|
Message-ID: <CANO7a6wD2tJwRkQ9XUTiL-K21q-T2V6VeAcTWx0_9kt7yuJESw@mail.gmail.com> Date: Wed, 27 Jun 2012 12:04:24 +0530 From: Dhiru Kholia <dhiru.kholia@...il.com> To: john-dev@...ts.openwall.com Subject: SSH format crashes when built using "linux-x86-clang-debug" Hi, SSH format crashes when built using "linux-x86-clang-debug". $ ../run/john -format=ssh -t Benchmarking: SSH RSA/DSA (one 2048-bit RSA and one 1024-bit DSA key) [32/32]... ==5844== ERROR: AddressSanitizer global-buffer-overflow on address 0x0832f51f at pc 0x816a88b bp 0xbff25f58 sp 0xbff25f50 READ of size 1 at 0x0832f51f thread T0 #0 0x816a88b (/home/dsk/magnum-jumbo/run/john+0x816a88b) #1 0x816b321 (/home/dsk/magnum-jumbo/run/john+0x816b321) #2 0x818aeca (/home/dsk/magnum-jumbo/run/john+0x818aeca) #3 0x818467c (/home/dsk/magnum-jumbo/run/john+0x818467c) #4 0xb73723d5 (/lib/libc-2.15.so+0x193d5) 0x0832f51f is located 30 bytes to the right of global variable 'has_been_cracked (pdf_fmt.c)' (0x832f500) of size 1 'has_been_cracked (pdf_fmt.c)' is ascii string '' ==5844== ABORTING Stats: 0M malloced (1M for red zones) by 3262 calls Stats: 0M realloced by 11 calls Stats: 0M freed by 150 calls Stats: 0M really freed by 0 calls Stats: 32M (8196 full pages) mmaped in 8 calls mmaps by size class: 8:16383; 9:8191; 10:4095; 11:2047; 12:1024; 13:512; 14:256; 17:32; mallocs by size class: 8:3209; 9:22; 10:3; 11:12; 12:5; 13:3; 14:1; 17:7; frees by size class: 8:109; 9:22; 10:3; 11:10; 12:5; 13:1; rfrees by size class: Stats: malloc large: 7 small slow: 13 Shadow byte and word: 0x21065ea3: f9 0x21065ea0: 01 f9 f9 f9 More shadow bytes: 0x21065e90: 00 00 00 00 0x21065e94: 00 00 00 00 0x21065e98: 00 00 00 f9 0x21065e9c: f9 f9 f9 f9 =>0x21065ea0: 01 f9 f9 f9 0x21065ea4: f9 f9 f9 f9 0x21065ea8: 00 00 00 00 0x21065eac: 01 f9 f9 f9 0x21065eb0: f9 f9 f9 f9 $ addr2line -a 0x816a88b -e ../run/john 0x0816a88b /home/dsk/magnum-jumbo/src/bench.c:150 bench.c line 150 ==> two_salts[index] = mem_alloc(format->params.salt_size); It seems the program is crashing when format->params.salt_size is accessed. Any ideas why this is happening? -- Cheers, Dhiru
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.