BF Specification of CVE-2017-17833 SLPD Double Free in OpenSLP in v1.0.2 and v1.1.0

../../../../BF/images/BFVUL/CVE-2017-17833(simple)-0.png
Missing reposition of the 'result' pointer leads to a dangling pointer due to reallocation of the same object via 'sendbuf', which, when used to resize (second reallocation) the object leads to a Double Deallocate -- aka double free. If exploited, this can lead to a denial of service (DOS) --availability loss, or arbitrary code execution (ACE) and more specificqlly remote code execution (RCE) -- everything could be lost.

//generated// Missing Code (in ‘int ProcessSrvRqst(()’) to Reposition ‘result = *sendbuf;’ via Sequential Heap Used in Third-Party (openslp-2.0.0-double-free#L409 openslp/slpd/slpd_process.c#L409) Userland leads to Dangling Pointer ((due to reallocation of the same object via ‘sendbuf’)) , which propagates to Dangling Pointer (in ‘ProcessSrvRqst’) Explicit Reallocate-Extend (‘result = SLPBufferRealloc(result, size);’) Heap Third-Party (openslp-2.0.0-double-free#L547 openslp/slpd/slpd_process.c#L556) in Userland that results in Double Deallocate ((double free)) , which can be exploited toward Arbitrary Code Execution (ACE) (everything could be lost) or Denial of Service (DOS) (availability loss) security failure.



vendor:product: openslp:openslp:1.0.2


Bug Report


Code with Fix
Code with Fix1


Code with Bug


NVD Entry

ClassDefinition
OperationDefinition
Cause/ConsequenceDefinition
Code BugCode Bug type – An error in the implementation of an operation – proper operands over an improper operation. It is the roor cause of a security vulnerability. Must be fixed to resolve the vulnerability.
   Missing CodeMissing Code bug - The operation is misplaced entirely absent.
Address Error/FaultAddress error (or fault) type – The address of an object is wrong.
   Dangling PointerDangling Pointer error (or fault) – Still holds the address of its successfully deallocated object (e.g., a pointer to a freed heap object or address of a stack object returned by a function).
Memory Corruption/Disclosure Final ErrorMemory Corruption/Disclosure final error/exploit vector type – An exploitable or undefined system behavior caused by memory addressing, allocation, use, or deallocation bugs.
   Double DeallocateDouble Deallocate final error – An attempt to deallocate a deallocated (freed) object.
Operation AttributeDefinition
MechanismMechanism operation attribute type – Shows how the operation with a bug or faulty operand is performed.
   SequentialSequential operation attribute – The operation is via iterating over the object elements.
   ExplicitExplicit operation attribute – The operation is via a function/method call.
Source CodeSource Code operation attribute type – Shows where the code of the operation with a bug or faulty operand resides within the software, firmware, or hardware.
   Third-PartyThird-Party operation attribute – The operation code is in a third-party source.
Execution SpaceExecution Space operation attribute type – Shows where the operation with a bug or faulty operand is executed and the privilege level at which it runs.
   UserlandUserland operation attribute – The bugged code runs in an environment with privilege levels, but in unprivileged mode (e.g., ring 3 in x86 architecture).
Operand AttributeDefinition
Address StateAddress State operand attribute type – Shows where the address is (i.e., its location) in the memory layout.
   HeapThe object is a dynamically allocated data structure (e.g., via malloc() or new).
Size KindSize Kind operand attribute type – Shows what is used as the size or length (i.e., the number of elements) of an object - e.g., as the limit for traversal over the elements.
   UsedUsed operand attribute – A supplied value to be used as the size or length (i.e., the number of elements) of an object.