Closed rocklob closed 9 years ago
Hi @rocklob. Thanks for opening this issue. I've confirmed it and added some error handling code under @4912ed4bbdb88. However, I wonder if any tool is able to seek through the section content or list the imports of this DLL file. If so, we should be able to do the same.
I'm not familiar with similar tools, but if more samples that cause this issue would be helpful to you, I can probably find some.
Thanks for working this issue!
@merces: pedump isn't able, at least - http://pedump.me/c122f3f4f4e08e854ab387900b80fb5c/#pe
From its log:
[?] imports info beyond EOF [?] exports info beyond EOF [?] can't find file_offset of VA 0x338 [?] exports info beyond EO
Got it, @rocklob. @jweyrich, thanks for checking. I've tested with two other tools and got the same results. So, I'm closing this issue but I'll add tests with those binaries in our TODO list. Perhaps we can extend pev to parse more data from them. ;)
Thank you all.
@rocklob: I believe the issues you reported were fixed by @merces' commit. I ran both tools with that sample and they no longer crash.
I have come across a couple binaries that cause pehash and readpe to segfault. I uploaded an example of such a binary to malwr:
https://malwr.com/analysis/NmIwMDZkMTZlOTRkNDJkOTgzZDFhZTNhNTQ3ZWIxZjA/share/e09332fe54fc412ba2a995d3b9b9fd0d
(This is from the wild, so handle with care.)
On this sample, pehash gives me this output:
readpe gives me this: