[Bug 1545183] Re: out-of-bounds read in ImageMagick/coders/viff.c:692:35

Emily Ratliff 1545183 at bugs.launchpad.net
Tue Jan 3 18:08:30 UTC 2017


This has been assigned CVE-2016-10065

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-10065

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to imagemagick in Ubuntu.
https://bugs.launchpad.net/bugs/1545183

Title:
  out-of-bounds read in ImageMagick/coders/viff.c:692:35

Status in imagemagick package in Ubuntu:
  Confirmed

Bug description:
  This bug was found while fuzzing ImageMagick with afl-fuzz

  Tested on ImageMagick git commit <unknown>

  Command: magick id:000097,sig:06,src:000777,op:flip4,pos:520 /dev/null

  =================================================================
  ==31884==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xb2eff494 at pc 0x8863b29 bp 0xbffefea8 sp 0xbffefea0
  READ of size 1 at 0xb2eff494 thread T0
      #0 0x8863b28 in ReadVIFFImage /home/user/Desktop/FuzzImageMagick/ImageMagick/coders/viff.c:692:35
      #1 0x8a8b8d8 in ReadImage /home/user/Desktop/FuzzImageMagick/ImageMagick/MagickCore/constitute.c:494
      #2 0x8a9374f in ReadImages /home/user/Desktop/FuzzImageMagick/ImageMagick/MagickCore/constitute.c:844
      #3 0x93759a9 in CLINoImageOperator /home/user/Desktop/FuzzImageMagick/ImageMagick/MagickWand/operation.c:4680
      #4 0x937de91 in CLIOption /home/user/Desktop/FuzzImageMagick/ImageMagick/MagickWand/operation.c:5174
      #5 0x910affd in ProcessCommandOptions /home/user/Desktop/FuzzImageMagick/ImageMagick/MagickWand/magick-cli.c:474
      #6 0x910e375 in MagickImageCommand /home/user/Desktop/FuzzImageMagick/ImageMagick/MagickWand/magick-cli.c:786
      #7 0x9112859 in MagickCommandGenesis /home/user/Desktop/FuzzImageMagick/ImageMagick/MagickWand/mogrify.c:172
      #8 0x80de16d in MagickMain /home/user/Desktop/FuzzImageMagick/ImageMagick/utilities/magick.c:74
      #9 0x80de16d in main /home/user/Desktop/FuzzImageMagick/ImageMagick/utilities/magick.c:85
      #10 0xb7477a82 in __libc_start_main /build/buildd/eglibc-2.19/csu/libc-start.c:287
      #11 0x80ddf94 in _start (/usr/local/bin/magick+0x80ddf94)

  0xb2eff494 is located 0 bytes to the right of 1447038100-byte region [0x5cafe800,0xb2eff494)
  allocated by thread T0 here:
      #0 0x80c6bc1 in malloc (/usr/local/bin/magick+0x80c6bc1)
      #1 0x81888e9 in AcquireMagickMemory /home/user/Desktop/FuzzImageMagick/ImageMagick/MagickCore/memory.c:475
      #2 0x81888e9 in AcquireQuantumMemory /home/user/Desktop/FuzzImageMagick/ImageMagick/MagickCore/memory.c:548
      #3 0x8a8b8d8 in ReadImage /home/user/Desktop/FuzzImageMagick/ImageMagick/MagickCore/constitute.c:494
      #4 0x8a9374f in ReadImages /home/user/Desktop/FuzzImageMagick/ImageMagick/MagickCore/constitute.c:844
      #5 0x93759a9 in CLINoImageOperator /home/user/Desktop/FuzzImageMagick/ImageMagick/MagickWand/operation.c:4680
      #6 0x937de91 in CLIOption /home/user/Desktop/FuzzImageMagick/ImageMagick/MagickWand/operation.c:5174
      #7 0x910affd in ProcessCommandOptions /home/user/Desktop/FuzzImageMagick/ImageMagick/MagickWand/magick-cli.c:474

  SUMMARY: AddressSanitizer: heap-buffer-overflow /home/user/Desktop/FuzzImageMagick/ImageMagick/coders/viff.c:692 ReadVIFFImage
  Shadow bytes around the buggy address:
    0x365dfe40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    0x365dfe50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    0x365dfe60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    0x365dfe70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    0x365dfe80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  =>0x365dfe90: 00 00[04]fa fa fa fa fa fa fa fa fa fa fa fa fa
    0x365dfea0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
    0x365dfeb0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
    0x365dfec0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
    0x365dfed0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
    0x365dfee0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  Shadow byte legend (one shadow byte represents 8 application bytes):
    Addressable:           00
    Partially addressable: 01 02 03 04 05 06 07 
    Heap left redzone:     fa
    Heap right redzone:    fb
    Freed heap region:     fd
    Stack left redzone:    f1
    Stack mid redzone:     f2
    Stack right redzone:   f3
    Stack partial redzone: f4
    Stack after return:    f5
    Stack use after scope: f8
    Global redzone:        f9
    Global init order:     f6
    Poisoned by user:      f7
    ASan internal:         fe
  ==31884==ABORTING

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1545183/+subscriptions



More information about the foundations-bugs mailing list