New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.
Starred by 1 user

Issue metadata

Status: Verified
Owner: ----
Closed: Apr 10
Cc:
Type: Bug-Security



Sign in to add a comment

botan/tls_client: Heap-buffer-overflow in void Botan::copy_mem<unsigned char>

Project Member Reported by ClusterFuzz-External, Apr 6

Issue description

Detailed report: https://oss-fuzz.com/testcase?key=4905819050082304

Project: botan
Fuzzer: libFuzzer_botan_tls_client
Fuzz target binary: tls_client
Job Type: libfuzzer_asan_botan
Platform Id: linux

Crash Type: Heap-buffer-overflow READ {*}
Crash Address: 0x615002f462a0
Crash State:
  void Botan::copy_mem<unsigned char>
  unsigned long Botan::buffer_insert<unsigned char, Botan::secure_allocator<unsign
  Botan::MDx_HashFunction::add_data
  
Sanitizer: address (ASAN)

Recommended Security Severity: Medium

Regressed: https://oss-fuzz.com/revisions?job=libfuzzer_asan_botan&range=201804010415:201804020417

Reproducer Testcase: https://oss-fuzz.com/download?testcase_id=4905819050082304

Issue filed automatically.

See https://github.com/google/oss-fuzz/blob/master/docs/reproducing.md for more information.

This bug is subject to a 90 day disclosure deadline. If 90 days elapse
without an upstream patch, then the bug report will automatically
become visible to the public.

When you fix this bug, please
  * mention the fix revision(s).
  * state whether the bug was a short-lived regression or an old bug in any stable releases.
  * add any other useful information.
This information can help downstream consumers.

If you have questions for the OSS-Fuzz team, please file an issue at https://github.com/google/oss-fuzz/issues.
 
Project Member

Comment 1 by ClusterFuzz-External, Apr 6

Labels: OS-Linux
Cannot reproduce this
I still cannot reproduce this from my normal dev environment but I can sporadically repro using the Docker images. I think I understand what is happening now, but need to write a test case that can reliably reproduce.
Have a reliable repro case now
CVE-2018-9860
Project Member

Comment 6 by ClusterFuzz-External, Apr 10

ClusterFuzz has detected this issue as fixed in range 201804090416:201804100418.

Detailed report: https://oss-fuzz.com/testcase?key=4905819050082304

Project: botan
Fuzzer: libFuzzer_botan_tls_client
Fuzz target binary: tls_client
Job Type: libfuzzer_asan_botan
Platform Id: linux

Crash Type: Heap-buffer-overflow READ {*}
Crash Address: 0x615002f462a0
Crash State:
  void Botan::copy_mem<unsigned char>
  unsigned long Botan::buffer_insert<unsigned char, Botan::secure_allocator<unsign
  Botan::MDx_HashFunction::add_data
  
Sanitizer: address (ASAN)

Recommended Security Severity: Medium

Regressed: https://oss-fuzz.com/revisions?job=libfuzzer_asan_botan&range=201804010415:201804020417
Fixed: https://oss-fuzz.com/revisions?job=libfuzzer_asan_botan&range=201804090416:201804100418

Reproducer Testcase: https://oss-fuzz.com/download?testcase_id=4905819050082304

See https://github.com/google/oss-fuzz/blob/master/docs/reproducing.md for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
Project Member

Comment 7 by ClusterFuzz-External, Apr 10

Labels: ClusterFuzz-Verified
Status: Verified (was: New)
ClusterFuzz testcase 4905819050082304 is verified as fixed, so closing issue as verified.

If this is incorrect, please file a bug on https://github.com/google/oss-fuzz/issues/new
Project Member

Comment 8 by sheriffbot@chromium.org, May 10

Labels: -restrict-view-commit
This bug has been fixed for 30 days. It has been opened to the public.

- Your friendly Sheriffbot

Sign in to add a comment