3 SEGV in MP4Box in gpac/gpac

Valid

Reported on

Oct 11th 2023


Description

3 SEGV in MP4Box

Version

$ ./MP4Box -version
MP4Box - GPAC version 2.3-DEV-rev566-g50c2ab06f-master

Platform

$ uname -a
Linux user-GE40-2PC-Dragon-Eyes 6.2.0-33-generic #33~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Thu Sep  7 10:33:52 UTC 2 x86_64 x86_64 x86_64 GNU/Linux

Reproduce

./MP4Box -dash 10000 poc

Credit

Gandalf4a

Impact

This vulnerability allows a remote attacker to cause a denial of service on an affected gpac MP4Box. Exploiting this vulnerability requires user interaction, as the target must access a malicious page or open a malicious file.

Occurrences

SEGV in /gpac/bin/gcc/MP4Box+0x11cc00 in __sanitizer::internal_strlen(char const*)

poc

https://github.com/gandalf4a/crash_report/blob/main/gpac/MP4Box/poc2/segv_11cc

asan

/home/user/vul/MP4Box/crashes1/id000400sig11src000359time287654266execs2699429ophavocrep16
[32m[iso file] Unknown box type 110387F4
[0mAddressSanitizer:DEADLYSIGNAL
=================================================================
==741124==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x55e484f78c00 bp 0x7ffec5f6e230 sp 0x7ffec5f6d9e8 T0)
==741124==The signal is caused by a READ memory access.
==741124==Hint: address points to the zero page.
    #0 0x55e484f78c00 in __sanitizer::internal_strlen(char const*) (/home/user/fuzzing_gpac/gpac/bin/gcc/MP4Box+0x11cc00) (BuildId: 53333ca7bff59dd9a3d1b2821e7c5f3a9aac76b9)
    #1 0x55e484f4c461 in strdup (/home/user/fuzzing_gpac/gpac/bin/gcc/MP4Box+0xf0461) (BuildId: 53333ca7bff59dd9a3d1b2821e7c5f3a9aac76b9)
    #2 0x7f475163175d in isor_get_chapters /home/user/fuzzing_gpac/gpac/src/filters/isoffin_load.c:92:20
    #3 0x7f475163175d in isor_declare_track /home/user/fuzzing_gpac/gpac/src/filters/isoffin_load.c:1187:3
    #4 0x7f475163e827 in isor_declare_objects /home/user/fuzzing_gpac/gpac/src/filters/isoffin_load.c:1728:3
    #5 0x7f475164614f in isoffin_setup /home/user/fuzzing_gpac/gpac/src/filters/isoffin_read.c:181:6
    #6 0x7f4751643443 in isoffin_configure_pid /home/user/fuzzing_gpac/gpac/src/filters/isoffin_read.c:477:9
    #7 0x7f475130740c in gf_filter_pid_configure /home/user/fuzzing_gpac/gpac/src/filter_core/filter_pid.c:876:6
    #8 0x7f47513262a6 in gf_filter_pid_connect_task /home/user/fuzzing_gpac/gpac/src/filter_core/filter_pid.c:1230:3
    #9 0x7f475137d47b in gf_fs_thread_proc /home/user/fuzzing_gpac/gpac/src/filter_core/filter_session.c:2105:3
    #10 0x7f475137b5cf in gf_fs_run /home/user/fuzzing_gpac/gpac/src/filter_core/filter_session.c:2405:3
    #11 0x7f4750c2ac6a in gf_dasher_process /home/user/fuzzing_gpac/gpac/src/media_tools/dash_segmenter.c:1236:6
    #12 0x55e484fc56dc in do_dash /home/user/fuzzing_gpac/gpac/applications/mp4box/mp4box.c:4831:15
    #13 0x55e484fb6b6e in mp4box_main /home/user/fuzzing_gpac/gpac/applications/mp4box/mp4box.c:6245:7
    #14 0x7f474fc29d8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16
    #15 0x7f474fc29e3f in __libc_start_main csu/../csu/libc-start.c:392:3
    #16 0x55e484ededd4 in _start (/home/user/fuzzing_gpac/gpac/bin/gcc/MP4Box+0x82dd4) (BuildId: 53333ca7bff59dd9a3d1b2821e7c5f3a9aac76b9)

AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV (/home/user/fuzzing_gpac/gpac/bin/gcc/MP4Box+0x11cc00) (BuildId: 53333ca7bff59dd9a3d1b2821e7c5f3a9aac76b9) in __sanitizer::internal_strlen(char const*)
==741124==ABORTING
We are processing your report and will contact the gpac team within 24 hours. 2 months ago
A GitHub Issue asking the maintainers to create a SECURITY.md exists 2 months ago
We have contacted a member of the gpac team and are waiting to hear back 2 months ago
gpac/gpac maintainer
2 months ago

https://github.com/gpac/gpac/issues/2633

gpac/gpac maintainer modified the Severity from Medium (6.8) to Medium (5.1) 2 months ago
The researcher has received a minor penalty to their credibility for miscalculating the severity: -1
gpac/gpac maintainer validated this vulnerability 2 months ago
gandalf4a has been awarded the disclosure bounty
The fix bounty is now up for grabs
The researcher's credibility has increased: +7
gpac/gpac maintainer marked this as fixed in 2.3.0-DEV with commit 7a6f63 2 months ago
The fix bounty has been dropped
This vulnerability will not receive a CVE
gpac/gpac maintainer published this vulnerability 2 months ago
isoffin_load.c#L92 has been validated
gandalf4a
2 months ago

Researcher


Can this vulnerability be applied for cve? As well as several other vulnerabilities I submitted.

gpac/gpac maintainer
2 months ago

Sure. I don't understand why it can't be done. @admin ?

Ben Harvie
2 months ago

Admin


CVE assigned as requested:)

gandalf4a
2 months ago

Researcher


There is another problem, huntr platform to submit vulnerabilities, a type of multiple vulnerabilities but can only mention a bounties, and finally are only assigned a cve number? This page, for example, is actually the same type of vulnerability that involves three different pieces of code. @benharvie

to join this conversation