01d647 |
]
|
|
Packit |
01d647 |
stderr = [
|
|
Packit |
01d647 |
"""Error: Directory Image, entry 0x0144 has invalid size 4294967295*8; skipping entry.
|
|
Packit |
01d647 |
$filename: No Exif data found in the file
|
|
Packit |
01d647 |
"""
|
|
Packit |
01d647 |
]
|
|
Packit |
01d647 |
retval = ["$no_exif_data_found_retval"]
|