{"id":2272,"date":"2017-09-19T09:53:59","date_gmt":"2017-09-19T07:53:59","guid":{"rendered":"http:\/\/blogs.gentoo.org\/ago\/?p=2272"},"modified":"2017-09-22T08:55:18","modified_gmt":"2017-09-22T06:55:18","slug":"bladeenc-global-buffer-overflow-in-iteration_loop-loop-c","status":"publish","type":"post","link":"https:\/\/blogs.gentoo.org\/ago\/2017\/09\/19\/bladeenc-global-buffer-overflow-in-iteration_loop-loop-c\/","title":{"rendered":"bladeenc: global buffer overflow in iteration_loop (loop.c)"},"content":{"rendered":"<p><strong>Description<\/strong>:<br \/>\n<a href=\"http:\/\/bladeenc.mp3.no\/\">bladeenc<\/a> is an mp3 encoder.<\/p>\n<p>There is a write overflow by default without a crafted file in the bladeenc command-line tool. The upstream website does not work anymore for me.<br \/>\nThe complete ASan output of the issue:<\/p>\n<pre><font size=\"2\"># bladeenc $FILE\r\n==15358==ERROR: AddressSanitizer: global-buffer-overflow on address 0x00000141c3b4 at pc 0x00000052afc8 bp 0x7ffcb9e50bb0 sp 0x7ffcb9e50ba8\r\nWRITE of size 4 at 0x00000141c3b4 thread T0\r\n    #0 0x52afc7 in iteration_loop \/var\/tmp\/portage\/media-sound\/bladeenc-0.94.2-r1\/work\/bladeenc-0.94.2\/bladeenc\/loop.c:728:20\r\n    #1 0x54fb91 in codecEncodeChunk \/var\/tmp\/portage\/media-sound\/bladeenc-0.94.2-r1\/work\/bladeenc-0.94.2\/bladeenc\/codec.c:353:2\r\n    #2 0x519694 in main \/var\/tmp\/portage\/media-sound\/bladeenc-0.94.2-r1\/work\/bladeenc-0.94.2\/bladeenc\/main.c:518:23\r\n    #3 0x7f3d35989680 in __libc_start_main \/var\/tmp\/portage\/sys-libs\/glibc-2.23-r4\/work\/glibc-2.23\/csu\/..\/csu\/libc-start.c:289\r\n    #4 0x419dc8 in getenv (\/usr\/bin\/bladeenc+0x419dc8)\r\n\r\n0x00000141c3b4 is located 44 bytes to the left of global variable 'lo_quant_s' defined in 'loop.c:372:17' (0x141c3e0) of size 156\r\n0x00000141c3b4 is located 0 bytes to the right of global variable 'hi_quant_l' defined in 'loop.c:370:17' (0x141c360) of size 84\r\nSUMMARY: AddressSanitizer: global-buffer-overflow \/var\/tmp\/portage\/media-sound\/bladeenc-0.94.2-r1\/work\/bladeenc-0.94.2\/bladeenc\/loop.c:728:20 in iteration_loop\r\nShadow bytes around the buggy address:\r\n  0x00008027b820: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\r\n  0x00008027b830: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\r\n  0x00008027b840: 00 00 00 f9 f9 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9\r\n  0x00008027b850: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 00 00 00\r\n  0x00008027b860: 00 00 00 00 00 00 00 f9 f9 f9 f9 f9 00 00 00 00\r\n=&gt;0x00008027b870: 00 00 00 00 00 00[04]f9 f9 f9 f9 f9 00 00 00 00\r\n  0x00008027b880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04\r\n  0x00008027b890: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00\r\n  0x00008027b8a0: 00 00 00 00 00 00 00 04 f9 f9 f9 f9 04 f9 f9 f9\r\n  0x00008027b8b0: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00\r\n  0x00008027b8c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\r\nShadow byte legend (one shadow byte represents 8 application bytes):\r\n  Addressable:           00\r\n  Partially addressable: 01 02 03 04 05 06 07 \r\n  Heap left redzone:       fa\r\n  Freed heap region:       fd\r\n  Stack left redzone:      f1\r\n  Stack mid redzone:       f2\r\n  Stack right redzone:     f3\r\n  Stack after return:      f5\r\n  Stack use after scope:   f8\r\n  Global redzone:          f9\r\n  Global init order:       f6\r\n  Poisoned by user:        f7\r\n  Container overflow:      fc\r\n  Array cookie:            ac\r\n  Intra object redzone:    bb\r\n  ASan internal:           fe\r\n  Left alloca redzone:     ca\r\n  Right alloca redzone:    cb\r\n==15358==ABORTING\r\nAborted\r\n<\/font><\/pre>\n<p><strong>Affected version:<\/strong><br \/>\n0.94.2<\/p>\n<p><strong>Fixed version:<\/strong><br \/>\nN\/A<\/p>\n<p><strong>Commit fix:<\/strong><br \/>\nN\/A<\/p>\n<p><strong>Credit:<\/strong><br \/>\nThis bug was discovered by Agostino Sarubbo of Gentoo.<\/p>\n<p><strong>CVE:<\/strong><br \/>\nCVE-2017-14648<\/p>\n<p><strong>Timeline:<\/strong><br \/>\n2017-09-19: bug discovered<br \/>\n2017-09-19: blog post about the issue<br \/>\n2017-09-21: CVE assigned<\/p>\n<p><strong>Note:<\/strong><br \/>\nThis bug was identified with bare metal servers donated by <a href=\"https:\/\/www.packet.net\/\">Packet<\/a>. This work is also supported by the <a href=\"https:\/\/www.coreinfrastructure.org\">Core Infrastructure Initiative<\/a>.<\/p>\n<p><strong>Permalink:<\/strong><\/p>\n<blockquote data-secret=\"GQbk4d2Wm1\" class=\"wp-embedded-content\"><p><a href=\"http:\/\/blogs.gentoo.org\/ago\/2017\/09\/19\/bladeenc-global-buffer-overflow-in-iteration_loop-loop-c\/\">bladeenc: global buffer overflow in iteration_loop (loop.c)<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" src=\"http:\/\/blogs.gentoo.org\/ago\/2017\/09\/19\/bladeenc-global-buffer-overflow-in-iteration_loop-loop-c\/embed\/#?secret=GQbk4d2Wm1\" data-secret=\"GQbk4d2Wm1\" width=\"600\" height=\"338\" title=\"&#8220;bladeenc: global buffer overflow in iteration_loop (loop.c)&#8221; &#8212; agostino&#039;s blog\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Description: bladeenc is an mp3 encoder. There is a write overflow by default without a crafted file in the bladeenc command-line tool. The upstream website does not work anymore for me. The complete ASan output of the issue: # bladeenc &hellip; <a href=\"https:\/\/blogs.gentoo.org\/ago\/2017\/09\/19\/bladeenc-global-buffer-overflow-in-iteration_loop-loop-c\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":140,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[12,10],"tags":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2EaBc-AE","_links":{"self":[{"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/posts\/2272"}],"collection":[{"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/users\/140"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/comments?post=2272"}],"version-history":[{"count":4,"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/posts\/2272\/revisions"}],"predecessor-version":[{"id":2283,"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/posts\/2272\/revisions\/2283"}],"wp:attachment":[{"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/media?parent=2272"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/categories?post=2272"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.gentoo.org\/ago\/wp-json\/wp\/v2\/tags?post=2272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}