Closed puppet-meteor closed 6 years ago
Thank you for reporting this! I'm not able to reproduce this bug with the latest sam2p HEAD (d2656beef486c55b53ae0d7e395d6610cc8ee744), so I'm closing this issue now. Feel free to report more issues, but please check that you have d2656beef486c55b53ae0d7e395d6610cc8ee744 or later checked out.
$ ./sam2p.asan POC_4 EPS: /dev/null
This is sam2p 0.49.4.
Available Loaders: PS PDF JAI PNG JPEG TIFF PNM BMP GIF LBM XPM PCX TGA.
Available Appliers: XWD Meta Empty BMP PNG TIFF6 TIFF6-JAI JPEG-JAI JPEG PNM GIF89a+LZW XPM PSL1C PSL23+PDF PSL2+PDF-JAI P-TrOpBb.
sam2p.asan: Error: BMP: Image too large.
There is a heap buffer overflow in input-bmp.ci:456 at sam2p 0.49.4. A crafted input will lead to denial of service attack.
Steps to Reproduce:
./sam2p POC_4 EPS: /dev/null
POC File: https://github.com/puppet-meteor/sam2p_POC/blob/master/POC_4
Information from addresssanitizer:
found by puppet@zju.edu.cn from NESA Lab in Zhejiang University.