Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 27 Jun 2012 12:04:24 +0530
From: Dhiru Kholia <dhiru.kholia@...il.com>
To: john-dev@...ts.openwall.com
Subject: SSH format crashes when built using "linux-x86-clang-debug"

Hi,

SSH format crashes when built using "linux-x86-clang-debug".

$ ../run/john -format=ssh -t
Benchmarking: SSH RSA/DSA (one 2048-bit RSA and one 1024-bit DSA key)
[32/32]...
==5844== ERROR: AddressSanitizer global-buffer-overflow on address
0x0832f51f at pc 0x816a88b bp 0xbff25f58 sp 0xbff25f50
READ of size 1 at 0x0832f51f thread T0
    #0 0x816a88b (/home/dsk/magnum-jumbo/run/john+0x816a88b)
    #1 0x816b321 (/home/dsk/magnum-jumbo/run/john+0x816b321)
    #2 0x818aeca (/home/dsk/magnum-jumbo/run/john+0x818aeca)
    #3 0x818467c (/home/dsk/magnum-jumbo/run/john+0x818467c)
    #4 0xb73723d5 (/lib/libc-2.15.so+0x193d5)
0x0832f51f is located 30 bytes to the right of global variable
'has_been_cracked (pdf_fmt.c)' (0x832f500) of size 1
  'has_been_cracked (pdf_fmt.c)' is ascii string ''
==5844== ABORTING
Stats: 0M malloced (1M for red zones) by 3262 calls
Stats: 0M realloced by 11 calls
Stats: 0M freed by 150 calls
Stats: 0M really freed by 0 calls
Stats: 32M (8196 full pages) mmaped in 8 calls
  mmaps   by size class: 8:16383; 9:8191; 10:4095; 11:2047; 12:1024;
13:512; 14:256; 17:32;
  mallocs by size class: 8:3209; 9:22; 10:3; 11:12; 12:5; 13:3; 14:1; 17:7;
  frees   by size class: 8:109; 9:22; 10:3; 11:10; 12:5; 13:1;
  rfrees  by size class:
Stats: malloc large: 7 small slow: 13
Shadow byte and word:
  0x21065ea3: f9
  0x21065ea0: 01 f9 f9 f9
More shadow bytes:
  0x21065e90: 00 00 00 00
  0x21065e94: 00 00 00 00
  0x21065e98: 00 00 00 f9
  0x21065e9c: f9 f9 f9 f9
=>0x21065ea0: 01 f9 f9 f9
  0x21065ea4: f9 f9 f9 f9
  0x21065ea8: 00 00 00 00
  0x21065eac: 01 f9 f9 f9
  0x21065eb0: f9 f9 f9 f9

$ addr2line -a 0x816a88b  -e ../run/john
0x0816a88b
/home/dsk/magnum-jumbo/src/bench.c:150

bench.c line 150 ==> two_salts[index] = mem_alloc(format->params.salt_size);

It seems the program is crashing when format->params.salt_size is
accessed. Any ideas why this is happening?

-- 
Cheers,
Dhiru

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.