[2019-08-06] - Found with American Fuzzy Lop - CVE-2019-14690 Heap-based buffer overflow in CxadbmfPlayer::__bmf_convert_stream(), in src/bmf.cpp. ``` ================================================================= ==6298==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x63000000f8dd at pc 0x0000004c6aaf bp 0x7ffd579ffc90 sp 0x7ffd579ff440 WRITE of size 6 at 0x63000000f8dd thread T0 #0 0x4c6aae in __asan_memset (/home/fcambus/reps/adplay+0x4c6aae) #1 0x7face9bf1bdd in CxadbmfPlayer::__bmf_convert_stream(unsigned char*, int) /home/fcambus/adplug/src/bmf.cpp:430:5 #2 0x7face9bf1a0a in CxadbmfPlayer::xadplayer_load() /home/fcambus/adplug/src/bmf.cpp:189:12 #3 0x7face9d5d88a in CxadPlayer::load(std::__cxx11::basic_string, std::allocator > const&, CFileProvider const&) /home/fcambus/adplug/src/xad.cpp:93:8 #4 0x7face9bdf1d5 in CAdPlug::factory(std::__cxx11::basic_string, std::allocator > const&, Copl*, CPlayers const&, CFileProvider const&) /home/fcambus/adplug/src/adplug.cpp:169:10 #5 0x4fcd62 in play(char const*, Player*, int) /home/fcambus/adplay-unix/src/adplay.cc:309:11 #6 0x4fbaf4 in main /home/fcambus/adplay-unix/src/adplay.cc:544:5 #7 0x7face941d09a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2409a) #8 0x41f759 in _start (/home/fcambus/reps/adplay+0x41f759) 0x63000000f8dd is located 6061 bytes to the right of 56624-byte region [0x630000000400,0x63000000e130) allocated by thread T0 here: #0 0x4f67e2 in operator new(unsigned long) (/home/fcambus/reps/adplay+0x4f67e2) #1 0x7face9bf0157 in CxadbmfPlayer::factory(Copl*) /home/fcambus/adplug/src/bmf.cpp:78:10 #2 0x7face9bdf11d in CAdPlug::factory(std::__cxx11::basic_string, std::allocator > const&, Copl*, CPlayers const&, CFileProvider const&) /home/fcambus/adplug/src/adplug.cpp:168:10 #3 0x4fcd62 in play(char const*, Player*, int) /home/fcambus/adplay-unix/src/adplay.cc:309:11 #4 0x4fbaf4 in main /home/fcambus/adplay-unix/src/adplay.cc:544:5 #5 0x7face941d09a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2409a) SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/fcambus/reps/adplay+0x4c6aae) in __asan_memset Shadow bytes around the buggy address: 0x0c607fff9ec0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fff9ed0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fff9ee0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fff9ef0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fff9f00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c607fff9f10: fa fa fa fa fa fa fa fa fa fa fa[fa]fa fa fa fa 0x0c607fff9f20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fff9f30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fff9f40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fff9f50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fff9f60: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==6298==ABORTING ```