Skip to content

Latest commit

 

History

History

README.md

Vulnerabilities detected by polyfuzz

We evaluate polyfuzz on several popular open-source projects developed mainly in 10 Python-C programs, 5 Java-C programs, and 15 single-language programs (5 respectively in C, Python, and Java). Eventually, 14 vulnerabilities in 8 projects below are validated to be exploitable, and corresponding PoCs are attached.

Ultrajson: [Vendor]ultrajson

[Vulnerability]: Segment fault

Affected version: version <= 5.2.0
Description: With carefully constructed inputs, NULL pointer reference can happen and cause segment fault. This allows attackers to conduct DoS attacks by construct specific inputs.
Exploitation: PoC: ujson_poc.py with Input and Output.

Pyyaml: [Vendor]yaml.org

[Vulnerability]: Recursion Error

Affected version: version <= 6.0
Description: With carefully constructed inputs, Recursion Error can happen. This allows attackers to conduct DoS attacks by construct specific inputs.
Exploitation: PoC: poc_load.py with Input and Output.

Jansi: [Vendor]fusesource.com

[Vulnerability]: Out of Memory

Affected version: version <= 2.4.0
Description: With carefully constructed inputs, Out of Memory can happen. This allows attackers to conduct DoS attacks by construct specific inputs.
Exploitation: PoC: OutStream with Input.

Pillow: [Vendor]python-pillow.org

[Vulnerability]: Out of Memory

Affected version: version <= 9.1.1
Description: With carefully constructed inputs, out of memory can happen in API convert. This allows attackers to conduct DoS attacks by construct specific inputs
Exploitation: PoC: poc_fig_process.py with Input.

Libsmbios: [Vendor]Dell

[Vulnerability]: Segment fault

Affected version: version <= 2.4.3
Description: With carefully constructed inputs, libsmbios can crash with bus error. This allows attackers to conduct DoS attacks by construct specific inputs
Exploitation: PoC: poc_op_mem.py with Input and Output.

Javaparser: [Vendor]javaparser.org

[Vulnerability]: JVM hangs

Affected version: version <= 3.24.2
Description: With carefully constructed inputs, JVM hangs. This allows attackers to conduct DoS attacks by construct specific inputs
Exploitation: PoC: jparser with Input and Output.

Aubio: [Vendor]aubio.org

[Vulnerability]: Memory Leak

Affected version: version <= 0.4.9
Description: With carefully constructed inputs, memory leak could happen during continuous running.
Exploitation: PoC: filter-test.py with Input and Output.

Bottleneck: [Vendor]PyData

[Vulnerability-1]: Segment fault

Affected version: version <= 1.3.4
Description: With carefully constructed inputs, the API median can crash with segment fault. This allows attackers to conduct DoS attacks by construct specific inputs.
Exploitation: PoC: random_shape.py and Output.
With 7 inputs: input1, input2, input3, input4, input5, input6, input7

[Vulnerability-2]: Segment fault

Affected version: version <= 1.3.4
Description: With carefully constructed inputs, the API nanmean can crash with segment fault. This allows attackers to conduct DoS attacks by construct specific inputs.
Exploitation: PoC: random_shape.py and Output.
With 7 inputs: input1, input2, input3, input4, input5, input6, input7

[Vulnerability-3]: Segment fault

Affected version: version <= 1.3.4
Description: With carefully constructed inputs, the API nanmedian can crash with segment fault. This allows attackers to conduct DoS attacks by construct specific inputs.
Exploitation: PoC: random_shape.py and Output.
With 7 inputs: input1, input2, input3, input4, input5, input6, input7

[Vulnerability-4]: Segment fault

Affected version: version <= 1.3.4
Description: With carefully constructed inputs, the API nanmin can crash with segment fault. This allows attackers to conduct DoS attacks by construct specific inputs.
Exploitation: PoC: random_shape.py and Output.
With 7 inputs: input1, input2, input3, input4, input5, input6, input7

[Vulnerability-5]: Segment fault

Affected version: version <= 1.3.4
Description: With carefully constructed inputs, the API nanstd can crash with segment fault. This allows attackers to conduct DoS attacks by construct specific inputs.
Exploitation: PoC: random_shape.py and Output.
With 7 inputs: input1, input2, input3, input4, input5, input6, input7

[Vulnerability-6]: Segment fault

Affected version: version <= 1.3.4
Description: With carefully constructed inputs, the API ss can crash with segment fault. This allows attackers to conduct DoS attacks by construct specific inputs.
Exploitation: PoC: random_shape.py and Output.
With 7 inputs: input1, input2, input3, input4, input5, input6, input7

[Vulnerability-7]: Segment fault

Affected version: version <= 1.3.4
Description: With carefully constructed inputs, the API nanmax can crash with segment fault. This allows attackers to conduct DoS attacks by construct specific inputs.
Exploitation: PoC: random_shape.py and Output.
With 7 inputs: input1, input2, input3, input4, input5, input6, input7