Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 30 Mar 2016 14:43:21 -0300
From: Gustavo Grieco <gustavo.grieco@...il.com>
To: oss-security@...ts.openwall.com
Subject: CVE request: Heap overflow in VLC 2.1.6 processing wav files

Hi,

We found a buffer overflow in the parsing and processing of wav files in
VLC (version 2.1.6-0). It was tested in Ubuntu 14.04 (x86_64), but it will
probably affects other versions as well. Fortunately, it seems to be fixed
in the last release of VLC. Here you can see the gdb stack trace:

__memcpy_sse2_unaligned () at
../sysdeps/x86_64/multiarch/memcpy-sse2-unaligned.S:116
116 ../sysdeps/x86_64/multiarch/memcpy-sse2-unaligned.S: No existe el
archivo o el directorio.
(gdb) bt
#0 __memcpy_sse2_unaligned () at
../sysdeps/x86_64/multiarch/memcpy-sse2-unaligned.S:116
#1 0x00007ffff71436e9 in memcpy (__len=4290773038, __src=<optimized out>,
__dest=<optimized out>) at /usr/include/x86_64-linux-gnu/bits/string3.h:51
#2 AStreamPeekStream (s=<optimized out>, pp_peek=0x7fffea824988,
i_read=4294967276) at input/stream.c:1115
#3 0x00007fffdebb42b3 in ChunkFind (p_demux=p_demux@...ry=0x7fffd4c01828,
fcc=fcc@...ry=0x7fffdebb576b "fmt ", pi_size=pi_size@...ry=0x7fffea824a3c)
at wav.c:522
#4 0x00007fffdebb4761 in Open (p_this=0x7fffd4c01828) at wav.c:166
#5 0x00007ffff716d178 in module_load (obj=obj@...ry=0x7fffd4c01828,
m=m@...ry=0x7b92b0, init=init@...ry=0x7ffff716d0d0 <generic_start>,
args=args@...ry=0x7fffea824b50) at modules/modules.c:185
#6 0x00007ffff716d72e in vlc_module_load (obj=obj@...ry=0x7fffd4c01828,
capability=capability@...ry=0x7ffff71a4059 "demux", name=0x7ffff71a43bb "",
name@...ry=0x7fffd4c018e0 "", strict=<optimized out>,
probe=probe@...ry=0x7ffff716d0d0
<generic_start>) at modules/modules.c:277
#7 0x00007ffff716dc04 in module_need (obj=obj@...ry=0x7fffd4c01828,
cap=cap@...ry=0x7ffff71a4059 "demux", name=name@...ry=0x7fffd4c018e0 "",
strict=<optimized out>) at modules/modules.c:366
#8 0x00007ffff712cfbe in demux_New (p_obj=p_obj@...ry=0x7fffd00009b8,
p_parent_input=p_parent_input@...ry=0x7fffd00009b8,
psz_access=<optimized out>, psz_demux=0x7ffff71b9ca5 "",
psz_location=<optimized out>, s=<optimized out>, out=0x7fffd4000aa0,
b_quick=false)
at input/demux.c:188
#9 0x00007ffff7139d5d in InputSourceInit (p_input=p_input@...ry=0x7fffd00009b8,
in=<optimized out>, psz_mrl=<optimized out>,
psz_forced_demux=psz_forced_demux@...ry=0x0,
b_in_can_fail=b_in_can_fail@...ry=false) at input/input.c:2535
#10 0x00007ffff713ab6b in Init (p_input=p_input@...ry=0x7fffd00009b8) at
input/input.c:1225
#11 0x00007ffff713e0e6 in Run (obj=0x7fffd00009b8) at input/input.c:521
#12 0x00007ffff79a9182 in start_thread (arg=0x7fffea825700) at
pthread_create.c:312
#13 0x00007ffff74d247d in clone () at
../sysdeps/unix/sysv/linux/x86_64/clone.S:111

It is evident that the memcpy operation has an abnormally large size
parameter (4290773038). Find attached a test case to reproduce it.

Regards,
Gustavo.

[ CONTENT OF TYPE text/html SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ