-
Notifications
You must be signed in to change notification settings - Fork 44
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
NULL pointer dereference bug in ulaw2linear_buf, in G711.cpp #54
Comments
caused by allocate too large mem, and then alloc return 0 asan output
|
CVE-2019-13147 was assigned for this issue. |
For completeness, this is the stacktrace I get with the provided poc:
While the asan output complains about " failed to allocate" I confirm that under normal condition I get a Segmentation fault. |
Partial fix (symptom), nevertheless a fix:
|
Real fix is too many channel:
|
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
There exists one NULL pointer dereference bug in ulaw2linear_buf, in G711.cpp, which allows an attacker to cause a denial of service via a crafted file.
To reproduce with the attached poc file:
./sfconvert poc output format voc
poc.zip
gdb output
The text was updated successfully, but these errors were encountered: