(Please keep the bug's email address in Cc with any information on this
bug that is intended to be public.)

On 10/03/14 12:06, Gustavo Grieco wrote:
>     Have you already reported this bug to mp3gain's upstream developer
>     <http://mp3gain.sourceforge.net/> 
> 
> I haven't. Should I now?

You probably know more about this bug and its implications than I do, so
yes, please do. Please reply to this bug report with a link to the
upstream bug.

I must admit I'm rather surprised to see a member of a "team working in
vulnerability research" reporting this as a public bug to Debian without
having notified either upstream or the Debian security team privately.
Please consider practising responsible disclosure in future
vulnerability reports.

>     How did you find this overflow? Did you use a fuzzer or similar to
>     construct
>     your PoC, or did you locate a specific buffer that was overflowed by
>     inspecting the source code, or what?
> 
> In fact, no source code was used. For the vulnerability discovery, we
> used Mayhem combined with a new technique to fuzz based on automatic
> input detection and seed minimization.
> And for exploitation, we used a blackbox tool that automatically
> generate a working exploit. It is very effective (it requires to disable
> DEP and ASRL, but these are only additions to the exploitation process).
> We have hundreds of these small exploits, waiting for a response from
> the Debian Security team on how to submit them (since we don't want to
> SPAM them).

I think it's highly unlikely that the desired submission mechanism is
going to be "open public bugs in Debian without notifying the packages'
upstreams"...

> I'm not very familiar with the -fsanitize flag of gcc. Nevertheless, i
> think that enabling the full stack protection available in gcc
> (-fstack-protector-all) will be an effective mitigation.

I'm not so sure. It's already compiled with "-fstack-protector
--param=ssp-buffer-size=4", and the static buffer in question is
considerably larger than 4 bytes, so I don't see how
-fstack-protector-all would help us.

>From the buildd reports I've had back, it looks as though
-fsanitize=address only works on x86, so I'm going to have to undo this
mitigation on other architectures.

    S


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to