-
Recent Posts
Recent Comments
- strongcourage on Why I stopped fuzzing research
- Bob Friesenhahn on Why I stopped fuzzing research
- #gentoo dev: Why I stopped fuzzing research https://blogs.gentoo.or… | Dr. Roy Schestowitz (罗伊) on Why I stopped fuzzing research
- Ulya on Why I stopped fuzzing research
- ago on Install Gentoo in less than one minute
Archives
- February 2025
- July 2020
- April 2020
- March 2019
- October 2017
- September 2017
- August 2017
- July 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- July 2016
- February 2016
- July 2015
- August 2013
- June 2013
- May 2013
- January 2013
- December 2012
- November 2012
- October 2012
- August 2012
- July 2012
- June 2012
Categories
Meta
Category Archives: security
jasper: NULL pointer dereference in jp2_colr_destroy (jp2_cod.c)
Description: jasper is an open-source initiative to provide a free software-based reference implementation of the codec specified in the JPEG-2000 Part-1 standard. Another round of fuzzing on an updated version (1.900.5) revealed a NULL pointer access in jp2_colr_destroy The complete … Continue reading
Posted in advisories, security
Leave a comment
imagemagick: memory allocation failure in AcquireMagickMemory (memory.c)
Description: imagemagick is a software suite to create, edit, compose, or convert bitmap images. A fuzzing with the upstream security policy enabled revealed a memory allocation failure. The complete ASan output: # identify $FILE ==14275==ERROR: AddressSanitizer failed to allocate 0x99ad49000 … Continue reading
Posted in advisories, security
Leave a comment
jasper: double-free in mem_close (jas_stream.c)
Description: jasper is an open-source initiative to provide a free software-based reference implementation of the codec specified in the JPEG-2000 Part-1 standard. A fuzzing revelaled a double-free in mem_close. Since jasper seems to be dead for years, I first posted … Continue reading
Posted in advisories, security
Leave a comment
jasper: two divide-by-zero in jpc_dec_process_siz (jpc_dec.c)
Description: jasper is an open-source initiative to provide a free software-based reference implementation of the codec specified in the JPEG-2000 Part-1 standard. A fuzzing revelaled two divide-by-zero in jpc_dec_process_siz Since jasper seems to be dead for years, I first posted … Continue reading
Posted in advisories, security
Leave a comment
jasper: two NULL pointer dereference in bmp_getdata (bmp_dec.c)
Description: jasper is an open-source initiative to provide a free software-based reference implementation of the codec specified in the JPEG-2000 Part-1 standard. A fuzzing revelaled two NULL pointer access in bmp_getdata. Since jasper seems to be dead for years, I … Continue reading
Posted in advisories, security
Leave a comment
openssl: libcrypto: stack-based buffer overflow in ERR_error_string_n (err.c)
Description: openSSL is an open source project that provides a robust, commercial-grade, and full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. A fuzz of nginx, discovered a stack overflow that resides in libcrypto. After … Continue reading
Posted in advisories, security
Leave a comment
imagemagick: memory allocate failure in AcquireQuantumPixels (quantum.c)
Description: imagemagick is a software suite to create, edit, compose, or convert bitmap images. A fuzzing with the upstream security policy enabled revealed a memory allocate failure. The complete ASan output: # identify $FILE ==25084==WARNING: AddressSanitizer failed to allocate 0x46bf39483ac … Continue reading
Posted in advisories, security
Leave a comment
imagemagick: heap-based buffer overflow in IsPixelMonochrome (pixel-accessor.h)
Description: imagemagick is a software suite to create, edit, compose, or convert bitmap images. A fuzzing with the upstream security policy enabled revealed a buffer overflow read. The complete ASan output: # identify $FILE ==13198==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61400000fbc0 … Continue reading
Posted in advisories, security
Leave a comment
libdwarf: heap-based buffer overflow in _dwarf_get_size_of_val (dwarf_util.c)
Description: libdwarf is a library to consume and produce DWARF debug information. A fuzzing revealed an out bounds read, The complete ASan output: # dwarfdump $FILE ==22886==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61300000de1c at pc 0x000000462c7c bp 0x7ffe80a3d230 sp 0x7ffe80a3c9e0 READ … Continue reading
Posted in advisories, security
Leave a comment
libdwarf: heap-based buffer overflow in _dwarf_get_abbrev_for_code (dwarf_util.c)
Description: libdwarf is a library to consume and produce DWARF debug information. A fuzzing revealed an out bounds read, The complete ASan output: # dwarfdump $FILE ==24449==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6110000059ed at pc 0x000000606cd5 bp 0x7fff42bdc5f0 sp 0x7fff42bdc5e8 READ … Continue reading
Posted in advisories, security
Leave a comment