Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAPGxrc_yrmXsGOs_nRLJoqP=sTPRnjsnxL=ts=E5Vj-UxT_VhQ@mail.gmail.com>
Date: Sat, 29 Apr 2017 19:24:09 +0800
From: redrain root <rootredrain@...il.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2017-8291 ghostscript remote code execution

nope~
I know this issue is a type confusion similar to your initialized dsc
parser
for example
The last previous vulnerability code exists in the
zinitialize_dsc_parser(). The method gets the memory data using
dict_memory() and treats it as an object to call its gs_alloc_struct()
method.
in the Evince code execution demo,  uses ghostscript (libgs.so) as the .ps
file processor
and another demo attack imagick is the shell command injection vuln.

and CVE-2017-8291 is a part of my exploit last year it also affect some
programs use ghostscript
that's why I use Evince as the example.

Regards,
redrain



2017-04-29 13:36 GMT+08:00 Tavis Ormandy <taviso@...gle.com>:

> On Fri, Apr 28, 2017 at 7:43 PM, redrain root <rootredrain@...il.com>
> wrote:
> >
> > what a awkward??
> > I have discovered a part of my vulns about ghostscript last year and
> > exploited in fulldisclosure early!
> > and these vulns are part of mine I was going to discovered these in
> defcon
> > or other conference...WTF...
> > u guys are logo designer???
> >
> > there are two demos last year
> > Evince Arbitrary Code Execution https://youtu.be/wzcrHXngfcM Attack
> Imagick
> > through Ghostscript https://youtu.be/tPGm_ANDyOw
> >
>
> I don't think so, that is CVE-2016-7976 and is entirely unrelated to
> the issue being discussed, other than superficial similarity of the
> exploit.
>
> That issue was reported by me, and we discussed the ImageMagick and
> evince attack vectors at the time, you can check the archives if
> you're interested.
>
> http://seclists.org/oss-sec/2016/q4/29
>
> This issue (CVE-2017-8291) is a type confusion vulnerability (well,
> technically two vulnerabilities), and was found in the wild.
>
> Tavis.
>

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.