exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Sketchup BMP Material RLE4 Heap Overflow

Sketchup BMP Material RLE4 Heap Overflow
Posted May 31, 2013
Authored by Juan Pablo De Francesco

SketchUp is a 3D modeling program marketed by Trimble Navigation Limited and designed for architectural, civil, and mechanical engineers as well as filmmakers, game developers, and related professions. SketchUp fails to validate the input when parsing an embedded BMP RLE4 compressed texture. Arbitrary code execution is proved possible after a malicious texture or thumbnail or background image triggers a heap overflow. The issue can also be triggered when Windows Explorer reads the embedded thumbnail in a .skp file.

tags | advisory, overflow, arbitrary, code execution
systems | windows
advisories | CVE-2013-3664
SHA-256 | 1c4cfc42272e043cb3a26afd49f0dd9be899a0c1b6c323eb7e949c63ab20224b

Sketchup BMP Material RLE4 Heap Overflow

Change Mirror Download
=================================================================

Title: Sketchup BMP Material RLE4 Heap Overflow
Product: Trimble SketchUp
Advisory ID: BINA-20130521B
CVE ID: CVE-2013-3664
Class: Boundary Error Condition (Buffer Overflow)
Vulnerability class: Client side/ file format
Permalink: http://binamuse.com/advisories/BINA-20130521B.txt
Vendor notified on: 2013-04-18
Patch/Fix Released: 2013-05-21
Advisory Published: 2013-05-23

Vulnerability Description:

SketchUp is a 3D modeling program marketed by Trimble Navigation Limited
and designed for architectural, civil, and mechanical engineers as well
as filmmakers, game developers, and related professions.

SketchUp fails to validate the input when parsing an embedded BMP RLE4
compressed texture. Arbitrary code execution is proved possible after a
malicious texture or thumbnail or background image triggers a heap overflow.
The issue can also be triggered when Windows Explorer reads the embedded
thumbnail in a .skp file.

Vulnerable Packages:

SketchUp 8 - Maintenance 5 - Win 8.0.16846 Mac 8.0.16845
SketchUp 8 - Maintenance 4 - Win 8.0.15158 Mac 8.0.15157
SketchUp 8 - Maintenance 3
SketchUp 8 - Maintenance 2
SketchUp 8 - Maintenance 1
SketchUp 8
SketchUp 7.1 - Maintenance 2
SketchUp 7.1 - Maintenance 1
SketchUp 7.1
SketchUp 7 - Maintenance 1
SketchUp Pro 6 - Maintenance 6

Not Vulnerable Packages:

Sketchup 2013

Solution/Vendor Information/Workaround:

Upgrade to Sketchup 2013
URL: http://www.sketchup.com/products/sketchup-pro/new-in-2013

Credits:

This vulnerability was found by Juan "Lagarto" De Francesco of the Binamuse
Vulnerability Research Team, http://binamuse.com

Technical Description:

The native SketchUp fileformat can handle textured 3D content.
Sketchup can create realistic materials taken from image files such as .jpg
pictures taken with a digital camera. A number of this images can be embedded
into the main .skp file and loaded every time the 3D scene is open.

The bug is triggered when SketchUp loads BMP material with RLE 4 compression.

The code parsing BMP/RLE4 images seem to be taken from http://www.paintlib.de/
paintlib/. The problematic function is "decodeRLE4" at plbmpdec.cpp, and looks
like this:

void PLBmpDecoder::decodeRLE4
( PLDataSource * pDataSrc,
PLBmpBase * pBmp
)
// Decodes a compressed 16-color-bitmap.
{
int y; // Current row

PLBYTE * pSrc;
PLBYTE * pDest; // Current destination.
int XSize = pBmp->GetWidth(); // Width of bitmap in pixels.
PLBYTE SrcByte; // Source byte cache.

PLBYTE RunLength; // Length of current run.
bool bOdd; // true if current run has odd length.

bool bEOL; // true if end of line reached.
bool bEOF=false; // true if end of file reached.

PLBYTE * pLineBuf; // Current line as uncompressed nibbles.
PLBYTE * pBuf; // Current position in pLineBuf.
PLBYTE ** pLineArray = pBmp->GetLineArray();
// Pointers to dest. lines.

Trace (2, "Decoding RLE4-compressed bitmap.
");

// Allocate enough memory for DWORD alignment in original 4 bpp
// bitmap.
pLineBuf = new PLBYTE [XSize*4+28];

for (y=0; y<pBmp->GetHeight() && !bEOF; y++)
{ // For each line...
pBuf = pLineBuf;
bEOL=false;
while (!bEOL)
{ // For each packet do
pSrc = pDataSrc->Read1Byte();
RunLength = *pSrc;
if (RunLength==0)
{ // Literal or escape.
pSrc = pDataSrc->Read1Byte();
RunLength = *pSrc;
switch (RunLength)
{
case 0: // End of line escape
bEOL = true;
break;
case 1: // End of file escape
bEOF = true;
bEOL = true;
break;
case 2: // Delta escape.
// I have never seen a file using this.
delete [] pLineBuf;
raiseError (PL_ERRFORMAT_NOT_SUPPORTED,
"Encountered delta escape.");
break;
default:
// Literal packet
bOdd = (RunLength & 1);
RunLength /= 2; // Convert pixels to bytes.
for (int i=0; i<RunLength; i++)
{ // For each source byte...
pSrc = pDataSrc->Read1Byte();
decode2Nibbles (pBuf, *pSrc);
pBuf += 2;
}
if (bOdd)
{ // Odd length packet -> one nibble left over
pSrc = pDataSrc->Read1Byte();
*pBuf = (*(pSrc))>>4;
pBuf++;
}
// Word alignment at end of literal packet.
if ((RunLength + bOdd) & 1) pDataSrc->Skip(1);
}
}
else
{ // Encoded packet:
// RunLength 4 bpp pixels with 2 alternating
// values.
pSrc = pDataSrc->Read1Byte();
SrcByte = *pSrc;
for (int i=0; i<RunLength/2; i++)
{
decode2Nibbles (pBuf, SrcByte);
pBuf += 2;
}
if (RunLength & 1)
{
*pBuf = (*(pSrc))>>4;
pBuf++;
}
}
}
pDest = pLineArray[pBmp->GetHeight()-y-1];
memcpy (pDest, pLineBuf, XSize);
}
delete [] pLineBuf;
}


Note that the for-loop inside the 'Encoded packet' branch decode/copy
two nibbles to pBuf every time, executing this RunLength/2 times. And
because there is no check about the pBuf's length before advancing the
pointer two positions, a heap overflow (pBuf based) may arise.

The pBuf is initialized to pLineBuf wich is a fresh allocated buffer
of size XSize*4+28, being XSize the BMP's width (controlled value). So
we can allocate almost any buffer size and then write and overflow it
with words like 0x0X0Y (X,Y controlled nibble values).

Exploitation of the above problem will lead to the execution of arbitrary
code on the client machine with the privileges of the user running the
Sketchup.

REFERENCES:

http://blog.binamuse.com/2013/05/multiple-vulnerabilities-on-sketchup.html
http://binamuse.com/advisories/BINA-20130521A.txt

DISCLAIMER:

The content of this advisory are copyright (c) 2013 Binamuse Inc.
and may be distributed freely provided that no fee is charged for this
distribution and proper credit is given.


f/


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close