Skip to content

Commit b8a3622

Browse files
authored
Fix timestamps (#222)
* Grr typo on bold Signed-off-by: Tod Beardsley <[email protected]> * Most timestamps done Signed-off-by: Tod Beardsley <[email protected]> * Fixed a bugged timestamp, added rest Signed-off-by: Tod Beardsley <[email protected]> --------- Signed-off-by: Tod Beardsley <[email protected]>
1 parent c1231b3 commit b8a3622

26 files changed

+69
-44
lines changed

content/cves/CVE-2023-0666.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
title: CVE-2023-0666 🤘
33
aliases: ["/cves/CVE-2023-0666.html"]
4+
pubDate: 2023-06-06T13:37:00-05:00
45
---
56

67
# CVE-2023-0666: Wireshark RTPS Parsing Buffer Overflow

content/cves/CVE-2023-0667.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
title: CVE-2023-0667
33
aliases: ["/cves/CVE-2023-0667.html"]
4+
pubDate: 2023-06-06T13:37:00-05:00
45
---
56

67
# CVE-2023-0667: Wireshark MSMMS parsing buffer overflow
@@ -63,7 +64,7 @@ Following, on line 471, the length is multiplied by 8, then 8 is subtracted from
6364
472
6465
```
6566

66-
Following the length remaining calculation, the `command_id` retrieved earlier is used to determine the command type and on line 480, the `dissect_client_transport_info` is called
67+
Following the length remaining calculation, the `command_id` retrieved earlier is used to determine the command type and on line 480, the `dissect_client_transport_info` is called
6768

6869
`/wireshark/epan/dissectors/packet-ms-mms.c`
6970
```

content/cves/CVE-2023-0668.md

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
title: CVE-2023-0668
33
aliases: ["/cves/CVE-2023-0668.html"]
4+
pubDate: 2023-06-06T13:37:00-05:00
45
---
56

67

@@ -20,12 +21,12 @@ This crash is caused by an out of bounds read from the global buffer `conf_phaso
2021

2122
`wireshark/epan/dissectors/packet-synphasor.c`
2223
```
23-
363 static const value_string conf_phasor_type[] = {
24+
363 static const value_string conf_phasor_type[] = {
2425
364 { 0, "Voltage, Zero sequence" },
2526
365 { 1, "Voltage, Positive sequence" },
2627
366 { 2, "Voltage, Negative sequence" },
27-
367 { 3, "Voltage, Reserved" },
28-
368 { 4, "Voltage, Phase A" },
28+
367 { 3, "Voltage, Reserved" },
29+
368 { 4, "Voltage, Phase A" },
2930
369 { 5, "Voltage, Phase B" },
3031
370 { 6, "Voltage, Phase C" },
3132
371 { 7, "Voltage, Reserved" },
@@ -48,36 +49,36 @@ In `dissect_PHSCALE` (which can be found in the top frame of the stack trace.) o
4849

4950
```
5051
1190 static gint dissect_PHSCALE(tvbuff_t *tvb, proto_tree *tree, gint offset, gint cnt)
51-
1191 {
52+
1191 {
5253
1192 proto_tree *temp_tree;
5354
1193 gint i;
54-
1194
55+
1194
5556
1195 if (0 == cnt) {
5657
1196 return offset;
5758
1197 }
58-
1198
59+
1198
5960
1199 temp_tree = proto_tree_add_subtree_format(tree, tvb, offset, 12 * cnt, ett_conf_phconv, NULL,
6061
1200 "Phasor scaling and data flags (%u)", cnt);
61-
1201
62+
1201
6263
1202 for (i = 0; i < cnt; i++) {
6364
1203 proto_tree *single_phasor_scaling_and_flags_tree;
6465
1204 proto_tree *phasor_flag1_tree;
6566
1205 proto_tree *phasor_flag2_tree;
6667
1206 proto_tree *data_flag_tree;
67-
1207
68+
1207
6869
1208 single_phasor_scaling_and_flags_tree = proto_tree_add_subtree_format(temp_tree, tvb, offset, 12,
6970
1209 ett_conf_phlist, NULL,
7071
1210 "Phasor #%u", i + 1);
71-
1211
72+
1211
7273
1212 data_flag_tree = proto_tree_add_subtree_format(single_phasor_scaling_and_flags_tree, tvb, offset, 4,
7374
1213 ett_conf_phflags, NULL, "Phasor Data flags: %s",
7475
1214 conf_phasor_type[tvb_get_guint8(tvb, offset + 2)].strptr);
75-
1215
76+
1215
7677
1216 /* first and second bytes - phasor modification flags*/
7778
1217 phasor_flag1_tree = proto_tree_add_subtree_format(data_flag_tree, tvb, offset, 2, ett_conf_phmod_flags,
7879
1218 NULL, "Modification Flags: 0x%04x",
7980
1219 tvb_get_ntohs(tvb, offset));
80-
1220
81+
1220
8182
```
8283

8384
A Base64 encoded blob of an example PCAP that can trigger the issue is below.

content/cves/CVE-2023-2905.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
title: CVE-2023-2905
33
aliases: ["/cves/CVE-2023-2905.html"]
4+
pubDate: 2023-08-08T13:37:00-05:00
45
---
56

67
# CVE-2023-2905: Cesanta Mongoose MQTT Message Parsing Heap Overflow
@@ -61,7 +62,7 @@ src/mqtt.c
6162
406 m->props_size = decode_variable_length((char *) p, &len_len);
6263
```
6364

64-
The below shows the buffer from the crash file showing a 10 byte mqtt message with the 8th byte having the MSB set.
65+
The below shows the buffer from the crash file showing a 10 byte mqtt message with the 8th byte having the MSB set.
6566

6667
```
6768
Thread 1 "fuzzer" hit Breakpoint 7, LLVMFuzzerTestOneInput (data=0xffffb4500790 "5\b", size=10) at test/fuzz.c:38

content/cves/CVE-2023-2906.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
title: CVE-2023-2906
33
aliases: ["/cves/CVE-2023-2906.html"]
4+
pubDate: 2023-08-24T13:37:00-05:00
45
---
56

67
# CVE-2023-2906: Wireshark CP2179 Parsing Divide By Zero DoS
@@ -25,11 +26,11 @@ The relevant code snippet from `epan/dissectors/packet-cp2179.c` is:
2526
719 {
2627
720 proto_tree_add_item(cp2179_proto_tree, hf_cp2179_timetag_moredata, tvb, offset, 1, ENC_LITTLE_ENDIAN);
2728
721 proto_tree_add_item(cp2179_proto_tree, hf_cp2179_timetag_numsets, tvb, offset, 1, ENC_LITTLE_ENDIAN);
28-
722
29+
722
2930
723 num_records = tvb_get_guint8(tvb, offset) & 0x7F;
3031
724 recordsize = (numberofcharacters-1) / num_records;
3132
725 num_values = (recordsize-6) / 2; /* Determine how many 16-bit analog values are present in each event record */
32-
726
33+
726
3334
727 offset += 1;
3435
```
3536

content/cves/CVE-2023-4504.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
title: CVE-2023-4504
33
aliases: ["/cves/CVE-2023-4504.html"]
4+
pubDate: 2023-09-21T13:37:00-05:00
45
---
56
# CVE-2023-4504: OpenPrinting CUPS/libppd Postscript Parsing Heap Overflow
67

@@ -17,7 +18,7 @@ Due to failure in validating the length provided by an attacker-crafted CUPS PPD
1718

1819
# Technical Details
1920

20-
The `scan_ps` function in the CUPS codebase provides functionality that scans through a string looking for the next Postscript object. When iterating through a string which contains an open parenthesis and ends with a single backslash (0x5c) character, the code incorrectly iterates forward a character without properly checking the bounds of the string resulting in a 1 byte read beyond the allocated heap buffer.
21+
The `scan_ps` function in the CUPS codebase provides functionality that scans through a string looking for the next Postscript object. When iterating through a string which contains an open parenthesis and ends with a single backslash (0x5c) character, the code incorrectly iterates forward a character without properly checking the bounds of the string resulting in a 1 byte read beyond the allocated heap buffer.
2122

2223
Snippet of the vulnerable code:
2324

@@ -107,7 +108,7 @@ Line 1085 contains the case statement which provides the logic used to iterate t
107108

108109
On line 1091, the for loop within the case statement is used to iterate through each character after encountering an open paranthesis character (0x28), storing the pointer to the current character in `cur`.
109110

110-
On line 1111, the code checks if the current character is a backslash and finally, in line 1117, the character index is incremented without checking the length, now pointing to the null byte terminating the string.
111+
On line 1111, the code checks if the current character is a backslash and finally, in line 1117, the character index is incremented without checking the length, now pointing to the null byte terminating the string.
111112

112113
Upon the next iteration of the loop, on line 1094, the loop now begins iterating through unallocated memory resulting in undefined behaviour.
113114

@@ -142,4 +143,3 @@ This issue is being disclosed through the AHA! CNA and is credited to: [zenofex]
142143
[disclosure policy]: https://takeonme.org/cve.html
143144
[AHA!]: https://takeonme.org/
144145
[CWE-122]: https://cwe.mitre.org/data/definitions/122.html
145-

content/cves/CVE-2023-5841.md

Lines changed: 16 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
title: CVE-2023-5841
33
aliases: ["/cves/CVE-2023-5841.html"]
4+
pubDate: 2024-01-31T13:37:00-05:00
45
---
56

67
# CVE-2023-5841: Academy Software Foundation OpenEXR Heap Overflow in Scanline Deep Data Parsing
@@ -27,7 +28,7 @@ src/lib/OpenEXRCore/unpack.c
2728
1214 uint8_t* cdata;
2829
1215 int w, h, bpc, ubpc;
2930
1216 size_t totsamps = 0;
30-
1217
31+
1217
3132
...
3233
...
3334
1253 for (int x = 0; x < w; ++x)
@@ -38,18 +39,18 @@ src/lib/OpenEXRCore/unpack.c
3839
1258 {
3940
1259 int32_t tmp = samps - prevsamps;
4041
1260 prevsamps = samps;
41-
1261 samps = tmp;
42-
1262 }
43-
1263
42+
1261 samps = tmp;
43+
1262 }
44+
1263
4445
1264 UNPACK_SAMPLES (samps)
45-
1265
46+
1265
4647
1266 srcbuffer += bpc * samps;
4748
1267 if (incr_tot) totsamps += (size_t) samps;
48-
1268 }
49-
1269 }
49+
1268 }
50+
1269 }
5051
1270 sampbuffer += w;
51-
1271 }
52-
1272
52+
1271 }
53+
1272
5354
1273 return EXR_ERR_SUCCESS;
5455
1274 }
5556
```
@@ -179,7 +180,7 @@ src/lib/OpenEXRCore/unpack.c
179180
1090 }
180181
```
181182

182-
This vulernability is by default unreachable through the exr\* utilities provided with
183+
This vulernability is by default unreachable through the exr\* utilities provided with
183184
the OpenEXR library because of a conditional in the `checkCoreFile` function (lines 1489-1492 below) which prevent the processing of EXR image files with the `DEEP_SCANLINE`/`DEEP_TILE` storage modes.
184185

185186
This however only prevents the exr\* utilities from reaching the vulnerable code and direct calls
@@ -192,21 +193,21 @@ src/lib/OpenEXRUtil/ImfCheckFile.cpp
192193
1476 {
193194
1477 exr_result_t rv;
194195
1478 int numparts;
195-
1479
196+
1479
196197
1480 rv = exr_get_count (f, &numparts);
197198
1481 if (rv != EXR_ERR_SUCCESS) return true;
198-
1482
199+
1482
199200
1483 for (int p = 0; p < numparts; ++p)
200201
1484 {
201202
1485 exr_storage_t store;
202203
1486 rv = exr_get_storage (f, p, &store);
203204
1487 if (rv != EXR_ERR_SUCCESS) return true;
204-
1488
205+
1488
205206
1489 // TODO: Need to fill this in
206207
1490 if (store == EXR_STORAGE_DEEP_SCANLINE ||
207208
1491 store == EXR_STORAGE_DEEP_TILED)
208209
1492 continue;
209-
1493
210+
1493
210211
1494 if (store == EXR_STORAGE_SCANLINE)
211212
1495 {
212213
1496 if (readCoreScanlinePart (f, p, reduceMemory, reduceTime))
@@ -217,7 +218,7 @@ src/lib/OpenEXRUtil/ImfCheckFile.cpp
217218
1501 if (readCoreTiledPart (f, p, reduceMemory, reduceTime)) return true;
218219
1502 }
219220
1503 }
220-
1504
221+
1504
221222
1505 return false;
222223
1506 }
223224
```

content/cves/CVE-2024-4224.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
title: CVE-2024-4224
33
aliases: ["/cves/CVE-2024-4224.html"]
4+
pubDate: 2024-07-15T14:34:53.699-05:00
45
---
56

67
# CVE-2024-4224: TP-Link TL-SG1016DE XSS

content/cves/CVE-2025-2894.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
title: CVE-2025-2894
33
aliases:
44
- /cves/CVE-2025-2894.html
5+
pubDate: 2025-03-27T20:57:13-05:00
56
---
67

78
# CVE-2025-2894: Unitree Go1 Backdoor Control Channel

content/cves/CVE-2025-32455.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
title: CVE-2025-32455
33
aliases:
44
- /cves/CVE-2025-32455.html
5+
pubDate: 2025-06-08T15:58:51-05:00
56
---
67

78
# CVE-2025-32455: ON Semiconductor Quantenna router_command.sh run_cmd Argument Injection

0 commit comments

Comments
 (0)