|
Message-ID: <CACn5sdTHZPTK7+u1ANCU-T-czJ_vT_-VQp8CisHreKKPAPpazw@mail.gmail.com>
Date: Wed, 30 Mar 2016 14:43:21 -0300
From: Gustavo Grieco <gustavo.grieco@...il.com>
To: oss-security@...ts.openwall.com
Subject: CVE request: Heap overflow in VLC 2.1.6 processing wav files
Hi,
We found a buffer overflow in the parsing and processing of wav files in
VLC (version 2.1.6-0). It was tested in Ubuntu 14.04 (x86_64), but it will
probably affects other versions as well. Fortunately, it seems to be fixed
in the last release of VLC. Here you can see the gdb stack trace:
__memcpy_sse2_unaligned () at
../sysdeps/x86_64/multiarch/memcpy-sse2-unaligned.S:116
116 ../sysdeps/x86_64/multiarch/memcpy-sse2-unaligned.S: No existe el
archivo o el directorio.
(gdb) bt
#0 __memcpy_sse2_unaligned () at
../sysdeps/x86_64/multiarch/memcpy-sse2-unaligned.S:116
#1 0x00007ffff71436e9 in memcpy (__len=4290773038, __src=<optimized out>,
__dest=<optimized out>) at /usr/include/x86_64-linux-gnu/bits/string3.h:51
#2 AStreamPeekStream (s=<optimized out>, pp_peek=0x7fffea824988,
i_read=4294967276) at input/stream.c:1115
#3 0x00007fffdebb42b3 in ChunkFind (p_demux=p_demux@...ry=0x7fffd4c01828,
fcc=fcc@...ry=0x7fffdebb576b "fmt ", pi_size=pi_size@...ry=0x7fffea824a3c)
at wav.c:522
#4 0x00007fffdebb4761 in Open (p_this=0x7fffd4c01828) at wav.c:166
#5 0x00007ffff716d178 in module_load (obj=obj@...ry=0x7fffd4c01828,
m=m@...ry=0x7b92b0, init=init@...ry=0x7ffff716d0d0 <generic_start>,
args=args@...ry=0x7fffea824b50) at modules/modules.c:185
#6 0x00007ffff716d72e in vlc_module_load (obj=obj@...ry=0x7fffd4c01828,
capability=capability@...ry=0x7ffff71a4059 "demux", name=0x7ffff71a43bb "",
name@...ry=0x7fffd4c018e0 "", strict=<optimized out>,
probe=probe@...ry=0x7ffff716d0d0
<generic_start>) at modules/modules.c:277
#7 0x00007ffff716dc04 in module_need (obj=obj@...ry=0x7fffd4c01828,
cap=cap@...ry=0x7ffff71a4059 "demux", name=name@...ry=0x7fffd4c018e0 "",
strict=<optimized out>) at modules/modules.c:366
#8 0x00007ffff712cfbe in demux_New (p_obj=p_obj@...ry=0x7fffd00009b8,
p_parent_input=p_parent_input@...ry=0x7fffd00009b8,
psz_access=<optimized out>, psz_demux=0x7ffff71b9ca5 "",
psz_location=<optimized out>, s=<optimized out>, out=0x7fffd4000aa0,
b_quick=false)
at input/demux.c:188
#9 0x00007ffff7139d5d in InputSourceInit (p_input=p_input@...ry=0x7fffd00009b8,
in=<optimized out>, psz_mrl=<optimized out>,
psz_forced_demux=psz_forced_demux@...ry=0x0,
b_in_can_fail=b_in_can_fail@...ry=false) at input/input.c:2535
#10 0x00007ffff713ab6b in Init (p_input=p_input@...ry=0x7fffd00009b8) at
input/input.c:1225
#11 0x00007ffff713e0e6 in Run (obj=0x7fffd00009b8) at input/input.c:521
#12 0x00007ffff79a9182 in start_thread (arg=0x7fffea825700) at
pthread_create.c:312
#13 0x00007ffff74d247d in clone () at
../sysdeps/unix/sysv/linux/x86_64/clone.S:111
It is evident that the memcpy operation has an abnormally large size
parameter (4290773038). Find attached a test case to reproduce it.
Regards,
Gustavo.
Content of type "text/html" skipped
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.