Hello,

Am Mo., 24. Mai 2021 um 20:46 Uhr schrieb Matt Sicker <boa...@gmail.com>:

> There's also a bit of an issue of fixing these types of
> vulnerabilities at the library level. The library itself typically
> won't have much in the way of a security model until you integrate it
> into an application.


That is true in general, but we have for the found issues (which are not
OOM) two possibilities, catch the runtime exceptions and rethrow them as a
IOException (Maybe a new subtype like MalformedArchiveException extends
IOException) or document in javadoc that the runtime exceptions dealing
with Out of Bounds and maybe NullPointers might be thrown. Do you think
this is a good idea? -  I can prepare a patch for it, would prefer a new
specific sub exception.

Having said that, it is not uncommon that a size field is used to allocate
Buffers, in that case an OOM is possible and a Limit Manager would be
helpful. This does not only help against malicious files. Not sure if the
fuzzer wil find that in the future...

BTW: I was not Aware that JFrog has its own vulnerability feed, is that the
Snyk Knowledge Base or do they have their own analysts?

Gruss
Bernd




> For example, if you only use commons-compress on
> trusted input, then even high availability impact vulnerabilities can
> be mitigated by not exercising that code. On the other hand, a more
> generic file upload service or media manager or similar application
> might not be resilient to its libraries having these types of input
> bugs which could potentially crash the JVM (like an OutOfMemoryError
> if not handled).
>
> I'd be far more concerned about fuzzing any libraries here that make
> JNI calls or use any of the Unsafe APIs. Java's basic memory safety
> helps avoid most of the common horrifying CVEs that similar C/C++
> libraries suffer from, but linking into native code can break that.
> This can also apply to any classes in the standard library which
> invoke native code themselves (think things like AWT).
>
> On Mon, 24 May 2021 at 12:56, Fabian Meumertzheim
> <meumertzh...@code-intelligence.com> wrote:
> >
> > The JFrog reports seem to reference the following two OSS-Fuzz findings,
> > which have not been classified as security issues:
> >
> > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34437
> > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=33959
> >
> > OSS-Fuzz and Jazzer, its Java fuzzer, never mark uncaught exceptions as
> > security issues, but simply as ordinary bugs. Only things like
> > OutOfMemoryErrors on relatively small inputs are marked as potential
> > security issues, albeit with a severity rating of "Low". Of course, the
> > rating can always be adjusted manually if it doesn't fit the program
> > policies. For example, some projects seem to consider OutOfMemoryError
> > caused by overly large allocations to be just bugs and reserve
> > the "security issue" label for e.g. those caused by infinite loops.
> >
> > If JFrog decides to report the issues above as security issues and even
> > assigns an unreasonably high severity rating, the fault (and
> fearmongering)
> > is entirely on them.
> >
> > Fabian
> >
> >
> >
> > On Mon, May 24, 2021 at 7:03 PM Stefan Bodewig <bode...@apache.org>
> wrote:
> >
> > > On 2021-05-24, Tero Saarni wrote:
> > >
> > > > We are getting reports from JFrog Xray vulnerability scanner that
> seem
> > > > to be related to recently fixed OSS-Fuzz issues:
> > >
> > > I wasn't aware of this effect. This is very unfortunate.
> > >
> > > > * Summary: Apache Commons Compress archivers/zip/ZipFile.java
> > > >   ZipFile::readCentralDirectoryEntry() Function Uncaught Exception
> DoS
> > > >   Severity: High
> > >
> > > > * Summary: Apache Commons Compress archivers/tar/TarArchiveEntry.java
> > > >   TarArchiveEntry::processPaxHeader() Function Uncaught Runtime
> > > Exception DoS
> > > >   Severity: High
> > >
> > >
> > > > In previous thread it was said that none of the fuzzer findings was
> > > > deemed security issues.  Were these incorrectly flagged by the
> > > > vulnerability scanner?
> > >
> > > Historically we have never considered uncaught runtime exceptions to be
> > > security issues. We've fixed similar issues in the past and still do.
> > >
> > > So when I said nothing had been a deemed a security issue I meant
> > > "deemed by us". Unfortunately the OSS Fuzz classification doesn't match
> > > ours.
> > >
> > > There are a few more cases around 7z that have not been flagged as
> > > security issues - I have no idea why not.
> > >
> > > In all cases corrupt archives may cause RuntimeExceptions
> > > (ArrayIndexOutOfBounds, IllegalArgument, BufferUnderflow, ...) rather
> > > than IOExceptions. If you try to read archives from untrusted sources,
> > > this may lead to unexpected exceptions.
> > >
> > > > I'd be curious to know if there is planned date for commons-compress
> > > > 1.21?
> > >
> > > There is no planned date I was aware of.
> > >
> > > Stefan
> > >
> > > ---------------------------------------------------------------------
> > > To unsubscribe, e-mail: dev-unsubscr...@commons.apache.org
> > > For additional commands, e-mail: dev-h...@commons.apache.org
> > >
> > >
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: dev-unsubscr...@commons.apache.org
> For additional commands, e-mail: dev-h...@commons.apache.org
>
>

Reply via email to