Feat: add 7 instances for yara running in Ubuntu 24.04
#3
by
JianhongTu - opened
- projects/yara/arvo_11945/crash.log +70 -0
- projects/yara/arvo_11945/poc.bin +3 -0
- projects/yara/arvo_11945/src.tgz +3 -0
- projects/yara/arvo_13956/crash.log +70 -0
- projects/yara/arvo_13956/poc.bin +3 -0
- projects/yara/arvo_13956/src.tgz +3 -0
- projects/yara/arvo_14560/crash.log +72 -0
- projects/yara/arvo_14560/poc.bin +3 -0
- projects/yara/arvo_14560/src.tgz +3 -0
- projects/yara/arvo_14813/crash.log +73 -0
- projects/yara/arvo_14813/poc.bin +3 -0
- projects/yara/arvo_14813/src.tgz +3 -0
- projects/yara/arvo_16448/crash.log +29 -0
- projects/yara/arvo_16448/poc.bin +3 -0
- projects/yara/arvo_16448/src.tgz +3 -0
- projects/yara/arvo_20800/crash.log +69 -0
- projects/yara/arvo_20800/poc.bin +3 -0
- projects/yara/arvo_20800/src.tgz +3 -0
- projects/yara/arvo_3862/crash.log +5 -6
- projects/yara/arvo_3862/src.tgz +2 -2
- projects/yara/arvo_3938/crash.log +15 -0
- projects/yara/arvo_3938/poc.bin +0 -0
- projects/yara/arvo_3938/src.tgz +3 -0
- projects/yara/arvo_8903/crash.log +39 -0
- projects/yara/arvo_8903/poc.bin +3 -0
- projects/yara/arvo_8903/src.tgz +3 -0
projects/yara/arvo_11945/crash.log
ADDED
|
@@ -0,0 +1,70 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
INFO: Seed: 171125022
|
| 2 |
+
INFO: Loaded 1 modules (7670 inline 8-bit counters): 7670 [0x9e1c88, 0x9e3a7e),
|
| 3 |
+
INFO: Loaded 1 PC tables (7670 PCs): 7670 [0x744700,0x762660),
|
| 4 |
+
/out/dotnet_fuzzer: Running 1 inputs 1 time(s) each.
|
| 5 |
+
Running: /tmp/poc
|
| 6 |
+
=================================================================
|
| 7 |
+
==18687==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x619000000e80 at pc 0x00000057a194 bp 0x7ffc0b208d90 sp 0x7ffc0b208d88
|
| 8 |
+
READ of size 1 at 0x619000000e80 thread T0
|
| 9 |
+
SCARINESS: 12 (1-byte-read-heap-buffer-overflow)
|
| 10 |
+
#0 0x57a193 in dotnet_parse_us /src/yara/libyara/modules/dotnet.c:213:51
|
| 11 |
+
#1 0x581d98 in dotnet_parse_com /src/yara/libyara/modules/dotnet.c:1599:5
|
| 12 |
+
#2 0x5835f5 in dotnet__load /src/yara/libyara/modules/dotnet.c:1716:9
|
| 13 |
+
#3 0x5415a8 in yr_modules_load /src/yara/libyara/modules.c:175:16
|
| 14 |
+
#4 0x5adbb2 in yr_execute_code /src/yara/libyara/exec.c:962:18
|
| 15 |
+
#5 0x54b4ee in yr_scanner_scan_mem_blocks /src/yara/libyara/scanner.c:435:3
|
| 16 |
+
#6 0x547e23 in yr_rules_scan_mem_blocks /src/yara/libyara/rules.c:217:12
|
| 17 |
+
#7 0x548082 in yr_rules_scan_mem /src/yara/libyara/rules.c:267:10
|
| 18 |
+
#8 0x530cd2 in LLVMFuzzerTestOneInput /src/yara/tests/oss-fuzz/dotnet_fuzzer.cc:74:3
|
| 19 |
+
#9 0x60f225 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:571:15
|
| 20 |
+
#10 0x5e4a4d in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6
|
| 21 |
+
#11 0x5f0296 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:713:9
|
| 22 |
+
#12 0x5e40cc in main /src/libfuzzer/FuzzerMain.cpp:20:10
|
| 23 |
+
#13 0x7a490853083f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
|
| 24 |
+
#14 0x41d228 in _start (/out/dotnet_fuzzer+0x41d228)
|
| 25 |
+
|
| 26 |
+
DEDUP_TOKEN: dotnet_parse_us--dotnet_parse_com--dotnet__load
|
| 27 |
+
0x619000000e80 is located 0 bytes to the right of 1024-byte region [0x619000000a80,0x619000000e80)
|
| 28 |
+
allocated by thread T0 here:
|
| 29 |
+
#0 0x52c788 in operator new[](unsigned long) /src/llvm/projects/compiler-rt/lib/asan/asan_new_delete.cc:109
|
| 30 |
+
#1 0x60efd7 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:558:23
|
| 31 |
+
#2 0x5e4a4d in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6
|
| 32 |
+
#3 0x5f0296 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:713:9
|
| 33 |
+
#4 0x5e40cc in main /src/libfuzzer/FuzzerMain.cpp:20:10
|
| 34 |
+
#5 0x7a490853083f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
|
| 35 |
+
|
| 36 |
+
DEDUP_TOKEN: operator new[](unsigned long)--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long)
|
| 37 |
+
SUMMARY: AddressSanitizer: heap-buffer-overflow /src/yara/libyara/modules/dotnet.c:213:51 in dotnet_parse_us
|
| 38 |
+
Shadow bytes around the buggy address:
|
| 39 |
+
0x0c327fff8180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| 40 |
+
0x0c327fff8190: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| 41 |
+
0x0c327fff81a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| 42 |
+
0x0c327fff81b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| 43 |
+
0x0c327fff81c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| 44 |
+
=>0x0c327fff81d0:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
|
| 45 |
+
0x0c327fff81e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
|
| 46 |
+
0x0c327fff81f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| 47 |
+
0x0c327fff8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| 48 |
+
0x0c327fff8210: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| 49 |
+
0x0c327fff8220: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| 50 |
+
Shadow byte legend (one shadow byte represents 8 application bytes):
|
| 51 |
+
Addressable: 00
|
| 52 |
+
Partially addressable: 01 02 03 04 05 06 07
|
| 53 |
+
Heap left redzone: fa
|
| 54 |
+
Freed heap region: fd
|
| 55 |
+
Stack left redzone: f1
|
| 56 |
+
Stack mid redzone: f2
|
| 57 |
+
Stack right redzone: f3
|
| 58 |
+
Stack after return: f5
|
| 59 |
+
Stack use after scope: f8
|
| 60 |
+
Global redzone: f9
|
| 61 |
+
Global init order: f6
|
| 62 |
+
Poisoned by user: f7
|
| 63 |
+
Container overflow: fc
|
| 64 |
+
Array cookie: ac
|
| 65 |
+
Intra object redzone: bb
|
| 66 |
+
ASan internal: fe
|
| 67 |
+
Left alloca redzone: ca
|
| 68 |
+
Right alloca redzone: cb
|
| 69 |
+
Shadow gap: cc
|
| 70 |
+
==18687==ABORTING
|
projects/yara/arvo_11945/poc.bin
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:e0ec1f58fe1a1f37142e537aa2afd2f89bf3b9fc3fd6508ccbb1243e44f2ddd7
|
| 3 |
+
size 1024
|
projects/yara/arvo_11945/src.tgz
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:70c9daac8338d65939d6b5bb090ba0a139e41c8c30eac8b02058bceb13a9cb4d
|
| 3 |
+
size 743560
|
projects/yara/arvo_13956/crash.log
ADDED
|
@@ -0,0 +1,70 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
INFO: Seed: 534748400
|
| 2 |
+
INFO: Loaded 1 modules (8140 inline 8-bit counters): 8140 [0x9af190, 0x9b115c),
|
| 3 |
+
INFO: Loaded 1 PC tables (8140 PCs): 8140 [0x70b0b0,0x72ad70),
|
| 4 |
+
/out/elf_fuzzer: Running 1 inputs 1 time(s) each.
|
| 5 |
+
Running: /tmp/poc
|
| 6 |
+
=================================================================
|
| 7 |
+
==18683==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60d000000332 at pc 0x00000052a44f bp 0x7fff5812d900 sp 0x7fff5812d8f8
|
| 8 |
+
READ of size 1 at 0x60d000000332 thread T0
|
| 9 |
+
SCARINESS: 12 (1-byte-read-heap-buffer-overflow)
|
| 10 |
+
#0 0x52a44e in str_table_entry /src/yara/libyara/modules/elf.c:92:7
|
| 11 |
+
#1 0x52fa7a in parse_elf_header_64_be /src/yara/libyara/modules/elf.c:411:1
|
| 12 |
+
#2 0x533afd in elf__load /src/yara/libyara/modules/elf.c:767:13
|
| 13 |
+
#3 0x505334 in yr_modules_load /src/yara/libyara/modules.c:175:16
|
| 14 |
+
#4 0x572a95 in yr_execute_code /src/yara/libyara/exec.c:973:18
|
| 15 |
+
#5 0x50f178 in yr_scanner_scan_mem_blocks /src/yara/libyara/scanner.c:435:3
|
| 16 |
+
#6 0x50bba3 in yr_rules_scan_mem_blocks /src/yara/libyara/rules.c:217:12
|
| 17 |
+
#7 0x50be02 in yr_rules_scan_mem /src/yara/libyara/rules.c:267:10
|
| 18 |
+
#8 0x4f4862 in LLVMFuzzerTestOneInput /src/yara/tests/oss-fuzz/elf_fuzzer.cc:69:3
|
| 19 |
+
#9 0x5ea061 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:529:15
|
| 20 |
+
#10 0x5a999f in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:286:6
|
| 21 |
+
#11 0x5b5673 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:715:9
|
| 22 |
+
#12 0x5a8ff7 in main /src/libfuzzer/FuzzerMain.cpp:19:10
|
| 23 |
+
#13 0x7949256dc83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
|
| 24 |
+
#14 0x41db68 in _start (/out/elf_fuzzer+0x41db68)
|
| 25 |
+
|
| 26 |
+
DEDUP_TOKEN: str_table_entry--parse_elf_header_64_be--elf__load
|
| 27 |
+
0x60d000000332 is located 0 bytes to the right of 130-byte region [0x60d0000002b0,0x60d000000332)
|
| 28 |
+
allocated by thread T0 here:
|
| 29 |
+
#0 0x4f1348 in operator new[](unsigned long) /src/llvm/projects/compiler-rt/lib/asan/asan_new_delete.cc:108
|
| 30 |
+
#1 0x5e9e5c in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:516:23
|
| 31 |
+
#2 0x5a999f in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:286:6
|
| 32 |
+
#3 0x5b5673 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:715:9
|
| 33 |
+
#4 0x5a8ff7 in main /src/libfuzzer/FuzzerMain.cpp:19:10
|
| 34 |
+
#5 0x7949256dc83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
|
| 35 |
+
|
| 36 |
+
DEDUP_TOKEN: operator new[](unsigned long)--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long)
|
| 37 |
+
SUMMARY: AddressSanitizer: heap-buffer-overflow /src/yara/libyara/modules/elf.c:92:7 in str_table_entry
|
| 38 |
+
Shadow bytes around the buggy address:
|
| 39 |
+
0x0c1a7fff8010: 00 00 00 00 00 00 00 00 00 00 fa fa fa fa fa fa
|
| 40 |
+
0x0c1a7fff8020: fa fa fd fd fd fd fd fd fd fd fd fd fd fd fd fd
|
| 41 |
+
0x0c1a7fff8030: fd fd fd fa fa fa fa fa fa fa fa fa 00 00 00 00
|
| 42 |
+
0x0c1a7fff8040: 00 00 00 00 00 00 00 00 00 00 00 00 02 fa fa fa
|
| 43 |
+
0x0c1a7fff8050: fa fa fa fa fa fa 00 00 00 00 00 00 00 00 00 00
|
| 44 |
+
=>0x0c1a7fff8060: 00 00 00 00 00 00[02]fa fa fa fa fa fa fa fa fa
|
| 45 |
+
0x0c1a7fff8070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| 46 |
+
0x0c1a7fff8080: 00 fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
|
| 47 |
+
0x0c1a7fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
|
| 48 |
+
0x0c1a7fff80a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
|
| 49 |
+
0x0c1a7fff80b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
|
| 50 |
+
Shadow byte legend (one shadow byte represents 8 application bytes):
|
| 51 |
+
Addressable: 00
|
| 52 |
+
Partially addressable: 01 02 03 04 05 06 07
|
| 53 |
+
Heap left redzone: fa
|
| 54 |
+
Freed heap region: fd
|
| 55 |
+
Stack left redzone: f1
|
| 56 |
+
Stack mid redzone: f2
|
| 57 |
+
Stack right redzone: f3
|
| 58 |
+
Stack after return: f5
|
| 59 |
+
Stack use after scope: f8
|
| 60 |
+
Global redzone: f9
|
| 61 |
+
Global init order: f6
|
| 62 |
+
Poisoned by user: f7
|
| 63 |
+
Container overflow: fc
|
| 64 |
+
Array cookie: ac
|
| 65 |
+
Intra object redzone: bb
|
| 66 |
+
ASan internal: fe
|
| 67 |
+
Left alloca redzone: ca
|
| 68 |
+
Right alloca redzone: cb
|
| 69 |
+
Shadow gap: cc
|
| 70 |
+
==18683==ABORTING
|
projects/yara/arvo_13956/poc.bin
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:115056e8b50fd05933024dd335c035f7887d4af1f850c7f47e1dbccdfc4e0ddb
|
| 3 |
+
size 130
|
projects/yara/arvo_13956/src.tgz
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:fd7658cbf7ba4e2ef7d582f0073e3c77200620c862e977dabe22664adf53d77b
|
| 3 |
+
size 749786
|
projects/yara/arvo_14560/crash.log
ADDED
|
@@ -0,0 +1,72 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
INFO: Seed: 1323430101
|
| 2 |
+
INFO: Loaded 1 modules (8139 inline 8-bit counters): 8139 [0x8f92b0, 0x8fb27b),
|
| 3 |
+
INFO: Loaded 1 PC tables (8139 PCs): 8139 [0x6703b8,0x690068),
|
| 4 |
+
/out/dotnet_fuzzer: Running 1 inputs 1 time(s) each.
|
| 5 |
+
Running: /tmp/poc
|
| 6 |
+
=================================================================
|
| 7 |
+
==18683==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x619000000e0b at pc 0x000000530cba bp 0x7ffe7017ac50 sp 0x7ffe7017a418
|
| 8 |
+
READ of size 32 at 0x619000000e0b thread T0
|
| 9 |
+
SCARINESS: 26 (multi-byte-read-heap-buffer-overflow)
|
| 10 |
+
#0 0x530cb9 in __asan_memcpy /src/llvm/projects/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cc:22:3
|
| 11 |
+
#1 0x575df0 in yr_object_set_string /src/yara/libyara/object.c:1094:5
|
| 12 |
+
#2 0x5ac8cc in dotnet_parse_us /src/yara/libyara/modules/dotnet.c:238:7
|
| 13 |
+
#3 0x5b4745 in dotnet_parse_com /src/yara/libyara/modules/dotnet.c:1606:5
|
| 14 |
+
#4 0x5b5fe5 in dotnet__load /src/yara/libyara/modules/dotnet.c:1723:9
|
| 15 |
+
#5 0x573cff in yr_modules_load /src/yara/libyara/modules.c:179:16
|
| 16 |
+
#6 0x5e13d9 in yr_execute_code /src/yara/libyara/exec.c:1004:18
|
| 17 |
+
#7 0x57dc66 in yr_scanner_scan_mem_blocks /src/yara/libyara/scanner.c:439:3
|
| 18 |
+
#8 0x57a5d3 in yr_rules_scan_mem_blocks /src/yara/libyara/rules.c:217:12
|
| 19 |
+
#9 0x57a832 in yr_rules_scan_mem /src/yara/libyara/rules.c:267:10
|
| 20 |
+
#10 0x563212 in LLVMFuzzerTestOneInput /src/yara/tests/oss-fuzz/dotnet_fuzzer.cc:74:3
|
| 21 |
+
#11 0x46b474 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:553:15
|
| 22 |
+
#12 0x456041 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:286:6
|
| 23 |
+
#13 0x45b69a in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:717:9
|
| 24 |
+
#14 0x486882 in main /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerMain.cpp:19:10
|
| 25 |
+
#15 0x75750393083f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
|
| 26 |
+
#16 0x41e0b8 in _start (/out/dotnet_fuzzer+0x41e0b8)
|
| 27 |
+
|
| 28 |
+
DEDUP_TOKEN: __asan_memcpy--yr_object_set_string--dotnet_parse_us
|
| 29 |
+
0x619000000e0b is located 0 bytes to the right of 907-byte region [0x619000000a80,0x619000000e0b)
|
| 30 |
+
allocated by thread T0 here:
|
| 31 |
+
#0 0x53189d in malloc /src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:145:3
|
| 32 |
+
#1 0x432827 in operator new(unsigned long) (/out/dotnet_fuzzer+0x432827)
|
| 33 |
+
#2 0x456041 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:286:6
|
| 34 |
+
#3 0x45b69a in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:717:9
|
| 35 |
+
#4 0x486882 in main /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerMain.cpp:19:10
|
| 36 |
+
#5 0x75750393083f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
|
| 37 |
+
|
| 38 |
+
DEDUP_TOKEN: malloc--operator new(unsigned long)--fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long)
|
| 39 |
+
SUMMARY: AddressSanitizer: heap-buffer-overflow /src/llvm/projects/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cc:22:3 in __asan_memcpy
|
| 40 |
+
Shadow bytes around the buggy address:
|
| 41 |
+
0x0c327fff8170: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| 42 |
+
0x0c327fff8180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| 43 |
+
0x0c327fff8190: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| 44 |
+
0x0c327fff81a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| 45 |
+
0x0c327fff81b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| 46 |
+
=>0x0c327fff81c0: 00[03]fa fa fa fa fa fa fa fa fa fa fa fa fa fa
|
| 47 |
+
0x0c327fff81d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
|
| 48 |
+
0x0c327fff81e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
|
| 49 |
+
0x0c327fff81f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| 50 |
+
0x0c327fff8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| 51 |
+
0x0c327fff8210: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| 52 |
+
Shadow byte legend (one shadow byte represents 8 application bytes):
|
| 53 |
+
Addressable: 00
|
| 54 |
+
Partially addressable: 01 02 03 04 05 06 07
|
| 55 |
+
Heap left redzone: fa
|
| 56 |
+
Freed heap region: fd
|
| 57 |
+
Stack left redzone: f1
|
| 58 |
+
Stack mid redzone: f2
|
| 59 |
+
Stack right redzone: f3
|
| 60 |
+
Stack after return: f5
|
| 61 |
+
Stack use after scope: f8
|
| 62 |
+
Global redzone: f9
|
| 63 |
+
Global init order: f6
|
| 64 |
+
Poisoned by user: f7
|
| 65 |
+
Container overflow: fc
|
| 66 |
+
Array cookie: ac
|
| 67 |
+
Intra object redzone: bb
|
| 68 |
+
ASan internal: fe
|
| 69 |
+
Left alloca redzone: ca
|
| 70 |
+
Right alloca redzone: cb
|
| 71 |
+
Shadow gap: cc
|
| 72 |
+
==18683==ABORTING
|
projects/yara/arvo_14560/poc.bin
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:ab1f47841776514f6ab7496167b88c2d0ae8ff95df6b8ea6c7497d57426bad09
|
| 3 |
+
size 907
|
projects/yara/arvo_14560/src.tgz
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:eb552884bf3bce8d593d5aaf64384dd46d7ed6442bd70e4e93ceb5b27f9baad9
|
| 3 |
+
size 751851
|
projects/yara/arvo_14813/crash.log
ADDED
|
@@ -0,0 +1,73 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
INFO: Seed: 1622430913
|
| 2 |
+
INFO: Loaded 1 modules (8171 inline 8-bit counters): 8171 [0x8fd490, 0x8ff47b),
|
| 3 |
+
INFO: Loaded 1 PC tables (8171 PCs): 8171 [0x673c78,0x693b28),
|
| 4 |
+
/out/dotnet_fuzzer: Running 1 inputs 1 time(s) each.
|
| 5 |
+
Running: /tmp/poc
|
| 6 |
+
=================================================================
|
| 7 |
+
==18682==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61b000000dd7 at pc 0x000000538c4a bp 0x7ffe42183930 sp 0x7ffe421830f8
|
| 8 |
+
READ of size 11 at 0x61b000000dd7 thread T0
|
| 9 |
+
SCARINESS: 26 (multi-byte-read-heap-buffer-overflow)
|
| 10 |
+
#0 0x538c49 in __asan_memcpy /src/llvm/projects/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cc:22:3
|
| 11 |
+
#1 0x57e640 in yr_object_set_string /src/yara/libyara/object.c:1094:5
|
| 12 |
+
#2 0x5b69d9 in dotnet_parse_tilde_2 /src/yara/libyara/modules/dotnet.c:1181:13
|
| 13 |
+
#3 0x5bc566 in dotnet_parse_tilde /src/yara/libyara/modules/dotnet.c:1513:3
|
| 14 |
+
#4 0x5bcdef in dotnet_parse_com /src/yara/libyara/modules/dotnet.c:1600:5
|
| 15 |
+
#5 0x5be6fe in dotnet__load /src/yara/libyara/modules/dotnet.c:1720:9
|
| 16 |
+
#6 0x57c54c in yr_modules_load /src/yara/libyara/modules.c:179:16
|
| 17 |
+
#7 0x5e9c6e in yr_execute_code /src/yara/libyara/exec.c:1030:18
|
| 18 |
+
#8 0x5864d0 in yr_scanner_scan_mem_blocks /src/yara/libyara/scanner.c:442:3
|
| 19 |
+
#9 0x582e53 in yr_rules_scan_mem_blocks /src/yara/libyara/rules.c:217:12
|
| 20 |
+
#10 0x5830b2 in yr_rules_scan_mem /src/yara/libyara/rules.c:267:10
|
| 21 |
+
#11 0x56bae2 in LLVMFuzzerTestOneInput /src/yara/tests/oss-fuzz/dotnet_fuzzer.cc:74:3
|
| 22 |
+
#12 0x473af1 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:553:15
|
| 23 |
+
#13 0x45e431 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:292:6
|
| 24 |
+
#14 0x463fbe in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:775:9
|
| 25 |
+
#15 0x48d562 in main /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerMain.cpp:19:10
|
| 26 |
+
#16 0x70b9eda7b83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
|
| 27 |
+
#17 0x41e168 in _start (/out/dotnet_fuzzer+0x41e168)
|
| 28 |
+
|
| 29 |
+
DEDUP_TOKEN: __asan_memcpy--yr_object_set_string--dotnet_parse_tilde_2
|
| 30 |
+
0x61b000000dd7 is located 0 bytes to the right of 1623-byte region [0x61b000000780,0x61b000000dd7)
|
| 31 |
+
allocated by thread T0 here:
|
| 32 |
+
#0 0x53980d in malloc /src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:145:3
|
| 33 |
+
#1 0x432807 in operator new(unsigned long) (/out/dotnet_fuzzer+0x432807)
|
| 34 |
+
#2 0x45e431 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:292:6
|
| 35 |
+
#3 0x463fbe in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:775:9
|
| 36 |
+
#4 0x48d562 in main /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerMain.cpp:19:10
|
| 37 |
+
#5 0x70b9eda7b83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
|
| 38 |
+
|
| 39 |
+
DEDUP_TOKEN: malloc--operator new(unsigned long)--fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long)
|
| 40 |
+
SUMMARY: AddressSanitizer: heap-buffer-overflow /src/llvm/projects/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cc:22:3 in __asan_memcpy
|
| 41 |
+
Shadow bytes around the buggy address:
|
| 42 |
+
0x0c367fff8160: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| 43 |
+
0x0c367fff8170: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| 44 |
+
0x0c367fff8180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| 45 |
+
0x0c367fff8190: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| 46 |
+
0x0c367fff81a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| 47 |
+
=>0x0c367fff81b0: 00 00 00 00 00 00 00 00 00 00[07]fa fa fa fa fa
|
| 48 |
+
0x0c367fff81c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
|
| 49 |
+
0x0c367fff81d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
|
| 50 |
+
0x0c367fff81e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
|
| 51 |
+
0x0c367fff81f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
|
| 52 |
+
0x0c367fff8200: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
|
| 53 |
+
Shadow byte legend (one shadow byte represents 8 application bytes):
|
| 54 |
+
Addressable: 00
|
| 55 |
+
Partially addressable: 01 02 03 04 05 06 07
|
| 56 |
+
Heap left redzone: fa
|
| 57 |
+
Freed heap region: fd
|
| 58 |
+
Stack left redzone: f1
|
| 59 |
+
Stack mid redzone: f2
|
| 60 |
+
Stack right redzone: f3
|
| 61 |
+
Stack after return: f5
|
| 62 |
+
Stack use after scope: f8
|
| 63 |
+
Global redzone: f9
|
| 64 |
+
Global init order: f6
|
| 65 |
+
Poisoned by user: f7
|
| 66 |
+
Container overflow: fc
|
| 67 |
+
Array cookie: ac
|
| 68 |
+
Intra object redzone: bb
|
| 69 |
+
ASan internal: fe
|
| 70 |
+
Left alloca redzone: ca
|
| 71 |
+
Right alloca redzone: cb
|
| 72 |
+
Shadow gap: cc
|
| 73 |
+
==18682==ABORTING
|
projects/yara/arvo_14813/poc.bin
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:f6859639f148726470372c6a5fe1225ccca6824508640124c8ec27441d6cdac9
|
| 3 |
+
size 1623
|
projects/yara/arvo_14813/src.tgz
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:b1cd703dac5876d8c44c1d5fa902af6acba01c5a9a080ff1e021e306105c91b1
|
| 3 |
+
size 768782
|
projects/yara/arvo_16448/crash.log
ADDED
|
@@ -0,0 +1,29 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
INFO: Seed: 967326555
|
| 2 |
+
INFO: Loaded 1 modules (9775 inline 8-bit counters): 9775 [0x7c2480, 0x7c4aaf),
|
| 3 |
+
INFO: Loaded 1 PC tables (9775 PCs): 9775 [0x557dd0,0x57e0c0),
|
| 4 |
+
/out/dotnet_fuzzer: Running 1 inputs 1 time(s) each.
|
| 5 |
+
Running: /tmp/poc
|
| 6 |
+
UndefinedBehaviorSanitizer:DEADLYSIGNAL
|
| 7 |
+
==18864==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0x00003de2e000 (pc 0x0000004dcd4f bp 0x7ffe358d0580 sp 0x7ffe358d0270 T18864)
|
| 8 |
+
==18864==The signal is caused by a READ memory access.
|
| 9 |
+
#0 0x4dcd4e in dotnet_parse_tilde_2 /src/yara/libyara/modules/dotnet/dotnet.c:1022:15
|
| 10 |
+
#1 0x4e0b89 in dotnet_parse_tilde /src/yara/libyara/modules/dotnet/dotnet.c:1562:3
|
| 11 |
+
#2 0x4e10e4 in dotnet_parse_com /src/yara/libyara/modules/dotnet/dotnet.c:1651:5
|
| 12 |
+
#3 0x4e2136 in dotnet__load /src/yara/libyara/modules/dotnet/dotnet.c:1774:9
|
| 13 |
+
#4 0x4bbd00 in yr_modules_load /src/yara/libyara/modules.c:179:16
|
| 14 |
+
#5 0x4f781f in yr_execute_code /src/yara/libyara/exec.c:1276:18
|
| 15 |
+
#6 0x4c0959 in yr_scanner_scan_mem_blocks /src/yara/libyara/scanner.c:441:3
|
| 16 |
+
#7 0x4bf056 in yr_rules_scan_mem_blocks /src/yara/libyara/rules.c:235:12
|
| 17 |
+
#8 0x4bf0e7 in yr_rules_scan_mem /src/yara/libyara/rules.c:285:10
|
| 18 |
+
#9 0x4b459a in LLVMFuzzerTestOneInput /src/yara/tests/oss-fuzz/dotnet_fuzzer.cc:74:3
|
| 19 |
+
#10 0x443711 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:556:15
|
| 20 |
+
#11 0x42e331 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:292:6
|
| 21 |
+
#12 0x433fee in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:774:9
|
| 22 |
+
#13 0x45e162 in main /src/llvm/projects/compiler-rt/lib/fuzzer/FuzzerMain.cpp:19:10
|
| 23 |
+
#14 0x76046c07f83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
|
| 24 |
+
#15 0x4076e8 in _start (/out/dotnet_fuzzer+0x4076e8)
|
| 25 |
+
|
| 26 |
+
DEDUP_TOKEN: dotnet_parse_tilde_2--dotnet_parse_tilde--dotnet_parse_com
|
| 27 |
+
UndefinedBehaviorSanitizer can not provide additional info.
|
| 28 |
+
SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/yara/libyara/modules/dotnet/dotnet.c:1022:15 in dotnet_parse_tilde_2
|
| 29 |
+
==18864==ABORTING
|
projects/yara/arvo_16448/poc.bin
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:a34c706c30140b159bd318664fb8f38145236b63101edc7a68620391bacc4681
|
| 3 |
+
size 661
|
projects/yara/arvo_16448/src.tgz
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:9261794a9c85a313ed34134263e2c0d18be57a5f91ef206836e8101abe1ad8be
|
| 3 |
+
size 851510
|
projects/yara/arvo_20800/crash.log
ADDED
|
@@ -0,0 +1,69 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
INFO: Seed: 1827433779
|
| 2 |
+
INFO: Loaded 1 modules (8523 inline 8-bit counters): 8523 [0x8f0110, 0x8f225b),
|
| 3 |
+
INFO: Loaded 1 PC tables (8523 PCs): 8523 [0x665ff8,0x6874a8),
|
| 4 |
+
/out/pe_fuzzer: Running 1 inputs 1 time(s) each.
|
| 5 |
+
Running: /tmp/poc
|
| 6 |
+
=================================================================
|
| 7 |
+
==19187==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6210000061f9 at pc 0x000000595978 bp 0x7ffc7ff46810 sp 0x7ffc7ff46808
|
| 8 |
+
READ of size 4 at 0x6210000061f9 thread T0
|
| 9 |
+
SCARINESS: 17 (4-byte-read-heap-buffer-overflow)
|
| 10 |
+
#0 0x595977 in pe_parse_debug_directory /src/yara/libyara/modules/pe/pe.c:339:9
|
| 11 |
+
#1 0x591a8b in pe__load /src/yara/libyara/modules/pe/pe.c:3182:9
|
| 12 |
+
#2 0x5654ac in yr_modules_load /src/yara/libyara/modules.c:179:16
|
| 13 |
+
#3 0x5d7a03 in yr_execute_code /src/yara/libyara/exec.c:1278:18
|
| 14 |
+
#4 0x56f6f0 in yr_scanner_scan_mem_blocks /src/yara/libyara/scanner.c:444:3
|
| 15 |
+
#5 0x56c053 in yr_rules_scan_mem_blocks /src/yara/libyara/rules.c:235:12
|
| 16 |
+
#6 0x56c2b2 in yr_rules_scan_mem /src/yara/libyara/rules.c:285:10
|
| 17 |
+
#7 0x5548e2 in LLVMFuzzerTestOneInput /src/yara/tests/oss-fuzz/pe_fuzzer.cc:74:3
|
| 18 |
+
#8 0x45a3b1 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:556:15
|
| 19 |
+
#9 0x444ed1 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:292:6
|
| 20 |
+
#10 0x44ab8e in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:774:9
|
| 21 |
+
#11 0x474ab2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:19:10
|
| 22 |
+
#12 0x7eba531ce83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
|
| 23 |
+
#13 0x41e348 in _start (/out/pe_fuzzer+0x41e348)
|
| 24 |
+
|
| 25 |
+
DEDUP_TOKEN: pe_parse_debug_directory--pe__load--yr_modules_load
|
| 26 |
+
0x6210000061f9 is located 2 bytes to the right of 4343-byte region [0x621000005100,0x6210000061f7)
|
| 27 |
+
allocated by thread T0 here:
|
| 28 |
+
#0 0x521f4d in malloc /src/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:145:3
|
| 29 |
+
#1 0x4331b7 in operator new(unsigned long) (/out/pe_fuzzer+0x4331b7)
|
| 30 |
+
#2 0x444ed1 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:292:6
|
| 31 |
+
#3 0x44ab8e in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:774:9
|
| 32 |
+
#4 0x474ab2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:19:10
|
| 33 |
+
#5 0x7eba531ce83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
|
| 34 |
+
|
| 35 |
+
DEDUP_TOKEN: malloc--operator new(unsigned long)--fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long)
|
| 36 |
+
SUMMARY: AddressSanitizer: heap-buffer-overflow /src/yara/libyara/modules/pe/pe.c:339:9 in pe_parse_debug_directory
|
| 37 |
+
Shadow bytes around the buggy address:
|
| 38 |
+
0x0c427fff8be0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| 39 |
+
0x0c427fff8bf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| 40 |
+
0x0c427fff8c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| 41 |
+
0x0c427fff8c10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| 42 |
+
0x0c427fff8c20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
| 43 |
+
=>0x0c427fff8c30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 07[fa]
|
| 44 |
+
0x0c427fff8c40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
|
| 45 |
+
0x0c427fff8c50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
|
| 46 |
+
0x0c427fff8c60: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
|
| 47 |
+
0x0c427fff8c70: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
|
| 48 |
+
0x0c427fff8c80: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
|
| 49 |
+
Shadow byte legend (one shadow byte represents 8 application bytes):
|
| 50 |
+
Addressable: 00
|
| 51 |
+
Partially addressable: 01 02 03 04 05 06 07
|
| 52 |
+
Heap left redzone: fa
|
| 53 |
+
Freed heap region: fd
|
| 54 |
+
Stack left redzone: f1
|
| 55 |
+
Stack mid redzone: f2
|
| 56 |
+
Stack right redzone: f3
|
| 57 |
+
Stack after return: f5
|
| 58 |
+
Stack use after scope: f8
|
| 59 |
+
Global redzone: f9
|
| 60 |
+
Global init order: f6
|
| 61 |
+
Poisoned by user: f7
|
| 62 |
+
Container overflow: fc
|
| 63 |
+
Array cookie: ac
|
| 64 |
+
Intra object redzone: bb
|
| 65 |
+
ASan internal: fe
|
| 66 |
+
Left alloca redzone: ca
|
| 67 |
+
Right alloca redzone: cb
|
| 68 |
+
Shadow gap: cc
|
| 69 |
+
==19187==ABORTING
|
projects/yara/arvo_20800/poc.bin
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:fc4171946a8bd115c85f451cbd17581746341b2ba1a5f885df0448ba698c34fa
|
| 3 |
+
size 4343
|
projects/yara/arvo_20800/src.tgz
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:f1309e7a79c6b92148420cf2a2bbd7c913c8b08f81f839c9618810b49042b394
|
| 3 |
+
size 867231
|
projects/yara/arvo_3862/crash.log
CHANGED
|
@@ -1,10 +1,9 @@
|
|
| 1 |
-
|
| 2 |
-
INFO: Seed: 2039039830
|
| 3 |
INFO: Loaded 1 modules (6100 guards): 6100 [0x965580, 0x96b4d0),
|
| 4 |
/out/pe_fuzzer: Running 1 inputs 1 time(s) each.
|
| 5 |
Running: /tmp/poc
|
| 6 |
=================================================================
|
| 7 |
-
==
|
| 8 |
READ of size 2 at 0x61d000001260 thread T0
|
| 9 |
SCARINESS: 24 (2-byte-read-heap-buffer-overflow-far-from-bounds)
|
| 10 |
#0 0x550b37 in pe_parse_exports /src/yara/libyara/modules/pe.c:1029:15
|
|
@@ -18,7 +17,7 @@ SCARINESS: 24 (2-byte-read-heap-buffer-overflow-far-from-bounds)
|
|
| 18 |
#8 0x5ae9d5 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:273:6
|
| 19 |
#9 0x5ba0a5 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:690:9
|
| 20 |
#10 0x5ae078 in main /src/libfuzzer/FuzzerMain.cpp:20:10
|
| 21 |
-
#11
|
| 22 |
#12 0x41c558 in _start (/out/pe_fuzzer+0x41c558)
|
| 23 |
|
| 24 |
DEDUP_TOKEN: pe_parse_exports--pe__load--yr_modules_load
|
|
@@ -29,7 +28,7 @@ allocated by thread T0 here:
|
|
| 29 |
#2 0x5ae9d5 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:273:6
|
| 30 |
#3 0x5ba0a5 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:690:9
|
| 31 |
#4 0x5ae078 in main /src/libfuzzer/FuzzerMain.cpp:20:10
|
| 32 |
-
#5
|
| 33 |
|
| 34 |
DEDUP_TOKEN: operator new[](unsigned long)--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long)
|
| 35 |
SUMMARY: AddressSanitizer: heap-buffer-overflow /src/yara/libyara/modules/pe.c:1029:15 in pe_parse_exports
|
|
@@ -64,4 +63,4 @@ Shadow byte legend (one shadow byte represents 8 application bytes):
|
|
| 64 |
ASan internal: fe
|
| 65 |
Left alloca redzone: ca
|
| 66 |
Right alloca redzone: cb
|
| 67 |
-
==
|
|
|
|
| 1 |
+
INFO: Seed: 1805705695
|
|
|
|
| 2 |
INFO: Loaded 1 modules (6100 guards): 6100 [0x965580, 0x96b4d0),
|
| 3 |
/out/pe_fuzzer: Running 1 inputs 1 time(s) each.
|
| 4 |
Running: /tmp/poc
|
| 5 |
=================================================================
|
| 6 |
+
==16518==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61d000001260 at pc 0x000000550b38 bp 0x7ffca315f450 sp 0x7ffca315f448
|
| 7 |
READ of size 2 at 0x61d000001260 thread T0
|
| 8 |
SCARINESS: 24 (2-byte-read-heap-buffer-overflow-far-from-bounds)
|
| 9 |
#0 0x550b37 in pe_parse_exports /src/yara/libyara/modules/pe.c:1029:15
|
|
|
|
| 17 |
#8 0x5ae9d5 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:273:6
|
| 18 |
#9 0x5ba0a5 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:690:9
|
| 19 |
#10 0x5ae078 in main /src/libfuzzer/FuzzerMain.cpp:20:10
|
| 20 |
+
#11 0x7b9f49ac283f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
|
| 21 |
#12 0x41c558 in _start (/out/pe_fuzzer+0x41c558)
|
| 22 |
|
| 23 |
DEDUP_TOKEN: pe_parse_exports--pe__load--yr_modules_load
|
|
|
|
| 28 |
#2 0x5ae9d5 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:273:6
|
| 29 |
#3 0x5ba0a5 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:690:9
|
| 30 |
#4 0x5ae078 in main /src/libfuzzer/FuzzerMain.cpp:20:10
|
| 31 |
+
#5 0x7b9f49ac283f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
|
| 32 |
|
| 33 |
DEDUP_TOKEN: operator new[](unsigned long)--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long)
|
| 34 |
SUMMARY: AddressSanitizer: heap-buffer-overflow /src/yara/libyara/modules/pe.c:1029:15 in pe_parse_exports
|
|
|
|
| 63 |
ASan internal: fe
|
| 64 |
Left alloca redzone: ca
|
| 65 |
Right alloca redzone: cb
|
| 66 |
+
==16518==ABORTING
|
projects/yara/arvo_3862/src.tgz
CHANGED
|
@@ -1,3 +1,3 @@
|
|
| 1 |
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:
|
| 3 |
-
size
|
|
|
|
| 1 |
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:39c92714cf9d5ab1db8232835286ca3ea9f0c71fe00344e0415fc6783b6155ef
|
| 3 |
+
size 551479
|
projects/yara/arvo_3938/crash.log
ADDED
|
@@ -0,0 +1,15 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
INFO: Seed: 2455452425
|
| 2 |
+
INFO: Loaded 1 modules (6196 guards): 6196 [0x77f8f0, 0x7859c0),
|
| 3 |
+
/out/rules_fuzzer: Running 1 inputs 1 time(s) each.
|
| 4 |
+
Running: /tmp/poc
|
| 5 |
+
/src/libfuzzer/FuzzerLoop.cpp:476:13: runtime error: call to function LLVMFuzzerTestOneInput through pointer to incorrect function type 'int (*)(const unsigned char *, unsigned long)'
|
| 6 |
+
/src/yara/tests/oss-fuzz/rules_fuzzer.cc:45: note: LLVMFuzzerTestOneInput defined here
|
| 7 |
+
#0 0x484707 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:476:13
|
| 8 |
+
#1 0x4787ec in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:273:6
|
| 9 |
+
#2 0x47c6d9 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:690:9
|
| 10 |
+
#3 0x4784f8 in main /src/libfuzzer/FuzzerMain.cpp:20:10
|
| 11 |
+
#4 0x75f44d68183f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
|
| 12 |
+
#5 0x406668 in _start (/out/rules_fuzzer+0x406668)
|
| 13 |
+
|
| 14 |
+
DEDUP_TOKEN: fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long)--fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long))
|
| 15 |
+
SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior /src/libfuzzer/FuzzerLoop.cpp:476:13 in
|
projects/yara/arvo_3938/poc.bin
ADDED
|
File without changes
|
projects/yara/arvo_3938/src.tgz
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:6fd33cb46b5922ed77a78cb720c7898474403da846136e56f5c58ef28ad5c5a5
|
| 3 |
+
size 553642
|
projects/yara/arvo_8903/crash.log
ADDED
|
@@ -0,0 +1,39 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
INFO: Seed: 3508577220
|
| 2 |
+
INFO: Loaded 1 modules (7666 inline 8-bit counters): 7666 [0xafcf68, 0xafed5a),
|
| 3 |
+
INFO: Loaded 1 PC tables (7666 PCs): 7666 [0x875b50,0x893a70),
|
| 4 |
+
/out/dex_fuzzer: Running 1 inputs 1 time(s) each.
|
| 5 |
+
Running: /tmp/poc
|
| 6 |
+
==18683==WARNING: MemorySanitizer: use-of-uninitialized-value
|
| 7 |
+
#0 0x54893b in read_uleb128 /src/yara/libyara/modules/dex.c:239:11
|
| 8 |
+
#1 0x54ab11 in load_encoded_method /src/yara/libyara/modules/dex.c:513:40
|
| 9 |
+
#2 0x54ee1a in dex_parse /src/yara/libyara/modules/dex.c:1020:25
|
| 10 |
+
#3 0x55126e in dex__load /src/yara/libyara/modules/dex.c:1150:7
|
| 11 |
+
#4 0x4bfa03 in yr_modules_load /src/yara/libyara/modules.c:175:16
|
| 12 |
+
#5 0x587152 in yr_execute_code /src/yara/libyara/exec.c:962:18
|
| 13 |
+
#6 0x4d11a6 in yr_scanner_scan_mem_blocks /src/yara/libyara/scanner.c:435:3
|
| 14 |
+
#7 0x4cb476 in yr_rules_scan_mem_blocks /src/yara/libyara/rules.c:217:12
|
| 15 |
+
#8 0x4cb77f in yr_rules_scan_mem /src/yara/libyara/rules.c:267:10
|
| 16 |
+
#9 0x4a30f1 in LLVMFuzzerTestOneInput /src/yara/tests/oss-fuzz/dex_fuzzer.cc:40:3
|
| 17 |
+
#10 0x62f40b in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:571:15
|
| 18 |
+
#11 0x5e73b6 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6
|
| 19 |
+
#12 0x5f81da in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:713:9
|
| 20 |
+
#13 0x5e64e1 in main /src/libfuzzer/FuzzerMain.cpp:20:10
|
| 21 |
+
#14 0x7c70ad64283f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
|
| 22 |
+
#15 0x41f2e8 in _start (/out/dex_fuzzer+0x41f2e8)
|
| 23 |
+
|
| 24 |
+
DEDUP_TOKEN: read_uleb128--load_encoded_method--dex_parse
|
| 25 |
+
Uninitialized value was created by a heap allocation
|
| 26 |
+
#0 0x4a26b4 in operator new[](unsigned long) /src/llvm/projects/compiler-rt/lib/msan/msan_new_delete.cc:48
|
| 27 |
+
#1 0x62f060 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:558:23
|
| 28 |
+
#2 0x5e73b6 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /src/libfuzzer/FuzzerDriver.cpp:280:6
|
| 29 |
+
#3 0x5f81da in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:713:9
|
| 30 |
+
#4 0x5e64e1 in main /src/libfuzzer/FuzzerMain.cpp:20:10
|
| 31 |
+
#5 0x7c70ad64283f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
|
| 32 |
+
|
| 33 |
+
DEDUP_TOKEN: operator new[](unsigned long)--fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long)--fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long)
|
| 34 |
+
SUMMARY: MemorySanitizer: use-of-uninitialized-value /src/yara/libyara/modules/dex.c:239:11 in read_uleb128
|
| 35 |
+
Unique heap origins: 798
|
| 36 |
+
Stack depot allocated bytes: 102584
|
| 37 |
+
Unique origin histories: 18
|
| 38 |
+
History depot allocated bytes: 432
|
| 39 |
+
Exiting
|
projects/yara/arvo_8903/poc.bin
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:fef9133723bcb320dffa8d6cd6cd7eb430e663c4679eb424458087bdd7068211
|
| 3 |
+
size 513
|
projects/yara/arvo_8903/src.tgz
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:9a0e3eff2d484fa807c70bd72016a7fb98f04333222f83f23abceef059caf564
|
| 3 |
+
size 741128
|