|
Message-ID: <55902178.8020807@mailbox.org> Date: Sun, 28 Jun 2015 18:31:52 +0200 From: Frank Dittrich <frank.dittrich@...lbox.org> To: john-dev@...ts.openwall.com Subject: Re: more robustness On 06/28/2015 01:54 PM, Kai Zhao wrote: >> I think more people might try out and comment on your new --fuzz option >> if you would push your changes to (a separate branch of) your own github >> repository and provide a link to that repository/branch. > > Thanks, here is the link: > > https://github.com/loverszhaokai/JohnTheRipper/tree/fuzz_option (fuzz_option)run $ ./john --format=PBKDF2-HMAC-SHA1 --fuzz Fuzzing: PBKDF2-HMAC-SHA1 [PBKDF2-SHA1 128/128 AVX 4x]... ================================================================= ==26467==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffd6af53f3a at pc 0x00000044f633 bp 0x7ffd6af53bc0 sp 0x7ffd6af53bb0 WRITE of size 1 at 0x7ffd6af53f3a thread T0 #0 0x44f632 in raw_to_hex /home/fd/git/fuzz-JtR/src/base64_convert.c:241 #1 0x453afd in mime_to_hex /home/fd/git/fuzz-JtR/src/base64_convert.c:686 #2 0x45611b in base64_convert /home/fd/git/fuzz-JtR/src/base64_convert.c:921 #3 0x60f77d in prepare /home/fd/git/fuzz-JtR/src/pbkdf2-hmac-sha1_fmt_plug.c:151 #4 0x6bd370 in fuzz_test /home/fd/git/fuzz-JtR/src/formats.c:1153 #5 0x6a4d2e in fuzz /home/fd/git/fuzz-JtR/src/bench.c:829 #6 0x6c995d in john_run /home/fd/git/fuzz-JtR/src/john.c:1367 #7 0x6cae5c in main /home/fd/git/fuzz-JtR/src/john.c:1753 #8 0x7f83fc8b078f in __libc_start_main (/lib64/libc.so.6+0x2078f) #9 0x406878 in _start (/home/fd/git/fuzz-JtR/run/john+0x406878) Address 0x7ffd6af53f3a is located in stack of thread T0 at offset 106 in frame #0 0x60f49e in prepare /home/fd/git/fuzz-JtR/src/pbkdf2-hmac-sha1_fmt_plug.c:118 This frame has 3 object(s): [32, 106) 'tmph' <== Memory access at offset 106 overflows this variable [160, 284) 'tmp' [320, 464) 'tmps' HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow /home/fd/git/fuzz-JtR/src/base64_convert.c:241 raw_to_hex Shadow bytes around the buggy address: 0x10002d5e2790: 04 f4 f4 f4 f3 f3 f3 f3 00 00 00 00 00 00 00 00 0x10002d5e27a0: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 00 00 00 0x10002d5e27b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10002d5e27c0: 00 00 00 00 00 00 00 00 00 00 f3 f3 f3 f3 00 00 0x10002d5e27d0: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 =>0x10002d5e27e0: 00 00 00 00 00 00 00[02]f4 f4 f2 f2 f2 f2 00 00 0x10002d5e27f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 04 f2 f2 0x10002d5e2800: f2 f2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10002d5e2810: 00 00 00 00 f4 f4 f3 f3 f3 f3 00 00 00 00 00 00 0x10002d5e2820: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10002d5e2830: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==26467==ABORTING Is there an easy way to reproduce this problem for a bleeding-jumbo version without the --fuzz option? Frank
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.