out-of-bounds read in coders/pict.c:633 EncodeImage
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
imagemagick (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
This bug was found while fuzzing ImageMagick with afl-fuzz
Tested on ImageMagick version d8382f9c0ffa520
Command: magick infile /dev/null
Build info:
#Configure command:
CC=afl-clang-fast CXX=afl-
#Make command:
CC=afl-clang-fast CXX=afl-
ASAN output:
=======
==5220==ERROR: AddressSanitizer: heap-buffer-
READ of size 1 at 0xb250a3ff thread T0
#0 0x86bb4a1 in EncodeImage /home/user/
#1 0x86b88da in WritePICTImage /home/user/
#2 0x8a96298 in WriteImage /home/user/
#3 0x8a99c7c in WriteImages /home/user/
#4 0x9375b7f in CLINoImageOperator /home/user/
#5 0x937d98f in CLIOption /home/user/
#6 0x910bea3 in ProcessCommandO
#7 0x910e325 in MagickImageCommand /home/user/
#8 0x9112809 in MagickCommandGe
#9 0x80de10d in MagickMain /home/user/
#10 0x80de10d in main /home/user/
#11 0xb7559a82 in __libc_start_main /build/
#12 0x80ddf34 in _start (/home/
0xb250a3ff is located 1 bytes to the left of 32768-byte region [0xb250a400,
allocated by thread T0 here:
#0 0x80c6b61 in malloc (/home/
#1 0x81939e9 in AcquireMagickMemory /home/user/
#2 0x81939e9 in AcquireQuantumM
#3 0x8a96298 in WriteImage /home/user/
#4 0x8a99c7c in WriteImages /home/user/
#5 0x9375b7f in CLINoImageOperator /home/user/
#6 0x937d98f in CLIOption /home/user/
#7 0x910bea3 in ProcessCommandO
SUMMARY: AddressSanitizer: heap-buffer-
Shadow bytes around the buggy address:
0x364a1420: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x364a1430: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x364a1440: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x364a1450: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x364a1460: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
=>0x364a1470: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa[fa]
0x364a1480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x364a1490: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x364a14a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x364a14b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x364a14c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Heap right redzone: fb
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack partial redzone: f4
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
ASan internal: fe
==5220==ABORTING
information type: | Private Security → Public Security |
summary: |
- heap-buffer-overflow in coders/pict.c:633 EncodeImage + out-of-bounds read in coders/pict.c:633 EncodeImage |
Changed in imagemagick (Ubuntu): | |
status: | New → Confirmed |
https:/ /github. com/ImageMagick /ImageMagick/ issues/ 80