out-of-bounds read in ./MagickCore/quantum-private.h:266

Bug #1537424 reported by Moshe Kaplan
256
This bug affects 1 person
Affects Status Importance Assigned to Milestone
imagemagick (Ubuntu)
Fix Released
Undecided
Unassigned

Bug Description

=================================================================
==20060==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xb5c071f1 at pc 0x8776e2c bp 0xbfd5ed18 sp 0xbfd5ed10
READ of size 1 at 0xb5c071f1 thread T0
    #0 0x8776e2b in PushShortPixel /home/user/Desktop/ImageMagick/./MagickCore/quantum-private.h:266
    #1 0x8776e2b in ReadPSDChannelPixels /home/user/Desktop/ImageMagick/coders/psd.c:866
    #2 0x87752db in ReadPSDChannelRaw /home/user/Desktop/ImageMagick/coders/psd.c:933
    #3 0x875d502 in ReadPSDMergedImage /home/user/Desktop/ImageMagick/coders/psd.c:1736
    #4 0x875d502 in ReadPSDImage /home/user/Desktop/ImageMagick/coders/psd.c:2004
    #5 0x8a9438a in ReadImage /home/user/Desktop/ImageMagick/MagickCore/constitute.c:494
    #6 0x8a9c1ff in ReadImages /home/user/Desktop/ImageMagick/MagickCore/constitute.c:844
    #7 0x9371649 in CLINoImageOperator /home/user/Desktop/ImageMagick/MagickWand/operation.c:4663
    #8 0x9379b31 in CLIOption /home/user/Desktop/ImageMagick/MagickWand/operation.c:5157
    #9 0x910713d in ProcessCommandOptions /home/user/Desktop/ImageMagick/MagickWand/magick-cli.c:474
    #10 0x910a4b5 in MagickImageCommand /home/user/Desktop/ImageMagick/MagickWand/magick-cli.c:786
    #11 0x910e999 in MagickCommandGenesis /home/user/Desktop/ImageMagick/MagickWand/mogrify.c:172
    #12 0x80de12d in MagickMain /home/user/Desktop/ImageMagick/utilities/magick.c:74
    #13 0x80de12d in main /home/user/Desktop/ImageMagick/utilities/magick.c:85
    #14 0xb7534a82 in __libc_start_main /build/buildd/eglibc-2.19/csu/libc-start.c:287
    #15 0x80ddf54 in _start (/usr/local/bin/magick+0x80ddf54)

0xb5c071f1 is located 0 bytes to the right of 1-byte region [0xb5c071f0,0xb5c071f1)
allocated by thread T0 here:
    #0 0x80c6b81 in malloc (/usr/local/bin/magick+0x80c6b81)
    #1 0x81932f9 in AcquireMagickMemory /home/user/Desktop/ImageMagick/MagickCore/memory.c:475
    #2 0x81932f9 in AcquireQuantumMemory /home/user/Desktop/ImageMagick/MagickCore/memory.c:548
    #3 0x8a9438a in ReadImage /home/user/Desktop/ImageMagick/MagickCore/constitute.c:494
    #4 0x8a9c1ff in ReadImages /home/user/Desktop/ImageMagick/MagickCore/constitute.c:844
    #5 0x9371649 in CLINoImageOperator /home/user/Desktop/ImageMagick/MagickWand/operation.c:4663
    #6 0x9379b31 in CLIOption /home/user/Desktop/ImageMagick/MagickWand/operation.c:5157
    #7 0x910713d in ProcessCommandOptions /home/user/Desktop/ImageMagick/MagickWand/magick-cli.c:474

SUMMARY: AddressSanitizer: heap-buffer-overflow /home/user/Desktop/ImageMagick/./MagickCore/quantum-private.h:266 PushShortPixel
Shadow bytes around the buggy address:
  0x36b80de0: fa fa 00 fa fa fa 00 fa fa fa 00 fa fa fa 00 fa
  0x36b80df0: fa fa 00 fa fa fa 00 fa fa fa 00 fa fa fa 00 fa
  0x36b80e00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x36b80e10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x36b80e20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
=>0x36b80e30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa[01]fa
  0x36b80e40: fa fa 00 00 fa fa 00 01 fa fa fd fd fa fa fd fd
  0x36b80e50: fa fa 00 fa fa fa fd fd fa fa fd fd fa fa 00 fa
  0x36b80e60: fa fa 00 fa fa fa 00 fa fa fa 00 fa fa fa 00 fa
  0x36b80e70: fa fa 00 fa fa fa 00 fa fa fa 00 fa fa fa 00 fa
  0x36b80e80: fa fa 00 fa fa fa 00 fa fa fa 00 fa fa fa 00 fa
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable: 00
  Partially addressable: 01 02 03 04 05 06 07
  Heap left redzone: fa
  Heap right redzone: fb
  Freed heap region: fd
  Stack left redzone: f1
  Stack mid redzone: f2
  Stack right redzone: f3
  Stack partial redzone: f4
  Stack after return: f5
  Stack use after scope: f8
  Global redzone: f9
  Global init order: f6
  Poisoned by user: f7
  ASan internal: fe
==20060==ABORTING

Revision history for this message
Moshe Kaplan (moshekaplan) wrote :

input file to trigger crash

Revision history for this message
Moshe Kaplan (moshekaplan) wrote :

This bug was found while fuzzing ImageMagick with afl-fuzz

Tested on git commit 87b213f9e2578611654a74ea0c6014367f4dc2fa

Command: magick $infile /dev/null

summary: - heap-buffer-overflow in ./MagickCore/quantum-private.h:266
+ out-of-bounds read in ./MagickCore/quantum-private.h:266
Revision history for this message
Moshe Kaplan (moshekaplan) wrote :
Changed in imagemagick (Ubuntu):
status: New → Confirmed
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package imagemagick - 8:6.9.6.6+dfsg-1ubuntu3

---------------
imagemagick (8:6.9.6.6+dfsg-1ubuntu3) zesty; urgency=medium

  * debian/patches/0020-Revert-GradientImage-change.patch: Revert patch
    per https://github.com/ImageMagick/ImageMagick/issues/316. Thanks
    to Cristy <email address hidden>. Closes LP: #1645406.

 -- Nishanth Aravamudan <email address hidden> Tue, 06 Dec 2016 17:26:36 +0100

Changed in imagemagick (Ubuntu):
status: Confirmed → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.