Tuesday, January 23rd 2018
Google and Mozilla Push for AV1 Image Format Adoption, Beats JPEG and HEIC
Google and Mozilla, the companies behind the Chrome and Firefox cross-platform web-browsers; are pushing for the adoption of a new web image format to replace the ageing and inefficient JPEG, and the license-ridden HEIC. The two companies are leading a consortium of Internet businesses, called the Alliance for Open Media, to push for the proliferation and standardization of the new AV1 image file format. Early testing shows AV1 files to be 15 percent smaller than HEIC for comparable quality, which in turn promises half the file-size of JPEG for comparable quality. Apple uses HEIC as the default image file format for iOS and MacOS, while JPEG, PNG, and GIF continue to be the dominant web image formats, and have been prevalent for over two decades now.
"It seems downright silly that we're still relying on compression tech from 20 years ago," said Kelly Thompson, general manager at 500px, a photo sharing and sales site. "The equipment we're using to capture and display images is now exceeding JPEG's upper limits." JPEG is not just inefficient, but also has severe color palette limitations, and lack of support for transparency. Adoption of newer image file formats could significantly reduce Internet bandwidth usage benefiting both end-users running on slower/metered connections; and for infrastructure providers, such as ISPs.
Source:
CNet
"It seems downright silly that we're still relying on compression tech from 20 years ago," said Kelly Thompson, general manager at 500px, a photo sharing and sales site. "The equipment we're using to capture and display images is now exceeding JPEG's upper limits." JPEG is not just inefficient, but also has severe color palette limitations, and lack of support for transparency. Adoption of newer image file formats could significantly reduce Internet bandwidth usage benefiting both end-users running on slower/metered connections; and for infrastructure providers, such as ISPs.
48 Comments on Google and Mozilla Push for AV1 Image Format Adoption, Beats JPEG and HEIC
JPEG is extremely lossy, but flexible and pretty efficient. I'm curious how this compares.
Download current page (save complete to your disk), according to my word processor main article + some comments = 15600 symbols and spaces, ok Unicode is double byte and add little extra html and we got 71 kilobytes. Now lets see to supplemental folder for our nice HTML: 52k of images and 939k of CSS/JS/BS... 1 Mbyte per 20 paragraphs of text and 5 simple ad pictures.
And youtube...
Sure JPG is old and consumes so much traffic...
The web is a separate mess ;)
If you people can't tell the difference, I give up. Because I just don't know how to explain it any better.
Edit: Usually if you do not "put in proper bounds checking code" your program will simply segfault and crash. It takes a highly skilled/calculated overflow to provoke an intentional execution outside your designated address space.
The image may contain the code to remove all the internet from existence; it doesn't matter. The image cannot execute that code. There needs to be another party that points to that code and commands its execution.
Bug is right. There was an exploit in the XP image handler (and it was REALLY misdesigned) way back when but there has not been one in a very very long time since.
PS: I'm actually a programmer. Nothing to do with the image handler, I assure you. Everything to do with it's millions of ways it can be exploited due to be an insecure browser (think javascript).
Yet again, nothing to do with image formats.
Edit: @dorsetknob instead of liking @trparky 's every post just because he agrees with you, do yourself a favor and read about these things. I guarantee it won't be time wasted.
new image file format and there does exist the potential for malicious payload to be embedded.
Someone or some Agency is or will consider exploring that potential. ( its not unfounded Speculation But unfortunatly a reasonable Expectation)
Who knows (probably the 5 eyes and friends) what exploits are out there in various O/S waiting for hidden payload(s) to exploit
And finally A Sarcastic thanks for suggesting how my like/thanks should be Post awarded
PNG Embedded – Malicious payload hidden in a PNG file
ImageTragick
Adobe Photoshop CS6 - '.png' Parsing Heap Overflow
MS15-024: Vulnerability in PNG processing could allow information disclosure: March 10, 2015
PNG Shortcut Silent Exploit
Beware! You Can Get Hacked Just by Opening a 'JPEG 2000' Image
Stegosploit: Owned by a JPG
Need I go on? Those are all exploits that can get you just by opening a seemingly innocent image file.
What's that sound? Oh yeah... that's the sound of me p0wning you.
Apple O/S Attack Vector just found
Other noteworthy bugs include CVE-2018-4094, a bug in both Sierra and High Sierra discovered by five researchers at Yonsei University in Seoul, South Korea. The memory corruption bug allows remote code execution attacks simply by processing a maliciously crafted audio file. :roll::roll::roll:o_O
Any poorly written decoder, regardless of data being provided, can be a security hole... and honestly, if you're using something like ImageMagick, you would be getting exactly what you deserve because, it's trash. :)
I am fully aware that there is a difference between the image format the rendering engines that take said image formats and convert them into something us humans can see on our screens. Like, DUH! I'm just pointing out that there have been multiple occasions where someone got something very wrong while parsing said file and it ended up doing something bad. I tend to read the security bulletins when patches are released because, well... just because. Some of them really have sent my palm to my forehead while saying "How the hell did they mess this one up?" to myself.
As for ImageMagick, you do know that ImageMagick is module that is often used on servers combined with PHP to process image uploads. Right? Heck, this site right here probably uses ImageMagick on the backend to resize images. All it would take is someone to upload a malicious image file and the server on which this site is running would be exploited.