3 SEGV in MP4Box in gpac/gpac
Reported on
Oct 11th 2023
Description
3 SEGV in MP4Box
Version
$ ./MP4Box -version
MP4Box - GPAC version 2.3-DEV-rev566-g50c2ab06f-master
Platform
$ uname -a
Linux user-GE40-2PC-Dragon-Eyes 6.2.0-33-generic #33~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Thu Sep 7 10:33:52 UTC 2 x86_64 x86_64 x86_64 GNU/Linux
Reproduce
./MP4Box -dash 10000 poc
Credit
Gandalf4a
Impact
This vulnerability allows a remote attacker to cause a denial of service on an affected gpac MP4Box. Exploiting this vulnerability requires user interaction, as the target must access a malicious page or open a malicious file.
Occurrences
isoffin_load.c L92
SEGV in /gpac/bin/gcc/MP4Box+0x11cc00 in __sanitizer::internal_strlen(char const*)
poc
https://github.com/gandalf4a/crash_report/blob/main/gpac/MP4Box/poc2/segv_11cc
asan
/home/user/vul/MP4Box/crashes1/id000400sig11src000359time287654266execs2699429ophavocrep16
[32m[iso file] Unknown box type 110387F4
[0mAddressSanitizer:DEADLYSIGNAL
=================================================================
==741124==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x55e484f78c00 bp 0x7ffec5f6e230 sp 0x7ffec5f6d9e8 T0)
==741124==The signal is caused by a READ memory access.
==741124==Hint: address points to the zero page.
#0 0x55e484f78c00 in __sanitizer::internal_strlen(char const*) (/home/user/fuzzing_gpac/gpac/bin/gcc/MP4Box+0x11cc00) (BuildId: 53333ca7bff59dd9a3d1b2821e7c5f3a9aac76b9)
#1 0x55e484f4c461 in strdup (/home/user/fuzzing_gpac/gpac/bin/gcc/MP4Box+0xf0461) (BuildId: 53333ca7bff59dd9a3d1b2821e7c5f3a9aac76b9)
#2 0x7f475163175d in isor_get_chapters /home/user/fuzzing_gpac/gpac/src/filters/isoffin_load.c:92:20
#3 0x7f475163175d in isor_declare_track /home/user/fuzzing_gpac/gpac/src/filters/isoffin_load.c:1187:3
#4 0x7f475163e827 in isor_declare_objects /home/user/fuzzing_gpac/gpac/src/filters/isoffin_load.c:1728:3
#5 0x7f475164614f in isoffin_setup /home/user/fuzzing_gpac/gpac/src/filters/isoffin_read.c:181:6
#6 0x7f4751643443 in isoffin_configure_pid /home/user/fuzzing_gpac/gpac/src/filters/isoffin_read.c:477:9
#7 0x7f475130740c in gf_filter_pid_configure /home/user/fuzzing_gpac/gpac/src/filter_core/filter_pid.c:876:6
#8 0x7f47513262a6 in gf_filter_pid_connect_task /home/user/fuzzing_gpac/gpac/src/filter_core/filter_pid.c:1230:3
#9 0x7f475137d47b in gf_fs_thread_proc /home/user/fuzzing_gpac/gpac/src/filter_core/filter_session.c:2105:3
#10 0x7f475137b5cf in gf_fs_run /home/user/fuzzing_gpac/gpac/src/filter_core/filter_session.c:2405:3
#11 0x7f4750c2ac6a in gf_dasher_process /home/user/fuzzing_gpac/gpac/src/media_tools/dash_segmenter.c:1236:6
#12 0x55e484fc56dc in do_dash /home/user/fuzzing_gpac/gpac/applications/mp4box/mp4box.c:4831:15
#13 0x55e484fb6b6e in mp4box_main /home/user/fuzzing_gpac/gpac/applications/mp4box/mp4box.c:6245:7
#14 0x7f474fc29d8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16
#15 0x7f474fc29e3f in __libc_start_main csu/../csu/libc-start.c:392:3
#16 0x55e484ededd4 in _start (/home/user/fuzzing_gpac/gpac/bin/gcc/MP4Box+0x82dd4) (BuildId: 53333ca7bff59dd9a3d1b2821e7c5f3a9aac76b9)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV (/home/user/fuzzing_gpac/gpac/bin/gcc/MP4Box+0x11cc00) (BuildId: 53333ca7bff59dd9a3d1b2821e7c5f3a9aac76b9) in __sanitizer::internal_strlen(char const*)
==741124==ABORTING
SECURITY.md
exists
2 months ago
Can this vulnerability be applied for cve? As well as several other vulnerabilities I submitted.
Sure. I don't understand why it can't be done. @admin ?
There is another problem, huntr platform to submit vulnerabilities, a type of multiple vulnerabilities but can only mention a bounties, and finally are only assigned a cve number? This page, for example, is actually the same type of vulnerability that involves three different pieces of code. @benharvie