<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Heap-Overflow on Arzedlab 🪵</title><link>https://arzedlab.github.io/tags/heap-overflow/</link><description>Recent content in Heap-Overflow on Arzedlab 🪵</description><generator>Hugo</generator><language>en-us</language><copyright>© Ravshan</copyright><lastBuildDate>Fri, 05 Apr 2024 00:00:00 +0000</lastBuildDate><atom:link href="https://arzedlab.github.io/tags/heap-overflow/index.xml" rel="self" type="application/rss+xml"/><item><title>Heap Overflow in assimp</title><link>https://arzedlab.github.io/posts/heap-overflow-%236019-1cc3648c0bf480caa958ecd9ef36c0f4/</link><pubDate>Fri, 05 Apr 2024 00:00:00 +0000</pubDate><guid>https://arzedlab.github.io/posts/heap-overflow-%236019-1cc3648c0bf480caa958ecd9ef36c0f4/</guid><description>&lt;h1 id="heap-overflow-6019">Heap Overflow #6019&lt;/h1>
&lt;h2 id="bug-heap-based-buffer-overflow-in-ai_md5_parse_string_in_quotation">&lt;strong>Bug: Heap-based Buffer Overflow in AI_MD5_PARSE_STRING_IN_QUOTATION&lt;/strong>&lt;/h2>
&lt;p>Source: &lt;a href="https://github.com/assimp/assimp/issues/6019">https://github.com/assimp/assimp/issues/6019&lt;/a>&lt;/p>
&lt;h3 id="summary">Summary&lt;/h3>
&lt;p>heap buffer overflow in &lt;code>AI_MD5_PARSE_STRING_IN_QUOTATION&lt;/code>. An attacker could potentially exploit the vulnerability to cause a remote code execution, if they can trick the victim into running assimp on a malformed MD5 file.&lt;/p>
&lt;p>Heap Overflow was caused by function &lt;code>memcpy&lt;/code>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#282a36;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-diff" data-lang="diff">&lt;span style="display:flex;">&lt;span>MEMCPY(3) Linux Programmer&amp;#39;s Manual MEMCPY(3)
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>NAME
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> memcpy - copy memory area
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>SYNOPSIS
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> #include &amp;lt;string.h&amp;gt;
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> void *memcpy(void *dest, const void *src, size_t n);
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>DESCRIPTION
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> The memcpy() function copies n bytes from memory area src to memory area dest. The memory areas must not overlap. Use memmove(3) if the memory areas do overlap.
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>RETURN VALUE
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> The memcpy() function returns a pointer to dest.
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>ATTRIBUTES
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> For an explanation of the terms used in this section, see attributes(7).
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;h3 id="acid-flow">ACID FLOW&lt;/h3>
&lt;p>ASAN giving heap overflow error in fucntion AI_MD5_PARSE_STRING_IN_QUOTATION&lt;/p></description></item></channel></rss>