Your message dated Wed, 8 Nov 2017 09:00:18 +0100
with message-id <[email protected]>
has caused the   report #881144,
regarding fig2dev: out of bound read while running fig2dev with -L pic option
to be marked as having been forwarded to the upstream software
author(s) Thomas Loimer <[email protected]>

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
881144: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881144
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Hi Thomas!

Here's a second security bug agains fig2dev, this time in the pic
driver.  This one is also reproducible on my system, so I can provide
more debug output if needed.

It's quite similar to #881143.

Greetings
Roland
--- Begin Message ---
Package: fig2dev
Version: 1:3.2.6a-4
Severity: important
Tags: security

out of bound read while running fig2dev with -L pic option

Running 'fig2dev -L pic poc' with the attached file raises out of bound read bug
which may allow a remote attack to cause a denial-of-service attack or 
information
disclosure with a crafted file.

I expected the program to terminate without segfault, but the program crashes 
as follow

=======================================================

june@yuweol:~/poc/fig2dev/crash2$ fig2dev -L pic ./poc
.PS
.ps 11
Segmentation fault

=======================================================

Program received signal SIGSEGV, Segmentation fault.
0x0000555555567960 in unpsfont (t=t@entry=0x555555810160) at psfonts.c:194
194   if (PSmapwarn[t->font+1])
(gdb) p t->font
$1 = 71111111
(gdb) bt
#0  0x0000555555567960 in unpsfont (t=t@entry=0x555555810160) at psfonts.c:194
#1  0x000055555558e282 in genpic_text (t=0x555555810160) at genpic.c:443
#2  0x00005555555615d2 in gendev_objects (dev=0x5555557ef200 <dev_pic>, 
objects=0x7fffffffe0f0)
    at fig2dev.c:833
#3  main (argc=<optimized out>, argv=<optimized out>) at fig2dev.c:467
(gdb) x/i $rip
=> 0x555555567960 <unpsfont+32>:  mov    (%rcx,%rdx,4),%ecx
(gdb) i r rcx rdx
rcx            0x5555555c3f60 93824992690016
rdx            0x43d11c8  71111112

=======================================================

This bug was found with a fuzzer developed by 'SoftSec' group at KAIST.

-- System Information:
Debian Release: buster/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'testing-debug'), (500, 
'stable-updates'), (500, 'testing'), (500, 'stable'), (1, 'experimental-debug')
Architecture: amd64 (x86_64)

Kernel: Linux 4.9.0-3-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages fig2dev depends on:
ii  gawk         1:4.1.4+dfsg-1
ii  libc6        2.24-17
ii  libpng16-16  1.6.34-1
ii  libxpm4      1:3.5.12-1
ii  x11-common   1:7.7+19

Versions of packages fig2dev recommends:
ii  ghostscript  9.22~dfsg-1
ii  netpbm       2:10.0-15.3+b2

Versions of packages fig2dev suggests:
pn  xfig  <none>

-- no debconf information

Attachment: poc
Description: Binary data


--- End Message ---

--- End Message ---

Reply via email to