fix bNetStr2Bstr: prevent OOB read on crafted netstring length#149
Open
fix bNetStr2Bstr: prevent OOB read on crafted netstring length#149
Conversation
The declared length field is parsed into `x` with an overflow guard against INT_MAX, but there was no check that `i + 1 + x` falls within the actual buffer before accessing `buff[i + 1 + x]` to verify the terminating comma. A crafted input such as "99999999:.<data>" causes the parser to set x = 99999999 and then read `buff[100000008]`, triggering a SEGV. Found by libFuzzer + ASan. Fix: compute `blen = strlen(buff)` on entry and return NULL if `(size_t)i + 1 + (size_t)x >= blen` before the terminator check. The bug was detected by libFuzzer fuzz testing.
|
Minimum allowed coverage is Generated by 🐒 cobertura-action against a7eab38 |
Replace strlen with memchr(buff, '\0', i + 2 + x), limiting the scan to exactly the bytes a valid netstring of the claimed length requires. If a null byte appears before the expected comma position the buffer is truncated and NULL is returned. memchr is C89 standard, replacing the non-portable strnlen.
|
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.



The declared length field is parsed into
xwith an overflow guard against INT_MAX, but there was no check thati + 1 + xfalls within the actual buffer before accessingbuff[i + 1 + x]to verify the terminating comma.A crafted input such as "99999999:." causes the parser to set x = 99999999 and then read
buff[100000008], triggering a SEGV. Found by libFuzzer + ASan.Fix: compute
blen = strlen(buff)on entry and return NULL if(size_t)i + 1 + (size_t)x >= blenbefore the terminator check.The bug was detected by libFuzzer fuzz testing.