GNU binutils - 'rx_decode_opcode' Buffer Overflow

EDB-ID: 42198
Author: Alexandre Adamski
Published: 2017-06-19
CVE: CVE-2017-9750
Type: Dos
Platform: Linux
Aliases: N/A
Advisory/Source: Link
Tags: N/A
Vulnerable App: N/A

I have been fuzzing objdump with American Fuzzy Lop and AddressSanitizer.

Please find attached the minimized file causing the issue ("Input") and the
ASAN report log ("Output"). Below is the reduced stacktrace with links to the
corresponding source lines on a GitHub mirror.

The command I used was `objdump -D <file>`.

Let me know if there is any additional information I can provide.


Input: 9ed130cf25d8df5207cad7fc0de4fc1f.109246746a4907b00292c7837b29f085.min
Output: 9ed130cf25d8df5207cad7fc0de4fc1f.109246746a4907b00292c7837b29f085.txt

Error in "rx_decode_opcode": global-buffer-overflow
in rx_decode_opcode at opcodes/rx-decode.opc:288
in print_insn_rx at opcodes/rx-dis.c:123
in disassemble_bytes at binutils/objdump.c:1864
in disassemble_section at binutils/objdump.c:2309
in bfd_map_over_sections at bfd/section.c:1395
in disassemble_data at binutils/objdump.c:2445
in dump_bfd at binutils/objdump.c:3547
in display_file at binutils/objdump.c:3714
in main at binutils/objdump.c:4016

Additional Information:
The command used was `objdump -D <file>`. The compilation flags used were `-g -O2 -fno-omit-frame-pointer -fsanitize=address -fno-sanitize-recover=undefined`. The configuration settings used were `--enable-targets=all --disable-shared`.

Proof of Concept:

Related Posts