RUSTSEC-2022-0079

Source
https://rustsec.org/advisories/RUSTSEC-2022-0079
Import Source
https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2022-0079.json
JSON Data
https://api.osv.dev/v1/vulns/RUSTSEC-2022-0079
Aliases
Published
2022-10-31T12:00:00Z
Modified
2023-11-08T04:19:21.655074Z
Summary
ELF header parsing library doesn't check for valid offset
Details

The crate has several unsafe sections that don't perform proper pointer validation.

An example can be found in the following function:

fn section_header_raw(&self) -> &[ET::SectionHeader] {
    let sh_off = self.elf_header().section_header_offset() as usize;
    let sh_num = self.elf_header().section_header_entry_num() as usize;
    unsafe {
        let sh_ptr = self.content().as_ptr().add(sh_off);
        from_raw_parts(sh_ptr as *const ET::SectionHeader, sh_num)
    }
}

While this will work perfectly fine if the ELF header is valid, malicious or malformed input can contain a section header offset of an arbitrary size, meaning that the resultant pointer in the unsafe block can point to an artibrary address in the address space of the process.

This can result in unpredictable behaviour, and in our fuzz testing, we discovered that it's trivial to cause SIGABRT (signal 6), or SEGV (signal 11).

The function should either be marked as unsafe, with a note that the caller is responsible for providing only valid inputs, or it should ideally do the due diligence to ensure that the offset doesn't exceed the bounds of the header (and add additional checks as necessary).

Database specific
{
    "license": "CC0-1.0"
}
References

Affected packages

crates.io / elf_rs

Package

Affected ranges

Type
SEMVER
Events
Introduced
0.0.0-0
Fixed
0.3.0

Ecosystem specific

{
    "affected_functions": null,
    "affects": {
        "os": [],
        "functions": [],
        "arch": []
    }
}

Database specific

{
    "cvss": null,
    "informational": null,
    "categories": [
        "memory-corruption"
    ]
}