Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2016-8389: TALOS-2016-0214 || Cisco Talos Intelligence Group

An exploitable integer-overflow vulnerability exists within Iceni Argus. When it attempts to convert a malformed PDF to XML, it will attempt to convert each character from a font into a polygon and then attempt to rasterize these shapes. As the application attempts to iterate through the rows and initializing the polygon shape in the buffer, it will write outside of the bounds of said buffer. This can lead to code execution under the context of the account running it.

CVE
#vulnerability#mac#cisco#js#intel#pdf#buffer_overflow

Summary

An exploitable integer-overflow vulnerability exists within Iceni Argus. When it attempts to convert a malformed PDF to XML, it will attempt to convert each character from a font into a polygon and then attempt to rasterize these shapes. When rasterizing these shapes, the tool will perform a multiplication to determine the bounds at which the shape can be filled as well as use it to perform an allocation. Due to a lack of bounds checking, this multiplication can result in an integer larger than 32-bits which is an integer overflow. As the application attempts to iterate through the rows and initializing the polygon shape in the buffer, it will write outside of the bounds of said buffer. This can lead to code execution under the context of the account running it.

Tested Versions

Iceni Argus Version 6.6.04 (Sep 7 2012) NK

Product URLs

http://www.iceni.com/legacy.htm

CVSSv3 Score

8.8 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Details

This is an integer overflow that occurs in Iceni Argus. This tool is used primarily by MarkLogic Server to convert PDF files to (X)HTML form. Due to the integer overflow, two different lengths will be used for an allocation and for a copy. The object that contains the objects with the sizes which are used in the overflow is created in the ripPDF function. Inside this function an object of size 0xadf8 is allocated.

 8175f06:   c7 04 24 f8 ad 00 00    movl   $0xadf8,(%esp)
 8175f0d:   89 85 d8 f9 ff ff       mov    %eax,-0x628(%ebp)        ; size
 8175f13:   8d 83 dd f1 49 ff       lea    -0xb60e23(%ebx),%eax     ; "RENDER"
 8175f19:   89 44 24 04             mov    %eax,0x4(%esp)
 8175f1d:   e8 4e b6 02 00          call   81a1570 <icnMalloc>
 8175f22:   85 c0                   test   %eax,%eax
 8175f24:   89 c7                   mov    %eax,%edi
 8175f26:   0f 84 be 03 00 00       je     81762ea <ripPDF+0x40a>

For every single text item inside the document that uses the showTextOld opcode, the showTextOld function is called. Inside this function the addFontToStoredFonts function will copy a pointer from the +4 field (+0xaa0c:4) into the +8 field (+0xaa0c:8) of the 0xadf8 sized object.

 817888c:   8b 45 e4                mov    -0x1c(%ebp),%eax
 817888f:   89 44 24 14             mov    %eax,0x14(%esp)
 8178893:   8b 8d ec fd ff ff       mov    -0x214(%ebp),%ecx
 8178899:   89 4c 24 10             mov    %ecx,0x10(%esp)
 817889d:   8b 45 08                mov    0x8(%ebp),%eax       ; 0xadf8 object
 81788a0:   89 44 24 0c             mov    %eax,0xc(%esp)
 81788a4:   8b 55 18                mov    0x18(%ebp),%edx
 81788a7:   89 54 24 08             mov    %edx,0x8(%esp)
 81788ab:   8b 4d 0c                mov    0xc(%ebp),%ecx
 81788ae:   89 4c 24 04             mov    %ecx,0x4(%esp)
 81788b2:   8b 45 14                mov    0x14(%ebp),%eax
 81788b5:   89 04 24                mov    %eax,(%esp)
 81788b8:   e8 63 26 15 00          call   82caf20 <addFontToStoredFonts>
\
 82cb0fa:   8b 45 14                mov    0x14(%ebp),%eax
 82cb0fd:   8b 90 0c aa 00 00       mov    0xaa0c(%eax),%edx    ; +0xaa0c
 82cb103:   8b 45 1c                mov    0x1c(%ebp),%eax
 82cb106:   8b 4a 04                mov    0x4(%edx),%ecx       ; +0xaa0c:4 to %ecx
 82cb109:   89 81 d4 00 00 00       mov    %eax,0xd4(%ecx)
 82cb10f:   8b 02                   mov    (%edx),%eax
 82cb111:   89 4a 08                mov    %ecx,0x8(%edx)       ; write to +0xaa0c:8
 82cb114:   85 c0                   test   %eax,%eax
 82cb116:   74 08                   je     82cb120 <addFontToStoredFonts+0x200>

For each character, the tool will processor a character, convert it into a TextPath and then convert it into a polygon. After a polygon is completed, the tool will call enumPolys to fill each of the polygons. While calling enumPolys the application will execute the following code in processText. This code will take the product of the dword at 0x108(%esi) and the one at 0x10c(%esi) and store it in %edi at 0x821432d. Later this register will be passed as an argument to icnMalloc at 0x821434d which will allocate space that will later be written to. Due to a missing check that the product of these two values are not larger than 31-bits, the resulting product may wrap which will cause the allocation size to be smaller than expected. The buffer that’s allocated will then be written to +0x108 (+0xaa0c:8:108) of the 0xadf8 object. These lengths will later be used as boundaries for rasterizing a polygon.

 8214fc5:   c7 04 24 00 00 00 00    movl   $0x0,(%esp)
 8214fcc:   8b 55 08                mov    0x8(%ebp),%edx
 8214fcf:   89 f1                   mov    %esi,%ecx
 8214fd1:   8b 45 14                mov    0x14(%ebp),%eax
 8214fd4:   e8 f7 eb ff ff          call   8213bd0 <processText>    ; \
\
 8213c9d:   8b 40 08                mov    0x8(%eax),%eax
 8213ca0:   85 f6                   test   %esi,%esi
 8213ca2:   89 45 e0                mov    %eax,-0x20(%ebp)
...
 8214317:   6b 45 dc 54             imul   $0x54,-0x24(%ebp),%eax
 821431b:   8b 55 e0                mov    -0x20(%ebp),%edx
 821431e:   8d 34 10                lea    (%eax,%edx,1),%esi
 8214321:   8b 86 08 01 00 00       mov    0x108(%esi),%eax
 8214327:   8b be 10 01 00 00       mov    0x110(%esi),%edi     ; XXX: size > 16-bits
 821432d:   0f af be 0c 01 00 00    imul   0x10c(%esi),%edi     ; XXX: size > 16-bits
 8214334:   85 c0                   test   %eax,%eax
 8214336:   74 08                   je     8214340 <processText+0x770>
...
 8214340:   8d 83 3f 21 4a ff       lea    -0xb5dec1(%ebx),%eax
 8214346:   89 44 24 04             mov    %eax,0x4(%esp)       ; XXX: allocation size
 821434a:   89 3c 24                mov    %edi,(%esp)
 821434d:   e8 1e d2 f8 ff          call   81a1570 <icnMalloc>
 8214352:   85 c0                   test   %eax,%eax
 8214354:   89 86 08 01 00 00       mov    %eax,0x108(%esi)

Later while filling a polygon, the tool will load these values into the floating point co-processor to perform some math. Afterwards, the instructions will store the results as integers into variables on the stack at -0x98(%ebp) and -0xa0(%ebp). The first Y index will also be stored in integer form at -0x14(%ebp) and within the %esi register.

 82b0fff:   d9 07                   flds   (%edi)
 82b1001:   d9 95 5c ff ff ff       fsts   -0xa4(%ebp)      ; X
 82b1007:   d9 47 10                flds   0x10(%edi)
 82b100a:   d9 7d f2                fnstcw -0xe(%ebp)       ; fpcw
 82b100d:   d9 95 60 ff ff ff       fsts   -0xa0(%ebp)      ; Y
 82b1013:   d9 c9                   fxch   %st(1)
 82b1015:   d8 83 28 2a 44 ff       fadds  -0xbbd5d8(%ebx)
 82b101b:   0f b7 45 f2             movzwl -0xe(%ebp),%eax  ; fpcw
 82b101f:   b4 0c                   mov    $0xc,%ah
 82b1021:   66 89 45 f0             mov    %ax,-0x10(%ebp)
 82b1025:   d9 6d f0                fldcw  -0x10(%ebp)
 82b1028:   db 5d ec                fistpl -0x14(%ebp)      ; start Y (integer)
 82b102b:   d9 6d f2                fldcw  -0xe(%ebp)       ; fpcw
 82b102e:   8b 75 ec                mov    -0x14(%ebp),%esi ; start Y (integer)
 82b1031:   d9 6d f0                fldcw  -0x10(%ebp)
 82b1034:   db 9d 68 ff ff ff       fistpl -0x98(%ebp)      ; X
 82b103a:   d9 6d f2                fldcw  -0xe(%ebp)       ; fpcw

Aftewards, the code will enter a loop that will iterate through using these values. Due to the only the product of these integers overflowing, the call to drawPixel will be called for every pixel inside the under-allocated buffer as defined by the integers stored in -0x38(%ebp) and -0xa4(%ebp). The drawPixel function will essentially wrap setCharMapPixel which actually performs the write…

 82b10a2:   89 44 24 0c             mov    %eax,0xc(%esp)
 82b10a6:   8b 55 c8                mov    -0x38(%ebp),%edx     ; XXX: Y larger than 16-bits
 82b10a9:   89 54 24 08             mov    %edx,0x8(%esp)
 82b10ad:   d9 85 5c ff ff ff       flds   -0xa4(%ebp)          ; XXX: X larger than 16-bits
 82b10b3:   d9 6d f0                fldcw  -0x10(%ebp)
 82b10b6:   db 5c 24 04             fistpl 0x4(%esp)            ; X
 82b10ba:   d9 6d f2                fldcw  -0xe(%ebp)
 82b10bd:   8b 45 08                mov    0x8(%ebp),%eax
 82b10c0:   89 04 24                mov    %eax,(%esp)          ; object
 82b10c3:   e8 18 d5 00 00          call   82be5e0 <drawPixel>

Within setCharMapPixel the application will check to see if the current values are within the correct bounds, and then later use these values to write a null byte relative to the buffer at +0xaa0c:8:108. Due to the buffer being undersized while the tool attempts to fill the rasterized polygon, a buffer overflow may occur.

 82becc6:   8b 55 08                mov    0x8(%ebp),%edx
 82becc9:   8b 4d 10                mov    0x10(%ebp),%ecx      ; XXX: y value larger than 16-bits
 82beccc:   89 34 24                mov    %esi,(%esp)
 82beccf:   8b 75 0c                mov    0xc(%ebp),%esi       ; XXX: x value larger than 16-bits
 82becd2:   89 7c 24 04             mov    %edi,0x4(%esp)
 82becd6:   8b 82 0c aa 00 00       mov    0xaa0c(%edx),%eax    ; XXX: pointer to object (+0xaa0c)
 82becdc:   85 c9                   test   %ecx,%ecx
 82becde:   8b 78 08                mov    0x8(%eax),%edi       ; XXX: pointer to object (+0xaa0c:8)
 82bece1:   0f b7 82 1c aa 00 00    movzwl 0xaa1c(%edx),%eax
 82bece8:   78 2b                   js     82bed15 <setCharMapPixel+0x55>
 82becea:   0f b7 c0                movzwl %ax,%eax
...
 82becf0:   01 f8                   add    %edi,%eax            ; XXX: base
...
 82bed08:   0f af ca                imul   %edx,%ecx
 82bed0b:   03 b0 08 01 00 00       add    0x108(%eax),%esi     ; XXX: under-allocated buffer
 82bed11:   c6 04 0e 00             movb   $0x0,(%esi,%ecx,1)   ; XXX: write \x00 into buffer

Crash Information

$ gdb --quiet --args /opt/MarkLogic/converters/cvtpdf/convert ~/config/


Reading symbols from /opt/MarkLogic/Converters/cvtpdf/convert...done.


(gdb) r


Starting program: /opt/MarkLogic/Converters/cvtpdf/convert /home/user/config/
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib64/libthread_db.so.1".
Loading configuration...
Parsing macros...
Macro synth-bookmarks='true'
Macro image-output='true'
Macro text-output='true'
Macro zones='false'
Macro ignore-text='true'
Macro remove-overprint='false'
Macro illustrations='true'
Macro line-breaks='true'
Macro image-quality='75'
Macro page-start=''
Macro page-end=''
Macro document-start=''
Macro document-end=''
features='11140221'
Processing...
Analysing '/home/user/poc.pdf'
Pages 1 to 2
Processing page 1

Catchpoint 4 (signal SIGSEGV), 0x082bed11 in setCharMapPixel ()


(gdb) bt 10


#0  0x082bed11 in setCharMapPixel ()
#1  0x082be68e in drawPixel ()
#2  0x082b10c8 in rendFillPoly ()
#3  0x08176fd5 in fillPoly ()
#4  0x082154c9 in enumPolys ()
#5  0x082cb837 in convertTextPathToPolys ()
#6  0x0817b351 in convertPathToPolys ()
#7  0x082cc5e1 in ProcessCharacter ()
#8  0x08179993 in showTextOld ()
#9  0x08179b39 in showText ()
#10 0x08183fb2 in processTextItem ()
#11 0x0818497d in icnProcessDisplayListX ()
#12 0x081856c0 in icnProcessDisplayList ()
#13 0x0818605d in icnRenderPage ()
#14 0x0817635d in ripPDF ()
#15 0x0817576e in renderZone ()
(More stack frames follow...)


(gdb) h


-=[registers]=-
[eax: 0xf7237e40] [ebx: 0x08f57000] [ecx: 0xfffdaab0] [edx: 0x000269c2]
[esi: 0x9f23a8e9] [edi: 0xf7237e40] [esp: 0xfffbe820] [ebp: 0xfffbe828]
[eflags: NZ SF OF NC ND NI]

-=[stack]=-
fffbe820 | 0001a858 098ddfc0 fffbe858 082be68e | X.......X.....+.
fffbe830 | 098ddfc0 000238e1 0001a858 fffbeb10 | .....8..X.......
fffbe840 | 00000010 57fe85a8 f7200040 08f57000 | .......W@. ..p..
fffbe850 | 000238e2 f7236628 fffbe958 082b10c8 | .8..(f#.X.....+.

-=[disassembly]=-
=> 0x82bed11 <setCharMapPixel+81>:      movb   $0x0,(%esi,%ecx,1)
   0x82bed15 <setCharMapPixel+85>:      mov    (%esp),%esi
   0x82bed18 <setCharMapPixel+88>:      mov    0x4(%esp),%edi
   0x82bed1c <setCharMapPixel+92>:      mov    %ebp,%esp
   0x82bed1e <setCharMapPixel+94>:      pop    %ebp
   0x82bed1f <setCharMapPixel+95>:      ret

Timeline

2016-10-10 - Vendor Disclosure
2017-02-27 - Public Release

Discovered by Marcin Noga of Cisco Talos.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907