From 381bbaa4bcd407a37bfc03f2c0ef9303acc6e22b Mon Sep 17 00:00:00 2001 From: GLSAMaker Date: Sun, 11 Aug 2024 14:41:12 +0000 Subject: [ GLSA 202408-27 ] AFLplusplus: Arbitrary Code Execution Bug: https://bugs.gentoo.org/897924 Signed-off-by: GLSAMaker Signed-off-by: Hans de Graaff --- glsa-202408-27.xml | 42 ++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 42 insertions(+) create mode 100644 glsa-202408-27.xml diff --git a/glsa-202408-27.xml b/glsa-202408-27.xml new file mode 100644 index 00000000..4274de78 --- /dev/null +++ b/glsa-202408-27.xml @@ -0,0 +1,42 @@ + + + + AFLplusplus: Arbitrary Code Execution + A vulnerability has been discovered in AFLplusplus, which can lead to arbitrary code execution via an untrusted CWD. + aflplusplus + 2024-08-11 + 2024-08-11 + 897924 + local + + + 4.06c + 4.06c + + + +

The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!

+
+ +

In AFL++ 4.05c, the CmpLog component uses the current working directory to resolve and execute unprefixed fuzzing targets, allowing code execution.

+
+ +

In AFL++ 4.05c, the CmpLog component uses the current working directory to resolve and execute unprefixed fuzzing targets, allowing code execution.

+
+ +

There is no known workaround at this time.

+
+ +

All AFLplusplus users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-forensics/aflplusplus-4.06c" + +
+ + CVE-2023-26266 + + graaff + graaff +
\ No newline at end of file -- cgit v1.2.3-65-gdbad