[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Bug binutils/23148] New: Heap buffer overflow in pe_print_edata

From: mgcho.minic at gmail dot com
Subject: [Bug binutils/23148] New: Heap buffer overflow in pe_print_edata
Date: Mon, 07 May 2018 14:36:28 +0000


            Bug ID: 23148
           Summary: Heap buffer overflow in pe_print_edata
           Product: binutils
           Version: 2.31 (HEAD)
            Status: UNCONFIRMED
          Severity: normal
          Priority: P2
         Component: binutils
          Assignee: unassigned at sourceware dot org
          Reporter: mgcho.minic at gmail dot com
  Target Milestone: ---

Created attachment 10999
  --> https://sourceware.org/bugzilla/attachment.cgi?id=10999&action=edit
POC to trigger bug

Triggered by "./objdump -x -W $POC"
Tested on Ubuntu 16.04 (x86)

Heap buffer overread occurred when processing malformed PE file.

The GDB debugging information is as follows:

ASAN output:

==25616==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xb5000a34 at
pc 0x08293f7a bp 0xbf8c66f8 sp 0xbf8c66ec
READ of size 1 at 0xb5000a34 thread T0
    #0 0x8293f79 in bfd_getl32
    #1 0x8527434 in pe_print_edata
    #2 0x852359a in _bfd_pe_print_private_bfd_data_common
    #3 0x84ed8f4 in pe_print_private_bfd_data
    #4 0x814737f in dump_bfd_private_header
    #5 0x8145d10 in dump_bfd
    #6 0x8145539 in display_object_bfd
    #7 0x8145425 in display_any_bfd
    #8 0x8144e8b in display_file
    #9 0x814457b in main
    #10 0xb74c3636 in __libc_start_main
    #11 0x806ca37 in _start


Mingi Cho and Taekyoung Kwon of the Information Security Lab, Yonsei

You are receiving this mail because:
You are on the CC list for the bug.

reply via email to

[Prev in Thread] Current Thread [Next in Thread]