memory overflow vulnerability in OpenEXR-viewer
Critical severity
GitHub Reviewed
Published
Dec 10, 2023
in
afichet/openexr-viewer
•
Updated Dec 12, 2023
Description
Published by the National Vulnerability Database
Dec 11, 2023
Published to the GitHub Advisory Database
Dec 12, 2023
Reviewed
Dec 12, 2023
Last updated
Dec 12, 2023
Just open this exr file through openexr-viewer.
( poc send by email )
This is windbg log file.
[ POC 2 ]
(8660.7e44): Access violation - code c0000005 (!!! second chance !!!)
openexr_viewer+0x27be4:
00007ff7
13ff7be4 c744880c0000803f mov dword ptr [rax+rcx*4+0Ch],3F800000h ds:0000020a
3ac8000c=????????Attempt to write the value 1.0 to the memory address 0x20A3AC8000C
[ POC 1 ]
(1404.9264): Access violation - code c0000005 (first chance)
First chance exceptions are reported before any exception handling.
This exception may be expected and handled.
openexr_viewer+0x27be4:
00007ff7
13ff7be4 c744880c0000803f mov dword ptr [rax+rcx*4+0Ch],3F800000h ds:0000029c
b371600c=????????Attempt to write the value 1.0 to the memory address 0x29CB371600C
Credits
Team : ZeroPointer
이동하 ( Lee Dong Ha of ZeroPointer Lab )
정지민 ( Jeong Jimin of ZeroPointer Lab )
박우진 ( Park Woojin of ZeroPointer Lab )
전우진 ( Jeon Woojin of ZeroPointer Lab )
References