bulk_extractor has Heap-based Buffer Overflow vulnerability
`bulk_extractor` is a digital forensics exploitation tool. Starting in version 1.4, `bulk_extractor`’s embedded unrar code has a heap‑buffer‑overflow in the RAR PPM LZ decoding path. A crafted RAR inside a disk image causes an out‑of‑bounds write in `Unpack::CopyString`, leading to a crash under ASAN (and likely a crash or memory corruption in production builds). There's potential for using this for RCE. As of time of publication, no known patches are available.
References
- https://github.com/simsong/bulk_extractor/security/advisories/GHSA-rh8m-9xrx-q64q x_refsource_CONFIRM
- https://github.com/simsong/bulk_extractor/security/advisories/GHSA-rh8m-9xrx-q64q x_refsource_CONFIRM
- https://github.com/simsong/bulk_extractor/security/advisories/GHSA-rh8m-9xrx-q64q x_refsource_CONFIRM
- https://github.com/simsong/bulk_extractor/security/advisories/GHSA-rh8m-9xrx-q6… exploit
Affected products
- ==>= 1.4, <= 2.1.1
Matching in nixpkgs
pkgs.bulk_extractor
Digital forensics tool for extracting information from file systems
Package maintainers
-
@D3vil0p3r Antonio Voza <vozaanthony@gmail.com>