{"id":1549,"date":"2017-03-31T17:17:34","date_gmt":"2017-03-31T15:17:34","guid":{"rendered":"http:\/\/blogs.gentoo.org\/ago\/?p=1549"},"modified":"2017-04-01T16:14:00","modified_gmt":"2017-04-01T14:14:00","slug":"podofo-four-null-pointer-dereference","status":"publish","type":"post","link":"https:\/\/blogs.gentoo.org\/ago\/2017\/03\/31\/podofo-four-null-pointer-dereference\/","title":{"rendered":"podofo: four null pointer dereference"},"content":{"rendered":"<p><strong>Description<\/strong>:<br \/>\n<a href=\"https:\/\/sourceforge.net\/projects\/podofo\/\">podofo<\/a> is a C++ library to work with the PDF file format.<\/p>\n<p>A fuzz on it through the podofotxtextract command line tool reavealed some NULL dereferences. This post will be forwarded on the upstream mailing list.<\/p>\n<p>The complete ASan output:<\/p>\n<pre><font size=\"2\"># podofotxtextract $FILE\r\n==21905==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f2e6fad8bd8 bp 0x7ffee4f96d10 sp 0x7ffee4f96ca0 T0)\r\n==21905==The signal is caused by a READ memory access.\r\n==21905==Hint: address points to the zero page.\r\n    #0 0x7f2e6fad8bd7 in PoDoFo::PdfPage::GetFromResources(PoDoFo::PdfName const&amp;, PoDoFo::PdfName const&amp;) \/tmp\/portage\/app-text\/podofo-0.9.5\/work\/podofo-0.9.5\/src\/doc\/PdfPage.cpp:614:20\r\n    #1 0x51dda3 in TextExtractor::ExtractText(PoDoFo::PdfMemDocument*, PoDoFo::PdfPage*) \/tmp\/portage\/app-text\/podofo-0.9.5\/work\/podofo-0.9.5\/tools\/podofotxtextract\/TextExtractor.cpp:98:47\r\n    #2 0x51d021 in TextExtractor::Init(char const*) \/tmp\/portage\/app-text\/podofo-0.9.5\/work\/podofo-0.9.5\/tools\/podofotxtextract\/TextExtractor.cpp:48:15\r\n    #3 0x539f6d in main \/tmp\/portage\/app-text\/podofo-0.9.5\/work\/podofo-0.9.5\/tools\/podofotxtextract\/podofotxtextract.cpp:52:17\r\n    #4 0x7f2e6db4e6ff in __libc_start_main \/tmp\/portage\/sys-libs\/glibc-2.23-r3\/work\/glibc-2.23\/csu\/..\/csu\/libc-start.c:289\r\n    #5 0x420d48 in _start (\/usr\/bin\/podofotxtextract+0x420d48)\r\n\r\nAddressSanitizer can not provide additional info.\r\nSUMMARY: AddressSanitizer: SEGV \/tmp\/portage\/app-text\/podofo-0.9.5\/work\/podofo-0.9.5\/src\/doc\/PdfPage.cpp:614:20 in PoDoFo::PdfPage::GetFromResources(PoDoFo::PdfName const&amp;, PoDoFo::PdfName const&amp;)\r\n<\/font><\/pre>\n<p><strong>Reproducer:<\/strong><br \/>\n<a href=\"https:\/\/github.com\/asarubbo\/poc\/blob\/master\/00250-podofo-nullptr1\">https:\/\/github.com\/asarubbo\/poc\/blob\/master\/00250-podofo-nullptr1<\/a><br \/>\n<strong>CVE:<\/strong><br \/>\nCVE-2017-7380<\/p>\n<p>##############################################################<\/p>\n<pre><font size=\"2\"># podofotxtextract $FILE\r\n==23885==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f44177e97b7 bp 0x7ffe130bed10 sp 0x7ffe130beca0 T0)\r\n==23885==The signal is caused by a READ memory access.\r\n==23885==Hint: address points to the zero page.\r\n    #0 0x7f44177e97b6 in PoDoFo::PdfPage::GetFromResources(PoDoFo::PdfName const&amp;, PoDoFo::PdfName const&amp;) \/tmp\/portage\/app-text\/podofo-0.9.5\/work\/podofo-0.9.5\/src\/doc\/PdfPage.cpp:609:23\r\n    #1 0x51dda3 in TextExtractor::ExtractText(PoDoFo::PdfMemDocument*, PoDoFo::PdfPage*) \/tmp\/portage\/app-text\/podofo-0.9.5\/work\/podofo-0.9.5\/tools\/podofotxtextract\/TextExtractor.cpp:98:47\r\n    #2 0x51d021 in TextExtractor::Init(char const*) \/tmp\/portage\/app-text\/podofo-0.9.5\/work\/podofo-0.9.5\/tools\/podofotxtextract\/TextExtractor.cpp:48:15\r\n    #3 0x539f6d in main \/tmp\/portage\/app-text\/podofo-0.9.5\/work\/podofo-0.9.5\/tools\/podofotxtextract\/podofotxtextract.cpp:52:17\r\n    #4 0x7f441585f6ff in __libc_start_main \/tmp\/portage\/sys-libs\/glibc-2.23-r3\/work\/glibc-2.23\/csu\/..\/csu\/libc-start.c:289\r\n    #5 0x420d48 in _start (\/usr\/bin\/podofotxtextract+0x420d48)\r\n\r\nAddressSanitizer can not provide additional info.\r\nSUMMARY: AddressSanitizer: SEGV \/tmp\/portage\/app-text\/podofo-0.9.5\/work\/podofo-0.9.5\/src\/doc\/PdfPage.cpp:609:23 in PoDoFo::PdfPage::GetFromResources(PoDoFo::PdfName const&amp;, PoDoFo::PdfName const&amp;)\r\n<\/font><\/pre>\n<p><strong>Reproducer:<\/strong><br \/>\n<a href=\"https:\/\/github.com\/asarubbo\/poc\/blob\/master\/00251-podofo-nullptr2\">https:\/\/github.com\/asarubbo\/poc\/blob\/master\/00251-podofo-nullptr2<\/a><br \/>\n<strong>CVE:<\/strong><br \/>\nCVE-2017-7381<\/p>\n<p>##############################################################<\/p>\n<pre><font size=\"2\"># podofotxtextract $FILE\r\n==20388==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f08c6a3c3de bp 0x7ffd52235bd0 sp 0x7ffd52235b20 T0)\r\n==20388==The signal is caused by a READ memory access.\r\n==20388==Hint: address points to the zero page.\r\n    #0 0x7f08c6a3c3dd in PoDoFo::PdfFontFactory::CreateFont(FT_LibraryRec_**, PoDoFo::PdfObject*) \/tmp\/portage\/app-text\/podofo-0.9.5\/work\/podofo-0.9.5\/src\/doc\/PdfFontFactory.cpp:200:88\r\n    #1 0x7f08c6a1028d in PoDoFo::PdfFontCache::GetFont(PoDoFo::PdfObject*) \/tmp\/portage\/app-text\/podofo-0.9.5\/work\/podofo-0.9.5\/src\/doc\/PdfFontCache.cpp:362:22\r\n    #2 0x51debb in TextExtractor::ExtractText(PoDoFo::PdfMemDocument*, PoDoFo::PdfPage*) \/tmp\/portage\/app-text\/podofo-0.9.5\/work\/podofo-0.9.5\/tools\/podofotxtextract\/TextExtractor.cpp:104:43\r\n    #3 0x51d021 in TextExtractor::Init(char const*) \/tmp\/portage\/app-text\/podofo-0.9.5\/work\/podofo-0.9.5\/tools\/podofotxtextract\/TextExtractor.cpp:48:15\r\n    #4 0x539f6d in main \/tmp\/portage\/app-text\/podofo-0.9.5\/work\/podofo-0.9.5\/tools\/podofotxtextract\/podofotxtextract.cpp:52:17\r\n    #5 0x7f08c4c9a6ff in __libc_start_main \/tmp\/portage\/sys-libs\/glibc-2.23-r3\/work\/glibc-2.23\/csu\/..\/csu\/libc-start.c:289\r\n    #6 0x420d48 in _start (\/usr\/bin\/podofotxtextract+0x420d48)\r\n\r\nAddressSanitizer can not provide additional info.\r\nSUMMARY: AddressSanitizer: SEGV \/tmp\/portage\/app-text\/podofo-0.9.5\/work\/podofo-0.9.5\/src\/doc\/PdfFontFactory.cpp:200:88 in PoDoFo::PdfFontFactory::CreateFont(FT_LibraryRec_**, PoDoFo::PdfObject*)\r\n<\/font><\/pre>\n<p><strong>Reproducer:<\/strong><br \/>\n<a href=\"https:\/\/github.com\/asarubbo\/poc\/blob\/master\/00251-podofo-nullptr3\">https:\/\/github.com\/asarubbo\/poc\/blob\/master\/00251-podofo-nullptr3<\/a><br \/>\n<strong>CVE:<\/strong><br \/>\nCVE-2017-7382<\/p>\n<p>##############################################################<\/p>\n<pre><font size=\"2\"># podofotxtextract $FILE\r\n==26727==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f4c23dd5e41 bp 0x7ffd6ce24bd0 sp 0x7ffd6ce24b20 T0)\r\n==26727==The signal is caused by a READ memory access.\r\n==26727==Hint: address points to the zero page.\r\n    #0 0x7f4c23dd5e40 in PoDoFo::PdfFontFactory::CreateFont(FT_LibraryRec_**, PoDoFo::PdfObject*) \/tmp\/portage\/app-text\/podofo-0.9.5\/work\/podofo-0.9.5\/src\/doc\/PdfFontFactory.cpp:195:62\r\n    #1 0x7f4c23daa28d in PoDoFo::PdfFontCache::GetFont(PoDoFo::PdfObject*) \/tmp\/portage\/app-text\/podofo-0.9.5\/work\/podofo-0.9.5\/src\/doc\/PdfFontCache.cpp:362:22\r\n    #2 0x51debb in TextExtractor::ExtractText(PoDoFo::PdfMemDocument*, PoDoFo::PdfPage*) \/tmp\/portage\/app-text\/podofo-0.9.5\/work\/podofo-0.9.5\/tools\/podofotxtextract\/TextExtractor.cpp:104:43\r\n    #3 0x51d021 in TextExtractor::Init(char const*) \/tmp\/portage\/app-text\/podofo-0.9.5\/work\/podofo-0.9.5\/tools\/podofotxtextract\/TextExtractor.cpp:48:15\r\n    #4 0x539f6d in main \/tmp\/portage\/app-text\/podofo-0.9.5\/work\/podofo-0.9.5\/tools\/podofotxtextract\/podofotxtextract.cpp:52:17\r\n    #5 0x7f4c220346ff in __libc_start_main \/tmp\/portage\/sys-libs\/glibc-2.23-r3\/work\/glibc-2.23\/csu\/..\/csu\/libc-start.c:289\r\n    #6 0x420d48 in _start (\/usr\/bin\/podofotxtextract+0x420d48)\r\n\r\nAddressSanitizer can not provide additional info.\r\nSUMMARY: AddressSanitizer: SEGV \/tmp\/portage\/app-text\/podofo-0.9.5\/work\/podofo-0.9.5\/src\/doc\/PdfFontFactory.cpp:195:62 in PoDoFo::PdfFontFactory::CreateFont(FT_LibraryRec_**, PoDoFo::PdfObject*)\r\n<\/font><\/pre>\n<p><strong>Reproducer:<\/strong><br \/>\n<a href=\"https:\/\/github.com\/asarubbo\/poc\/blob\/master\/00252-podofo-nullptr4\">https:\/\/github.com\/asarubbo\/poc\/blob\/master\/00252-podofo-nullptr4<\/a><br \/>\n<strong>CVE:<\/strong><br \/>\nCVE-2017-7383<\/p>\n<p>##############################################################<\/p>\n<p><strong>Affected version:<\/strong><br \/>\n0.9.5<\/p>\n<p><strong>Fixed version:<\/strong><br \/>\nN\/A<\/p>\n<p><strong>Commit fix:<\/strong><br \/>\nN\/A<\/p>\n<p><strong>Credit:<\/strong><br \/>\nThese bugs were discovered by Agostino Sarubbo of Gentoo.<\/p>\n<p><strong>Timeline:<\/strong><br \/>\n2017-03-31: bug discovered and reported to upstream<br \/>\n2017-03-31: blog post about the issue<br \/>\n2017-03-31: CVE assigned<\/p>\n<p><strong>Note:<\/strong><br \/>\nThese bugs were found with <a href=\"http:\/\/lcamtuf.coredump.cx\/afl\">American Fuzzy Lop<\/a>.<\/p>\n<p><strong>Permalink:<\/strong><\/p>\n<blockquote data-secret=\"YAbo28dFF9\" class=\"wp-embedded-content\"><p><a href=\"http:\/\/blogs.gentoo.org\/ago\/2017\/03\/31\/podofo-four-null-pointer-dereference\/\">podofo: four null pointer dereference<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" src=\"http:\/\/blogs.gentoo.org\/ago\/2017\/03\/31\/podofo-four-null-pointer-dereference\/embed\/#?secret=YAbo28dFF9\" data-secret=\"YAbo28dFF9\" width=\"600\" height=\"338\" title=\"&#8220;podofo: four null pointer dereference&#8221; &#8212; agostino&#039;s blog\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Description: podofo is a C++ library to work with the PDF file format. A fuzz on it through the podofotxtextract command line tool reavealed some NULL dereferences. This post will be forwarded on the upstream mailing list. The complete ASan &hellip; <a href=\"https:\/\/blogs.gentoo.org\/ago\/2017\/03\/31\/podofo-four-null-pointer-dereference\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":140,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[12,10],"tags":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2EaBc-oZ","_links":{"self":[{"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/posts\/1549"}],"collection":[{"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/users\/140"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/comments?post=1549"}],"version-history":[{"count":3,"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/posts\/1549\/revisions"}],"predecessor-version":[{"id":1565,"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/posts\/1549\/revisions\/1565"}],"wp:attachment":[{"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/media?parent=1549"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/categories?post=1549"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/tags?post=1549"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}