Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sun, 11 Nov 2018 23:01:14 +0530
From: Dhiraj Mishra <mishra.dhiraj95@...il.com>
To: oss-security@...ts.openwall.com
Subject: Re: null-pointer dereference in poppler library

Later CVE-2018-19149 was assigned to this, because that fuzzing result
show's a very important vulnerability in a package currently shipped by a
major Linux distribution is still of interest, even if that Linux
distribution does not package the latest released upstream version.

For example, an out-of-bounds write finding is still very useful in that
case, but not out-of-bounds read, NULL pointer dereference,
divide-by-zero, etc.


Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19149

On Sat, Nov 10, 2018 at 4:22 PM Dhiraj Mishra <mishra.dhiraj95@...il.com>
wrote:

> ## Summary
>
> While fuzzing evince v3.28.4, on linux 4.15.0-38-generic (Ubuntu 18.04
> LTS), a null-pointer dereference was observed, initially this was reported
> to evince but the evince team advised that the issue is in poppler, the
> library used by evince to render PDF. Poppler version: 0.62.0-2ubuntu2.2 is
> vulnerable to null-pointer dereference, however the issue is already fixed
> in poppler 0.70, but this will still crash your evince v3.28.4 if poppler
> is not updated to v.0.70.
>
> ## Debug
>
> (gdb) run NullPointerDeference.h_134
> Starting program: /usr/bin/evince NullPointerDeference.h_134
> [Thread debugging using libthread_db enabled]
> Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
> [New Thread 0x7fd84d3cf700 (LWP 17587)]
> [New Thread 0x7fd84cbce700 (LWP 17588)]
> [New Thread 0x7fd84718c700 (LWP 17589)]
> [New Thread 0x7fd84651c700 (LWP 17594)]
> [New Thread 0x7fd845b0e700 (LWP 17596)]
> [New Thread 0x7fd83223e700 (LWP 17597)]
>
> Thread 7 "EvJobScheduler" received signal SIGSEGV, Segmentation fault.
> [Switching to Thread 0x7fd83223e700 (LWP 17597)]
> 0x00007fd8315f629a in _poppler_attachment_new(FileSpec*) () from
> /usr/lib/x86_64-linux-gnu/libpoppler-glib.so.8
> (gdb) bt
> #0  0x00007fd8315f629a in _poppler_attachment_new(FileSpec*) () at
> /usr/lib/x86_64-linux-gnu/libpoppler-glib.so.8
> #1  0x00007fd8315fa14a in poppler_annot_file_attachment_get_attachment ()
> at /usr/lib/x86_64-linux-gnu/libpoppler-glib.so.8
> #2  0x00007fd83183673d in  () at
> /usr/lib/x86_64-linux-gnu/evince/4/backends/libpdfdocument.so
> #3  0x00007fd8592c3bfa in  () at /usr/lib/x86_64-linux-gnu/libevview3.so.3
> #4  0x00007fd8592c5c02 in  () at /usr/lib/x86_64-linux-gnu/libevview3.so.3
> #5  0x00007fd856bbee85 in  () at /usr/lib/x86_64-linux-gnu/libglib-2.0.so.0
> #6  0x00007fd8565956db in start_thread (arg=0x7fd83223e700) at
> pthread_create.c:463
> #7  0x00007fd8562be88f in clone () at
> ../sysdeps/unix/sysv/linux/x86_64/clone.S:95
> (gdb) i r
> rax            0x0    0
> rbx            0x0    0
> rcx            0x0    0
> rdx            0x0    0
> rsi            0x7fd82c0587c0    140566428223424
> rdi            0x55720784c640    93948240774720
> rbp            0x7fd834004a90    0x7fd834004a90
> rsp            0x7fd83223d9e0    0x7fd83223d9e0
> r8             0xffffffffffffffb0    -80
> r9             0x10    16
> r10            0x7fd82c0008d0    140566427863248
> r11            0x1    1
> r12            0x7fd82c0587c0    140566428223424
> r13            0x7fd834004a80    140566562097792
> r14            0x5572072f5a60    93948235176544
> r15            0x0    0
> rip            0x7fd8315f629a    0x7fd8315f629a
> <_poppler_attachment_new(FileSpec*)+122>
> eflags         0x10206    [ PF IF RF ]
> cs             0x33    51
> ss             0x2b    43
> ds             0x0    0
> es             0x0    0
> fs             0x0    0
> gs             0x0    0
> (gdb) info reg ebp rip
> ebp            0x34004a90    872434320
> rip            0x7fd8315f629a    0x7fd8315f629a
> <_poppler_attachment_new(FileSpec*)+122>
> (gdb)
>
>

-- 
Regards

*Dhiraj Mishra.*GPG ID :  51720F56   |  Finger Print : 1F6A FC7B 05AA CF29
8C1C  ED65 3233 4D18 5172 0F56

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.