I'm sorry I have made a mistake.I mean it should become public , then it can be referenced
I'm sorry I have made a mistake.I mean it should become public , then it can referenced
Please change the private to No,I will assgin cve for this bug.
Please change the private to Yes,I will assgin cve for this bug.
Null pointer in
I have assign a cve-id for this issue.(CVE-2017-12797,zhihua.yao@dbappsecurity.com.cn)
Use after free in ReadJNGImage
I have assign a cve-id for this issue.(CVE-2017-12797,zhihua.yao@dbaapsecurity.com.cn)
Well,I can not trigger this bug.
OK,I have tested it and it has been fixed
How do i incorporate diff into the code?
OK
Yes, probably the reason for the platform.
This vulnerability is a bit like that https://sourceforge.net/p/mpg123/bugs/252/ My test platform is ubuntu X86.I use the AFL to fuzz it. Maybe the sample is a bit of a problem.I think I should re-upload one.
Here are my all samples.You can choose any one file to run.They crashed with the same problem.
Hello,I configure with afl-gcc ,the configure: CC="afl-gcc" CFLAGS="-g -ggdb -fno-omit-frame-pointer -fsanitize=address" ./configure --disable-shared It's not fixed. My version is 1.25.4. Run mpg123 -s test3.
heap buffer overflow in INT123_parse_new_id3