Open hghwng opened 1 year ago
That's some really strong phrasing for an unchecked access bug in a WIP program found by a fuzzer...
Thank you for your feedback. I apologize if my phrasing seemed too strong, I was trying to categorize the bug following the convention. Should I omit the categorization in the future?
Not really, if you want to do that, go for it.
While fuzzing the "FuzzShellPosix" binary, a DoS attack has been discovered in
ParseLexer.cpp::reduce_start
. The bug is reproducible with the Base64-encoded inputPDwAAAAAAAAAAAAAAAAKCg==
. When running the FuzzShellPosix binary with the input, it crashes with the following error message:The root cause is the mis-handling the returned value from
Token::maybe_from_state
. The returned vector could be empty, thus the access to the the elements (.first()
in this case) should be checked first.https://github.com/SerenityOS/serenity/blob/4f496e97fe553ce392e2bc6860dcb701089c35ee/Userland/Shell/PosixLexer.cpp#L575