bug-gnu-pspp
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

PSPP-BUG: [bug #54725] Assertion abort in pspp-dump-sav.c of libpspp


From: Peter Lemenkov
Subject: PSPP-BUG: [bug #54725] Assertion abort in pspp-dump-sav.c of libpspp
Date: Tue, 25 Sep 2018 07:19:14 -0400 (EDT)
User-agent: Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0

URL:
  <https://savannah.gnu.org/bugs/?54725>

                 Summary: Assertion abort in pspp-dump-sav.c of libpspp
                 Project: PSPP
            Submitted by: peter_lemenkov
            Submitted on: Вт. 25 сент. 2018 11:19:13
                Category: None
                Severity: 5 - Average
                  Status: None
             Assigned to: None
             Open/Closed: Open
         Discussion Lock: Any
                 Release: None
                  Effort: 0.00

    _______________________________________________________

Details:

Description of problem:

There is a assertion abort  in pspp-dump-sav.c  of  libpspp.


Version-Release number of selected component (if applicable):

<= latest version

How reproducible:

./pspp-dump-sav POC2


Steps to Reproduce:

The information is as follows:

$./pspp-dump-sav POC2
File header record:
             Product name: @(#) SPSS DATA FILE MS Windows Release 12.0 
spss$o32.dll  
 
              Layout code: 2
               Compressed: 1 (simple compression)
             Weight index: 2
          Number of cases: 10
         Compression bias: 100
            Creation date: 30    
            Creation time: 14:34:58
               File label: ""
...
pspp-dump-sav: utilities/pspp-dump-sav.c:1645: void read_string(struct
sfm_reader *, char *, size_t): Assertion `size > 0' failed.
Aborted

The GDB debugging information is as follows:

(gdb) set args POC2
(gdb) r
 ...
(gdb) s
read_string (r=<optimized out>, buffer=<optimized out>, size=<optimized out>)
at utilities/pspp-dump-sav.c:1645
1645      assert (size > 0);
(gdb) n
pspp-dump-sav: utilities/pspp-dump-sav.c:1645: void read_string(struct
sfm_reader *, char *, size_t): Assertion `size > 0' failed.

Program received signal SIGABRT, Aborted.
0x00007ffff709e1c7 in __GI_raise (address@hidden) at
../sysdeps/unix/sysv/linux/raise.c:55
55      ../sysdeps/unix/sysv/linux/raise.c: No such file or directory.
(gdb) bt
#0  0x00007ffff709e1c7 in __GI_raise (address@hidden) at
../sysdeps/unix/sysv/linux/raise.c:55
#1  0x00007ffff709fe2a in __GI_abort () at abort.c:89
#2  0x00007ffff70970bd in __assert_fail_base (fmt=0x7ffff71f8f78 "%s%s%s:%u:
%s%sAssertion `%s' failed.\n%n", 
    address@hidden "size > 0", address@hidden
"utilities/pspp-dump-sav.c", 
    address@hidden, address@hidden "void
read_string(struct sfm_reader *, char *, size_t)")
    at assert.c:92
#3  0x00007ffff7097172 in __GI___assert_fail (assertion=0x411fc9 "size > 0",
file=0x411fd2 "utilities/pspp-dump-sav.c", 
    line=1645, function=0x411fec "void read_string(struct sfm_reader *, char
*, size_t)") at assert.c:101
#4  0x000000000040c90d in read_string (r=<optimized out>, buffer=<optimized
out>, size=<optimized out>)
    at utilities/pspp-dump-sav.c:1645
#5  read_variable_record (r=<optimized out>) at utilities/pspp-dump-sav.c:454
#6  main (argc=<optimized out>, argv=<optimized out>) at
utilities/pspp-dump-sav.c:203


The vulnerability was triggered in read_string() at pspp-dump-sav.c:1645.

1643 read_string (struct sfm_reader *r, char *buffer, size_t size)
1644 {
1645   assert (size > 0);
1646   read_bytes (r, buffer, size - 1);
1647   buffer[size - 1] = '\0';
1648 }

Actual results:

crash

Expected results:

file contents dump

Additional info:

This vulnerability is detected by team OWL337, with our custom fuzzer collAFL.
Please contact address@hidden   and address@hidden if you need
more info about the team, the tool or the vulnerability.



    _______________________________________________________

File Attachments:


-------------------------------------------------------
Date: Вт. 25 сент. 2018 11:19:13  Name: POC2  Size: 528Б   By:
peter_lemenkov

<http://savannah.gnu.org/bugs/download.php?file_id=45092>

    _______________________________________________________

Reply to this item at:

  <https://savannah.gnu.org/bugs/?54725>

_______________________________________________
  Сообщение отправлено по Savannah
  https://savannah.gnu.org/




reply via email to

[Prev in Thread] Current Thread [Next in Thread]