Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Vulnerability: Denial of Service #11

Open
souless94 opened this issue Feb 27, 2020 · 0 comments
Open

Vulnerability: Denial of Service #11

souless94 opened this issue Feb 27, 2020 · 0 comments

Comments

@souless94
Copy link

Question

Hi
We conduct a software composition analysis scan by Black Duck hub and we found the following :

(1) BDSA-2018-2656

Boost has a flaw in the function boost::re_detail_NUMBER::basic_regex_creator which can lead to a buffer over-read. An attacker can craft and send a malicious file which will trigger the buffer over-read, leading to a denial-of-service.

The vulnerability can be exploited by local attackers via import of a maliciously crafted file or by remote attackers that send the file to a victim. The Boost software will crash when the file is imported into the library.
Details:
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6708


(2) BDSA-2018-1263

Boost incorrectly casts from "boost::detail::shared_count::shared_count" to "boost::detail::sp_counted_base" causing type confusion leading to a denial-of-service (DoS).
Details:
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=4680

Please advise if the following has a patch.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant