Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2020-6075: TALOS-2020-0998 || Cisco Talos Intelligence Group

An exploitable out-of-bounds write vulnerability exists in the store_data_buffer function of the igcore19d.dll library of Accusoft ImageGear 19.5.0. A specially crafted PNG file can cause an out-of-bounds write, resulting in a remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.

CVE
#vulnerability#mac#windows#microsoft#cisco

Summary

An exploitable out-of-bounds write vulnerability exists in the store_data_buffer function of the igcore19d.dll library of Accusoft ImageGear 19.5.0. A specially crafted PNG file can cause an out-of-bounds write, resulting in a remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.

Tested Versions

Accusoft ImageGear 19.5.0

Product URLs

https://www.accusoft.com/products/imagegear/overview/

CVSSv3 Score

9.8 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CWE

CWE-194: Unexpected Sign Extension

Details

The ImageGear library is a document imaging developer toolkit providing all kinds of functionality related to image conversion, creation, editing, annotation, etc. It supports more than 100 formats, including many image formats, DICOM, PDF, Microsoft Office and others.

There is a vulnerability in the store_data_buffer function due to an invalid cast conversion. A specially crafted PNG file can lead to an out-of-bounds, write which can result in remote code execution.

Trying to load a malformed PNG file via IG_load_file function, we end up in the following situation:

eax=00004504 ebx=0f30e5f8 ecx=000000c0 edx=0000c0c0 esi=0f306fc9 edi=7fffc503
eip=670c0cb2 esp=009dd524 ebp=009dd530 iopl=0         nv up ei ng nz na pe nc
cs=0023  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
igCore19d!IG_mpi_page_set+0xe5922:
670c0cb2 66891443        mov     word ptr [ebx+eax*2],dx  ds:002b:0f317000=????

0:000> kb
 # ChildEBP RetAddr  Args to Child              
WARNING: Stack unwind information not available. Following frames may be wrong.
00 0019d520 64c01114 0ead65c0 0e3a45f8 ffff8a07 igCore19d!IG_mpi_page_set+0xe5922
01 0019d540 64bff981 0ead65c0 0e5fe5c0 0e3a45f8 igCore19d!IG_mpi_page_set+0xe5d84
02 0019f1cc 64c00c74 0019f71c 1000001b 099acfe8 igCore19d!IG_mpi_page_set+0xe45f1
03 0019f200 64bfe32c 0019f71c 1000001b 099acfe8 igCore19d!IG_mpi_page_set+0xe58e4
04 0019f694 64af07c9 0019f71c 099acfe8 00000001 igCore19d!IG_mpi_page_set+0xe2f9c
05 0019f6cc 64b2fb97 00000000 099acfe8 0019f71c igCore19d!IG_image_savelist_get+0xb29
06 0019f948 64b2f4f9 00000000 09505fa8 00000001 igCore19d!IG_mpi_page_set+0x14807
07 0019f968 64ac6007 00000000 09505fa8 00000001 igCore19d!IG_mpi_page_set+0x14169
08 0019f988 006059ac 09505fa8 0019fa74 0019fa98 igCore19d!IG_load_file+0x47
09 0019fa88 006061a7 09505fa8 0019fbbc 00000021 simple_exe_141+0x159ac
0a 0019fc54 00606cbe 00000005 094b2f50 09397f40 simple_exe_141+0x161a7
0b 0019fc68 00606b27 d2316a2d 006015e1 006015e1 simple_exe_141+0x16cbe
0c 0019fcc4 006069bd 0019fcd4 00606d38 0019fce4 simple_exe_141+0x16b27
0d 0019fccc 00606d38 0019fce4 75286359 002a8000 simple_exe_141+0x169bd
0e 0019fcd4 75286359 002a8000 75286340 0019fd40 simple_exe_141+0x16d38
0f 0019fce4 779c7b74 002a8000 63abcc02 00000000 KERNEL32!BaseThreadInitThunk+0x19
10 0019fd40 779c7b44 ffffffff 779e8f15 00000000 ntdll!__RtlUserThreadStart+0x2f
11 0019fd50 00000000 006015e1 002a8000 00000000 ntdll!_RtlUserThreadStart+0x1b

As we can see, an out-of-bounds write operation occurred.
The pseudo-code of this vulnerable function looks like this:

LINE 1  unsigned int __cdecl store_data_buffer(int src_buffer, int dst_buffer, int size)
LINE 2  {
LINE 3    unsigned int index; // eax
LINE 4    unsigned __int8 *v4; // esi
LINE 5  
LINE 6    index = 0;
LINE 7    if ( (unsigned int)(size - 1) >> 1 )
LINE 8    {
LINE 9      _src_buffer = (unsigned __int8 *)(src_buffer + 1);
LINE 10     do
LINE 11     {
LINE 12       *(_WORD *)(dst_buffer + 2 * index++) = __ROL2__(*_src_buffer | (_src_buffer[1] << 8), 8);    [1]
LINE 13
LINE 14       _src_buffer += 2;
LINE 15     }
LINE 16     while ( index < (unsigned int)(size - 1) >> 1 );                                               [2]
LINE 17   }
LINE 18   return index;
LINE 19 }

In this algorithm we can observe a function store_data_buffer, whose objective is to copy the content of src_buffer into dst_buffer, is crashing while filling the buffer dst_buffer in [1].
The copy operation is controlled by a loop [2], with a range from 0 to size-1.
This is happening because the dst_buffer is too small compared to the size argument.

Let’s see how the size of the target buffer and the size argument are computed.

LINE 22 unsigned __int8 __cdecl sub_670C1030(int src_data, int a2, void *buffer_mem, int a4, int size, int a6, int a7, int a8, int a9)
LINE 23 {
LINE 24   unsigned __int8 param_7; // al
LINE 25   unsigned int i; // ecx
LINE 26   _BYTE *v11; // esi
LINE 27   _BYTE *v12; // ebx
LINE 28   unsigned int v13; // edx
LINE 29   char v14; // cl
LINE 30   char v15; // cl
LINE 31 
LINE 32   switch ( *(unsigned __int8 *)src_data )
LINE 33   {
LINE 34     case 1u:
LINE 35       sub_670BE9C0(src_data, size, a6);
LINE 36       break;
LINE 37     case 2u:
LINE 38       sub_670BEA10(src_data, a2, size);
LINE 39       break;
LINE 40     case 3u:
LINE 41       sub_670BEA60(src_data, a2, size, (unsigned __int8)a6);
LINE 42       break;
LINE 43     case 4u:
LINE 44       sub_670BEAF0(src_data, a2, size, a6);
LINE 45       break;
LINE 46     default:
LINE 47       break;
LINE 48   }
LINE 49   param_7 = a7;
LINE 50   switch ( *(unsigned __int8 *)(a7 + 9) )
LINE 51   {
LINE 52     case 0u:
LINE 53       if ( *(_BYTE *)(a7 + 8) == 2 )
LINE 54         goto LABEL_13;
LINE 55       param_7 = *(_BYTE *)(a7 + 8) - 16;
LINE 56       if ( *(_BYTE *)(a7 + 8) == 16 )
LINE 57       {
LINE 58         param_7 = sub_670BE850(src_data, buffer_mem, size);
LINE 59       }
LINE 60       else
LINE 61       {
LINE 62         for ( i = 1; i < size; ++i )
LINE 63         {
LINE 64           param_7 = *(_BYTE *)(i + src_data);
LINE 65           *((char *)buffer_mem + i - 1) = param_7;
LINE 66         }
LINE 67       }
LINE 68       break;
LINE 69     case 2u:
LINE 70       param_7 = *(_BYTE *)(a7 + 8);
LINE 71       if ( param_7 == 8 )
LINE 72       {
LINE 73         if ( (unsigned int)size > 1 )
LINE 74         {
LINE 75           v11 = buffer_mem;
LINE 76           v12 = (_BYTE *)(src_data + 2);
LINE 77           v13 = (size - 2) / 3u + 1;
LINE 78           do
LINE 79           {
LINE 80             *v11 = *(v12 - 1);
LINE 81             v11[1] = *v12;
LINE 82             param_7 = v12[1];
LINE 83             v11[2] = param_7;
LINE 84             v11 += 3;
LINE 85             v12 += 3;
LINE 86             --v13;
LINE 87           }
LINE 88           while ( v13 );
LINE 89         }
LINE 90       }
LINE 91       else if ( param_7 == 16 )
LINE 92       {
LINE 93         param_7 = store_data_buffer(src_data, (int)buffer_mem, size);      [3]
LINE 94       }
LINE 95       break;
            [...]
LINE 140}

The store_data_buffer is called from the function named sub_670C1030 in [3] but we can see that size and buffer_mem are passed as arguments so we need to go back further. This leads us to the function process_raster_png:

LINE141 int __stdcall process_raster_png(table_function *a1, void *arg4, int a3, int a4, int a5, IGDIBOject *a6, int a7, int a8)
LINE142 {
LINE143   int v8; // esi
LINE144   size_t v10; // edi
LINE145   byte *v11; // edi
LINE146   unsigned int size_buffer_mem; // edi
LINE147   byte *buffer_mem; // ebx
LINE148   int v14; // esi
LINE149   int v15; // eax
LINE150   unsigned int v16; // edi
LINE151   byte *v17; // eax
LINE152   byte *v18; // edx
LINE153   unsigned int i; // ecx
LINE154   int *v20; // ecx
LINE155   int v21; // eax
LINE156   int v22; // esi
LINE157   size_t v23; // edx
LINE158   int v24; // esi
LINE159   char v25; // cl
LINE160   int v26; // ecx
LINE161   int v27; // esi
LINE162   unsigned __int8 v28; // al
LINE163   unsigned __int8 v29; // bl
LINE164   int v30; // ecx
LINE165   int v31; // eax
LINE166   __int16 v32; // ax
LINE167   char v33; // cl
LINE168   __int16 v34; // ax
LINE169   char v35; // al
LINE170   int v36; // esi
LINE171   int v37; // eax
LINE172   int v38; // edx
LINE173   int v39; // edi
LINE174   int v40; // esi
LINE175   int j; // ecx
LINE176   unsigned __int8 v42; // al
LINE177   char v43; // al
LINE178   bool v44; // zf
LINE179   int v45; // esi
LINE180   int k; // ecx
LINE181   byte v47; // al
LINE182   byte v48; // al
LINE183   int v49; // eax
LINE184   unsigned int l; // esi
LINE185   void *v51; // eax
LINE186   void *v52; // ebx
LINE187   int v53; // ebx
LINE188   byte *v54; // edi
LINE189   int v55; // esi
LINE190   char v56; // cl
LINE191   int v57; // esi
LINE192   __int16 v58; // [esp-4h] [ebp-1C64h]
LINE193   unsigned __int8 v59; // [esp+Ch] [ebp-1C54h]
LINE194   unsigned int v60; // [esp+10h] [ebp-1C50h]
LINE195   __int16 v61; // [esp+14h] [ebp-1C4Ch]
LINE196   png_struct *table_of_size; // [esp+1Ch] [ebp-1C44h]
LINE197   unsigned int v63; // [esp+20h] [ebp-1C40h]
LINE198   int v64; // [esp+24h] [ebp-1C3Ch]
LINE199   int a6a; // [esp+28h] [ebp-1C38h]
LINE200   int v66; // [esp+2Ch] [ebp-1C34h]
LINE201   int v67; // [esp+30h] [ebp-1C30h]
LINE202   int v68; // [esp+34h] [ebp-1C2Ch]
LINE203   int v69; // [esp+38h] [ebp-1C28h]
LINE204   size_t size; // [esp+3Ch] [ebp-1C24h]
LINE205   byte *v71; // [esp+40h] [ebp-1C20h]
LINE206   int *v72; // [esp+44h] [ebp-1C1Ch]
LINE207   unsigned int ___size; // [esp+4Ch] [ebp-1C14h]
LINE208   unsigned int v74; // [esp+50h] [ebp-1C10h]
LINE209   byte *a2; // [esp+54h] [ebp-1C0Ch]
LINE210   int v76; // [esp+58h] [ebp-1C08h]
LINE211   byte *v77; // [esp+5Ch] [ebp-1C04h]
LINE212   byte *Src; // [esp+60h] [ebp-1C00h]
LINE213   byte *_buffer_mem; // [esp+64h] [ebp-1BFCh]
LINE214   unsigned int _size; // [esp+68h] [ebp-1BF8h]
LINE215   size_t v81; // [esp+74h] [ebp-1BECh]
LINE216   int v82; // [esp+78h] [ebp-1BE8h]
LINE217   int v83; // [esp+644h] [ebp-161Ch]
LINE218   int v84; // [esp+1C3Ch] [ebp-24h]
LINE219   int v85; // [esp+1C40h] [ebp-20h]
LINE220   int v86; // [esp+1C44h] [ebp-1Ch]
LINE221   int v87; // [esp+1C48h] [ebp-18h]
LINE222   int v88; // [esp+1C4Ch] [ebp-14h]
LINE223   int v89; // [esp+1C50h] [ebp-10h]
LINE224   int v90; // [esp+1C54h] [ebp-Ch]
LINE225   int v91; // [esp+1C58h] [ebp-8h]
LINE226 
LINE227   v84 = 0x200000F;
LINE228   v85 = 0x1000100;
LINE229   v86 = 0x4000F;
LINE230   v87 = 0x10002;
LINE231   v90 = 0x404040F;
LINE232   v91 = 0x1010202;
LINE233   v88 = 0x408080F;
LINE234   v89 = 0x1020204;
LINE235   v76 = 0;
LINE236   v8 = 0;
LINE237   table_of_size = (png_struct *)AF_memm_alloc((int)arg4, 48u, (int)"..\\..\\..\\..\\Common\\Formats\\pngread.c", 2934);
LINE238   if ( !table_of_size )
LINE239     return kind_of_print_error((int)"..\\..\\..\\..\\Common\\Formats\\pngread.c", 2938, -1000, 0, 48, (int)arg4, 0);
LINE240   _size = compute_raster_size(a4);
LINE241   v10 = _size - (_size & 0x3F) + 64;
LINE242   Src = AF_memm_alloc((int)arg4, v10, (int)"..\\..\\..\\..\\Common\\Formats\\pngread.c", 2948);
LINE243   if ( !Src )
LINE244   {
LINE245     sub_66FD60E0((int)arg4, (int)"..\\..\\..\\..\\Common\\Formats\\pngread.c", 2951);
LINE246     return kind_of_print_error((int)"..\\..\\..\\..\\Common\\Formats\\pngread.c", 2952, -1000, 0, _size, (int)arg4, 0);
LINE247   }
LINE248   v11 = AF_memm_alloc((int)arg4, v10, (int)"..\\..\\..\\..\\Common\\Formats\\pngread.c", 2958);
LINE249   v77 = v11;
LINE250   if ( !v11 )
LINE251   {
LINE252     sub_66FD60E0((int)arg4, (int)"..\\..\\..\\..\\Common\\Formats\\pngread.c", 2961);
LINE253     return kind_of_print_error((int)"..\\..\\..\\..\\Common\\Formats\\pngread.c", 2962, -1000, 0, _size, (int)arg4, 0);
LINE254   }
LINE255   v71 = AF_memm_alloc((int)arg4, _size, (int)"..\\..\\..\\..\\Common\\Formats\\pngread.c", 2967);
LINE256   if ( !v71 )
LINE257   {
LINE258     sub_66FD60E0((int)arg4, (int)"..\\..\\..\\..\\Common\\Formats\\pngread.c", 2970);
LINE259     return kind_of_print_error((int)"..\\..\\..\\..\\Common\\Formats\\pngread.c", 2971, -1000, 0, _size, (int)arg4, 0);
LINE260   }
LINE261   if ( _size )
LINE262     memset(v11, 0, _size);
LINE263   size_buffer_mem = lead_to_compute_size_based_width_bits(a6);     [6]
LINE264   _size = size_buffer_mem;                                                                                              
LINE265   buffer_mem = AF_memm_alloc((int)arg4, size_buffer_mem, (int)"..\\..\\..\\..\\Common\\Formats\\pngread.c", 2981);       [5]
LINE266   _buffer_mem = buffer_mem;
LINE267   if ( !buffer_mem )
LINE268   {
LINE269     sub_66FD60E0((int)arg4, (int)"..\\..\\..\\..\\Common\\Formats\\pngread.c", 2984);
LINE270     return kind_of_print_error(
LINE271              (int)"..\\..\\..\\..\\Common\\Formats\\pngread.c",
LINE272              2985,
LINE273              -1000,
LINE274              0,
LINE275              size_buffer_mem,
LINE276              (int)arg4,
LINE277              0);
LINE278   }
LINE279   wrapper_memset(&v81, 0, 0x1BC8u);
LINE280   v82 = 2;
LINE281   if ( *(_BYTE *)(a4 + 12) == 1 )
LINE282   {
LINE283     v14 = 4 * ((getSizeY_0(a6) + 7) / 8);
LINE284     if ( v14 > 0xFFFF )
LINE285     {
LINE286       v15 = getSizeY_0(a6);
LINE287       return kind_of_print_error(
LINE288                (int)"..\\..\\..\\..\\Common\\Formats\\pngread.c",
LINE289                3023,
LINE290                -1005,
LINE291                0,
LINE292                v15,
LINE293                0,
LINE294                "Interlaced png image has too big heght. Can't load image.");
LINE295     }
LINE296     if ( size_buffer_mem > 0xFFFF )
LINE297       return kind_of_print_error(
LINE298                (int)"..\\..\\..\\..\\Common\\Formats\\pngread.c",
LINE299                3029,
LINE300                -1005,
LINE301                0,
LINE302                size_buffer_mem,
LINE303                0,
LINE304                "Interlaced png image has too big raster size. Can't load image.");
LINE305     a2 = AF_memm_alloc((int)arg4, 4 * v14, (int)"..\\..\\..\\..\\Common\\Formats\\pngread.c", 3034);
LINE306     if ( !a2 )
LINE307       return kind_of_print_error(
LINE308                (int)"..\\..\\..\\..\\Common\\Formats\\pngread.c",
LINE309                3038,
LINE310                -1000,
LINE311                0,
LINE312                4 * v14,
LINE313                (int)arg4,
LINE314                0);
LINE315     v16 = 0;
LINE316     v63 = (unsigned __int16)v14;
LINE317     if ( (_WORD)v14 )
LINE318     {
LINE319       do
LINE320       {
LINE321         v17 = AF_memm_alloc((int)arg4, ___size, (int)"..\\..\\..\\..\\Common\\Formats\\pngread.c", 3044);
LINE322         *(_DWORD *)&a2[4 * v16] = v17;
LINE323         if ( !v17 )
LINE324           return kind_of_print_error(
LINE325                    (int)"..\\..\\..\\..\\Common\\Formats\\pngread.c",
LINE326                    3048,
LINE327                    -1000,
LINE328                    0,
LINE329                    ___size,
LINE330                    (int)arg4,
LINE331                    0);
LINE332         ++v16;
LINE333       }
LINE334       while ( v16 < (unsigned __int16)v14 );
LINE335       if ( (_WORD)v14 )
LINE336       {
LINE337         v18 = a2;
LINE338         v14 = (unsigned __int16)v14;
LINE339         do
LINE340         {
LINE341           for ( i = 0; i < ___size; *(_BYTE *)(i + *(_DWORD *)v18 - 1) = -1 )
LINE342             ++i;
LINE343           v18 += 4;
LINE344           --v14;
LINE345         }
LINE346         while ( v14 );
LINE347       }
LINE348     }
LINE349     sub_670C0A50(table_of_size, (__int16 *)a4);
LINE350     v20 = &table_of_size->field_A;
LINE351     v21 = 1;
LINE352     v22 = 0;
LINE353     v66 = 1;
LINE354     v72 = &table_of_size->field_A;
LINE355     v69 = 0;
LINE356     do
LINE357     {
LINE358       if ( *(_WORD *)v20 )
LINE359       {
LINE360         if ( _size )
LINE361         {
LINE362           memset(v77, 0, _size);
LINE363           v20 = v72;
LINE364         }
LINE365         v23 = *((__int16 *)v20 - 2);
LINE366         v64 = *((__int16 *)v20 - 1);
LINE367         v67 = *((unsigned __int8 *)&v84 + v22 + 1);
LINE368         v16 = 0;
LINE369         v24 = *(unsigned __int16 *)(a4 + 4);
LINE370         size = *((__int16 *)v20 - 2);                      [8]
LINE371         v74 = 0;
LINE372         v76 = *(unsigned __int16 *)(a4 + 4);
LINE373         if ( v64 > 0 )
LINE374         {
LINE375           v60 = v23 - 1;
LINE376           do
LINE377           {
LINE378             sub_670C0090((int)a1, (size_t)&v81, Src, v23);
LINE379             v25 = v60 / *(__int16 *)v72;
LINE380             if ( !v25 )
LINE381               v25 = 1;
LINE382             LOBYTE(a6a) = v25;
LINE383             v59 = v25;
LINE384             sub_670C1030((int)Src, (int)v77, buffer_mem, 0, size, a6a, a5, a8, *(_DWORD *)(a3 + 16));         [4]
                    [...]
LINE494           }
LINE495           while ( v64 > 0 );
LINE496           v20 = v72;
LINE497         }
LINE498         v21 = v66;
LINE499         v22 = v69;
LINE500       }
LINE501       ++v21;
LINE502       ++v22;
LINE503       v20 = (int *)((char *)v20 + 6);
LINE504       v66 = v21;
LINE505       v69 = v22;
LINE506       v72 = v20;
LINE507     }
LINE508     while ( (__int16)v21 <= 7 );
            [...]
LINE566   return 0;
LINE567 }

In [4] we can identify our function call with our parameters named here buffer_mem and size respectively. The buffer_mem is allocated in [5] and the size for his allocation is computed in [6] through a call to the function lead_to_compute_size_based_width_bits returning an unsigned value as we can see in the following pseudo code where the indirect call lands to the function compute_size

LINE568 unsigned int __thiscall compute_size(IGDIBOject *this)
LINE569 {
LINE570   return ((this->width * this->colorspace_related * this->depth + 31) >> 3) & 0xFFFFFFFC;      [7]
LINE571 }

We can see the final size for the buffer_mem is computed from a field directly taken to from file, like width and other valued derived from bits and colorspace computation in [7].
Now if take a look back to the size parameter we can observe it’s computed differently, getting its value from v20 at [8]. This is a pointer to signed integers, where size is 32-bits unsigned integer.

When looking further into how this table of integer is filled, we land to function compute_raster_size, which is computing a size using bits and width through a test case of PNG_COLOR_SPACE_TYPE_color_type.

LINE 145 unsigned int __cdecl compute_raster_size(int a1)
LINE 146 {
LINE 147   unsigned int v1; // eax
LINE 148   unsigned int raster_size; // eax
LINE 149 
LINE 150   v1 = 0;
LINE 151   switch ( PNG_COLOR_SPACE_TYPE_color_type )
LINE 152   {
LINE 153     case 0u:
LINE 154     case 3u:
LINE 155       raster_size = ((bits * width) + 7) >> 3) + 1;
LINE 156       break;
LINE 157     case 2u:
LINE 158       raster_size = ((3 * bits * width) >> 3) + 1;
LINE 159       break;
LINE 160     case 4u:
LINE 161       raster_size = (2 * ((bits * width) >> 3)) + 1;
LINE 162       break;
LINE 163     case 6u:
LINE 164       v1 = (4 * bits * width) >> 3;
LINE 165       goto LABEL_6;
LINE 166     default:
LINE 167 LABEL_6:
LINE 168       raster_size = v1 + 1;
LINE 169       break;
LINE 170   }
LINE 171   return raster_size;
LINE 172 }

The cast conversion to int16 at [8], of the value computed from compute_raster_size, causes a sign extension when transforming the value into a larger data type (from int16 to size_t) at [8]. This in turn increases the loop count via the size variable, allowing an attacker to cause an out-of-bounds write leading to memory corruption, which could result in remote code execution.

Crash Information

0:000> !analyze -v
*******************************************************************************
*                                                                             *
*                        Exception Analysis                                   *
*                                                                             *
*******************************************************************************


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Write

    Key  : Analysis.CPU.Sec
    Value: 0

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-PJK7PVH

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 4

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : Timeline.OS.Boot.DeltaSec
    Value: 91061

    Key  : Timeline.Process.Start.DeltaSec
    Value: 8


ADDITIONAL_XML: 1

APPLICATION_VERIFIER_LOADED: 1

EXCEPTION_RECORD:  (.exr -1)
ExceptionAddress: 670c0cb2 (igCore19d!IG_mpi_page_set+0x000e5922)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 00000001
   Parameter[1]: 0f317000
Attempt to write to address 0f317000

FAULTING_THREAD:  000010cc

PROCESS_NAME:  simple.exe_141.exe

WRITE_ADDRESS:  0f317000 

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  00000001

EXCEPTION_PARAMETER2:  0f317000

STACK_TEXT:  
WARNING: Stack unwind information not available. Following frames may be wrong.
009dd530 670c1114 0f2fe5c0 0f30e5f8 ffff8a07 igCore19d!IG_mpi_page_set+0xe5922
009dd550 670bf981 0f2fe5c0 0ee305c0 0f30e5f8 igCore19d!IG_mpi_page_set+0xe5d84
009df1dc 670c0c74 009df72c 1000001b 0e64afe8 igCore19d!IG_mpi_page_set+0xe45f1
009df210 670be32c 009df72c 1000001b 0e64afe8 igCore19d!IG_mpi_page_set+0xe58e4
009df6a4 66fb07c9 009df72c 0e64afe8 00000001 igCore19d!IG_mpi_page_set+0xe2f9c
009df6dc 66fefb97 00000000 0e64afe8 009df72c igCore19d!IG_image_savelist_get+0xb29
009df958 66fef4f9 00000000 09e01fa8 00000001 igCore19d!IG_mpi_page_set+0x14807
009df978 66f86007 00000000 09e01fa8 00000001 igCore19d!IG_mpi_page_set+0x14169
009df998 006059ac 09e01fa8 009dfa84 009dfaa8 igCore19d!IG_load_file+0x47
009dfa98 006061a7 09e01fa8 009dfbcc 00000021 simple_exe_141+0x159ac
009dfc64 00606cbe 00000005 09daef50 09c93f40 simple_exe_141+0x161a7
009dfc78 00606b27 f7329ef4 006015e1 006015e1 simple_exe_141+0x16cbe
009dfcd4 006069bd 009dfce4 00606d38 009dfcf4 simple_exe_141+0x16b27
009dfcdc 00606d38 009dfcf4 75286359 00bc4000 simple_exe_141+0x169bd
009dfce4 75286359 00bc4000 75286340 009dfd50 simple_exe_141+0x16d38
009dfcf4 779c7b74 00bc4000 469eabd0 00000000 KERNEL32!BaseThreadInitThunk+0x19
009dfd50 779c7b44 ffffffff 779e8f0f 00000000 ntdll!__RtlUserThreadStart+0x2f
009dfd60 00000000 006015e1 00bc4000 00000000 ntdll!_RtlUserThreadStart+0x1b


STACK_COMMAND:  ~0s ; .cxr ; kb

SYMBOL_NAME:  igCore19d!IG_mpi_page_set+e5922

MODULE_NAME: igCore19d

IMAGE_NAME:  igCore19d.dll

FAILURE_BUCKET_ID:  INVALID_POINTER_WRITE_AVRF_c0000005_igCore19d.dll!IG_mpi_page_set

OS_VERSION:  10.0.18362.239

BUILDLAB_STR:  19h1_release_svc_prod1

OSPLATFORM_TYPE:  x86

OSNAME:  Windows 10

FAILURE_ID_HASH:  {39ff52ad-9054-81fd-3e4d-ef5d82e4b2c1}

Followup:     MachineOwner
---------

Timeline

2020-01-30 - Vendor Disclosure
2020-04-30 - Vendor Patched

2020-05-05 - Public Release

Discovered by Emmanuel Tacheau of Cisco Talos.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907