You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
z3 (Z3 version 4.13.1 - 64 bit) WCNF parser contains a global buffer overflow vulnerability in the opt_stream_buffer::parse_token function. When parsing the "wcnf", the function fails to properly check the buffer boundaries, allowing read beyond the allocated memory leading to code execution or denial of service attack.
Summary
z3 (Z3 version 4.13.1 - 64 bit) WCNF parser contains a global buffer overflow vulnerability in the
opt_stream_buffer::parse_token
function. When parsing the "wcnf
", the function fails to properly check the buffer boundaries, allowing read beyond the allocated memory leading to code execution or denial of service attack.Harness
Compile:
clang++ -g -fsanitize=fuzzer,address -o z3_overflow_fuzzer z3_overflow_fuzzer.cpp
ASAN
File: crash.wcnf.zip (In-case you have problem finding the trigger with the above harness)
The text was updated successfully, but these errors were encountered: