Closed zhunki closed 7 years ago
This is a good one, it bypasses this check for the size of the offset table:
if (offset_table + num_objects * offset_size >= plist_bin + length)
because offset_size is 0. I will add a check for the sanity of the offset_size. If you want your real name to appear in the log messages, you can specify it here, with your github email address, or submit a pull request.
sure. my name is Wang Junjie.
github email address?
zhunkibatu@gmail.com
Should be fixed with commit 26061aac4ec75e7a4469a9aab9a424716223e5c4
This was assigned CVE-2017-5835. http://seclists.org/oss-sec/2017/q1/279
Any plans for a new release? 1.12 is from 2014 and there have been many security fixes since then
there is a extra large memery allocation error which can be detected by addresssanitizer.
the source code around here are: bplist.used_indexes = (uint32_t)malloc(sizeof(uint32_t) num_objects); the num_objects equals to a very large number.
poc.txt