Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Buffer overflow in xls2csv (xlsparse.c:716) #7

Open
nafiez opened this issue May 4, 2018 · 1 comment
Open

Buffer overflow in xls2csv (xlsparse.c:716) #7

nafiez opened this issue May 4, 2018 · 1 comment

Comments

@nafiez
Copy link

nafiez commented May 4, 2018

There's an buffer overflow found during fuzzing. ASAN output:

==32764==ERROR: AddressSanitizer: global-buffer-overflow on address 0x08071990 at pc 0x08050bc2 bp 0xbf86a2c8 sp 0xbf86a2b8
READ of size 1 at 0x08071990 thread T0
#0 0x8050bc1 in format_rk /home/john/catdoc/src/xlsparse.c:716
#1 0x805290d in process_item /home/john/catdoc/src/xlsparse.c:325
#2 0x8054206 in do_table /home/john/catdoc/src/xlsparse.c:116
#3 0x804a7fb in main /home/john/catdoc/src/xls2csv.c:167
#4 0xb776e636 in __libc_start_main (/lib/i386-linux-gnu/libc.so.6+0x18636)
#5 0x804b5db (/usr/local/bin/xls2csv+0x804b5db)

0x08071990 is located 48 bytes to the left of global variable 'buffer' defined in 'charsets.c:291:14' (0x80719c0) of size 7
0x08071990 is located 0 bytes to the right of global variable 'rec' defined in 'xlsparse.c:22:22' (0x806d340) of size 18000
SUMMARY: AddressSanitizer: global-buffer-overflow /home/john/catdoc/src/xlsparse.c:716 format_rk
Shadow bytes around the buggy address:
0x2100e2e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x2100e2f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x2100e300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x2100e310: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x2100e320: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x2100e330: 00 00[f9]f9 f9 f9 f9 f9 07 f9 f9 f9 f9 f9 f9 f9
0x2100e340: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
0x2100e350: 04 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
0x2100e360: 04 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
0x2100e370: 04 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
0x2100e380: 04 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Heap right redzone: fb
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack partial redzone: f4
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
==32764==ABORTING

Test file:
case15841.zip

@nafiez
Copy link
Author

nafiez commented May 4, 2018

Reported to Ubuntu security team as the issue are valid with latest repo catdoc_0.94.3~git20160113.dbc9ec6+dfsg-1_i386

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant