*** This bug is a security vulnerability ***

Public security bug reported:

This bug was found while fuzzing graphicsmagick with afl-fuzz

Tested on hg changeset 14720:3b1f1e0c1098

Command: gm convert %s /dev/null

=================================================================
==11480==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xb6200414 at 
pc 0x89cbea0 bp 0xbfada168 sp 0xbfada160
READ of size 4 at 0xb6200414 thread T0
    #0 0x89cbe9f in ReadXPMImage 
/home/user/Desktop/graphicsmagick_fuzz_results/graphicsmagick/coders/xpm.c:409
    #1 0x8244d62 in ReadImage 
/home/user/Desktop/graphicsmagick_fuzz_results/graphicsmagick/magick/constitute.c:1607
    #2 0x812c3ac in ConvertImageCommand 
/home/user/Desktop/graphicsmagick_fuzz_results/graphicsmagick/magick/command.c:4348
    #3 0x8165066 in MagickCommand 
/home/user/Desktop/graphicsmagick_fuzz_results/graphicsmagick/magick/command.c:8862
    #4 0x81ed0dc in GMCommandSingle 
/home/user/Desktop/graphicsmagick_fuzz_results/graphicsmagick/magick/command.c:17338
    #5 0x81ea204 in GMCommand 
/home/user/Desktop/graphicsmagick_fuzz_results/graphicsmagick/magick/command.c:17391
    #6 0x80d4a76 in main 
/home/user/Desktop/graphicsmagick_fuzz_results/graphicsmagick/utilities/gm.c:61
    #7 0xb7539a82 in __libc_start_main 
/build/buildd/eglibc-2.19/csu/libc-start.c:287
    #8 0x80d4904 in _start 
(/home/user/Desktop/graphicsmagick_fuzz_results/graphicsmagick/utilities/gm+0x80d4904)

0xb6200414 is located 0 bytes to the right of 4-byte region 
[0xb6200410,0xb6200414)
allocated by thread T0 here:
    #0 0x80bd531 in __interceptor_malloc 
(/home/user/Desktop/graphicsmagick_fuzz_results/graphicsmagick/utilities/gm+0x80bd531)
    #1 0x839bb38 in MagickMalloc 
/home/user/Desktop/graphicsmagick_fuzz_results/graphicsmagick/magick/memory.c:156

SUMMARY: AddressSanitizer: heap-buffer-overflow 
/home/user/Desktop/graphicsmagick_fuzz_results/graphicsmagick/coders/xpm.c:409 
ReadXPMImage
Shadow bytes around the buggy address:
  0x36c40030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x36c40040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x36c40050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x36c40060: fa fa fa fa fa fa fa fa fa fa fd fd fa fa fd fd
  0x36c40070: fa fa fd fd fa fa fd fa fa fa fd fa fa fa 03 fa
=>0x36c40080: fa fa[04]fa fa fa 04 fa fa fa 00 02 fa fa 00 fa
  0x36c40090: fa fa fd fd fa fa fd fa fa fa fd fd fa fa fd fa
  0x36c400a0: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fd
  0x36c400b0: fa fa fd fa fa fa fd fa fa fa 00 06 fa fa 00 02
  0x36c400c0: fa fa fd fd fa fa 00 04 fa fa fd fd fa fa 00 04
  0x36c400d0: fa fa 00 04 fa fa 00 04 fa fa 00 04 fa fa 00 04
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:           00
  Partially addressable: 01 02 03 04 05 06 07 
  Heap left redzone:     fa
  Heap right redzone:    fb
  Freed heap region:     fd
  Stack left redzone:    f1
  Stack mid redzone:     f2
  Stack right redzone:   f3
  Stack partial redzone: f4
  Stack after return:    f5
  Stack use after scope: f8
  Global redzone:        f9
  Global init order:     f6
  Poisoned by user:      f7
  ASan internal:         fe
==11480==ABORTING

** Affects: graphicsmagick (Ubuntu)
     Importance: Undecided
         Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1537604

Title:
  heap-buffer-overflow in coders/xpm.c:409

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/graphicsmagick/+bug/1537604/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to