[issue41208] An exploitable segmentation fault in marshal module

2020-07-12 Thread Iman Sharafodin
Iman Sharafodin added the comment: @serhiy.storchaka Thank you. Please find it here https://bugs.python.org/issue41288 . -- ___ Python tracker <https://bugs.python.org/issue41

[issue41288] Pickle crashes using a crafted datetime object

2020-07-12 Thread Iman Sharafodin
New submission from Iman Sharafodin : The following code generates a segfault on the Pickle module [it's a crafted datetime object] (Python 3.10.0a0 (heads/master:b40e434, Jul 4 2020), Python 3.6.11 and Python 3.7.2): import io import pickle hex_s

[issue41208] An exploitable segmentation fault in marshal module

2020-07-12 Thread Iman Sharafodin
Iman Sharafodin added the comment: @serhiy.storchaka you name it, you have it. The following code generates a segfault on the Pickle module [it's a crafted datetime object] (Python 3.10.0a0 (heads/master:b40e434, Jul 4 2020), Python 3.6.11 and Python 3.7.2): import io import p

[issue41208] An exploitable segmentation fault in marshal module

2020-07-12 Thread Iman Sharafodin
Iman Sharafodin added the comment: There are many online Python interpreters, we can use this malicious file to escape their sandboxes and get control of their Docker container or system (and abuse them, for example, to conduct a DoS attack), as their fully trust that Python doesn&#

[issue41208] An exploitable segmentation fault in marshal module

2020-07-11 Thread Iman Sharafodin
Iman Sharafodin added the comment: Nevertheless, I have an exploitable crash for the Pickle module too right now, but as you're not interested, I didn't open an issue to share it. Thanks anyway. -- ___ Python tracker <https://bu

[issue41208] An exploitable segmentation fault in marshal module

2020-07-06 Thread Iman Sharafodin
Iman Sharafodin added the comment: Sure. Thank you. -- ___ Python tracker <https://bugs.python.org/issue41208> ___ ___ Python-bugs-list mailing list Unsub

[issue41208] An exploitable segmentation fault in marshal module

2020-07-06 Thread Iman Sharafodin
Iman Sharafodin added the comment: It's interesting that you would not count a critical segfault in Pickle as a threat, because there are numerous libraries that are Unpickling untrusted user data (even-though some of them are using RestrictedUnpickler to protect themselves but a seg

[issue41208] An exploitable segmentation fault in marshal module

2020-07-06 Thread Iman Sharafodin
Iman Sharafodin added the comment: I thought it's like Pickle. Then if we find an exploitable segfault just in Pickle, you would count it as a threat? -- ___ Python tracker <https://bugs.python.org/is

[issue41208] An exploitable segmentation fault in marshal module

2020-07-06 Thread Iman Sharafodin
Iman Sharafodin added the comment: What about patching that as a crash? -- ___ Python tracker <https://bugs.python.org/issue41208> ___ ___ Python-bugs-list m

[issue41208] An exploitable segmentation fault in marshal module

2020-07-06 Thread Iman Sharafodin
Iman Sharafodin added the comment: By using our proprietary fuzzer. I'm a cybersecurity researcher. -- ___ Python tracker <https://bugs.python.org/is

[issue41208] An exploitable segmentation fault in marshal module

2020-07-04 Thread Iman Sharafodin
New submission from Iman Sharafodin : It seems that all versions of Python 3 are vulnerable to de-marshaling the attached file (Python file is included). I've tested on Python 3.10.0a0 (heads/master:b40e434, Jul 4 2020), Python 3.6.11 and Python 3.7.2. This is due to lack of p

[issue41189] An exploitable segmentation fault in _PyEval_EvalFrameDefault

2020-07-01 Thread Iman Sharafodin
Iman Sharafodin added the comment: Thank you for the response. -- ___ Python tracker <https://bugs.python.org/issue41189> ___ ___ Python-bugs-list mailin

[issue41189] An exploitable segmentation fault in _PyEval_EvalFrameDefault

2020-07-01 Thread Iman Sharafodin
Iman Sharafodin added the comment: You're right. But if someone uses the exact same code to decompile a pyc to a Python code, attacker doesn't have access to the interpreter and cannot even run the pyc file on the server, but the attacker can cause a crash and run the malicious ex

[issue41189] An exploitable segmentation fault in _PyEval_EvalFrameDefault

2020-07-01 Thread Iman Sharafodin
Iman Sharafodin added the comment: It could be potential dangerous, for example some services might use Python Core to decompile pyc files and they could be hacked or some other services could run restricted pyc files for users but using this bug they can escape the sandbox and run the

[issue41189] An exploitable segmentation fault in _PyEval_EvalFrameDefault

2020-07-01 Thread Iman Sharafodin
Iman Sharafodin added the comment: I created a Python file with 12 lines of code and then changed the bytecode to make Python crash (I was testing Python to find security related bugs). I can send the original file, do you need that

[issue41189] An exploitable segmentation fault in _PyEval_EvalFrameDefault

2020-07-01 Thread Iman Sharafodin
New submission from Iman Sharafodin : Python 3.6 (June 27, 2020) (https://www.python.org/ftp/python/3.6.11/Python-3.6.11.tgz). I found an exploitable segmentation fault in Python 3.6.11 (I validated that by using GDB's Exploitable plugin). Please find the attachment. #0 0x00b

[issue41168] Lack of proper checking in PyObject_SetAttr leads to segmentation fault

2020-06-30 Thread Iman Sharafodin
New submission from Iman Sharafodin : I was testing the latest release of Python 3.6 (June 27, 2020) (https://www.python.org/ftp/python/3.6.11/Python-3.6.11.tgz) and I found that there is lack of enough checks on line number 956 in Objects/object.c file which can cause a segmentation fault