-
-
Notifications
You must be signed in to change notification settings - Fork 31.9k
stack buffer overflow of Record Object in msilib #96577
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Labels
type-bug
An unexpected behavior, bug, or error
Comments
Yeah, looks like this line should be using an array size calculation, not plain Line 487 in 95e271b
|
IIUC |
zooba
added a commit
to zooba/cpython
that referenced
this issue
Sep 6, 2022
zooba
added a commit
that referenced
this issue
Sep 7, 2022
miss-islington
pushed a commit
to miss-islington/cpython
that referenced
this issue
Sep 7, 2022
(cherry picked from commit 4114bcc) Co-authored-by: Steve Dower <[email protected]>
miss-islington
pushed a commit
to miss-islington/cpython
that referenced
this issue
Sep 7, 2022
(cherry picked from commit 4114bcc) Co-authored-by: Steve Dower <[email protected]>
miss-islington
pushed a commit
to miss-islington/cpython
that referenced
this issue
Sep 7, 2022
(cherry picked from commit 4114bcc) Co-authored-by: Steve Dower <[email protected]>
This was referenced Sep 7, 2022
miss-islington
pushed a commit
to miss-islington/cpython
that referenced
this issue
Sep 7, 2022
(cherry picked from commit 4114bcc) Co-authored-by: Steve Dower <[email protected]>
miss-islington
added a commit
that referenced
this issue
Sep 7, 2022
(cherry picked from commit 4114bcc) Co-authored-by: Steve Dower <[email protected]>
miss-islington
added a commit
that referenced
this issue
Sep 7, 2022
(cherry picked from commit 4114bcc) Co-authored-by: Steve Dower <[email protected]>
ned-deily
pushed a commit
that referenced
this issue
Sep 13, 2022
(cherry picked from commit 4114bcc) Co-authored-by: Steve Dower <[email protected]>
ambv
pushed a commit
that referenced
this issue
Oct 4, 2022
ambv
pushed a commit
that referenced
this issue
Oct 4, 2022
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
hello.
There is a stack buffer overflow of Record object in msilib
After brief analysis, I was able to find that implementation of Record.GetString methods has a stack overflow vulnerability.
It seem to be implemented in msi.pyd file.
Vulnerable code snippet is below. pccValueBuf is the length of MsiRecordGetStringW() API, szValueBuf is a output buffer also this buffer has 4000 byte space from rsp, which means 2000 size of WCHAR.
I think there is slight mistake to calculate the buffer size.
Despite WCHAR is 2 byte, output size is still 4000, therefore stack buffer overflow could be happen.
Test environment is Windows 10 as well as python version is 3.10.6
This bug can triggered by below PoC code.
Feel free to any question and If any what I have to know, please let me know.
Best Regards.
Thank you.
The text was updated successfully, but these errors were encountered: