View Issue Details
| ID | Project | Category | View Status | Date Submitted | Last Update |
|---|---|---|---|---|---|
| 0009503 | Kali Linux | Kali Package Bug | public | 2026-01-15 01:43 | 2026-01-15 01:44 |
| Reporter | erikdervishi | Assigned To | |||
| Priority | normal | Severity | minor | Reproducibility | have not tried |
| Status | new | Resolution | open | ||
| Summary | 0009503: Steghide 0.5.1-15 crashes (stack smashing detected) on long paths, causing sensitive data leak via core dump | ||||
| Description | Package: steghide Version: 0.5.1-15 Architecture: amd64 Maintainer: Debian Security Team Scenario: I installed steghide from the official Kali Linux repositories. I attempted to embed data into a valid WAV file located in a directory path that, combined with the filename, exceeds 200 bytes in length. Upon execution, the application crashes immediately. Analysis: The crash is caused by a stack-based buffer overflow in src/Embedder.cc. The application uses an unsafe sprintf call to write the status message into a fixed-size buffer (char buf[200]) without bounds checking. The system's Stack Smashing Protector (SSP) correctly detects this violation and terminates the process to prevent arbitrary code execution. Error Message: Impact Analysis:
System Information: Proposed Fix: The original upstream project is inactive. I have submitted a patch to the community fork (StegHigh) that replaces the unsafe sprintf with snprintf. Pull Request: https://github.com/StegHigh/steghide/pull/21 Steps to Reproduce:
#!/bin/bash 1. Enable core dumps to verify leakulimit -c unlimited 2. Define long path > 200 bytesLONG_DIR=$(python3 -c "print('A' 200)") 3. Generate valid 50KB WAV file (Header + Silence)Required to bypass initial file format checks and reach the vulnerable codepython3 -c " 4. Create dummy secretecho "secret data" > secret.txt 5. Run Steghide with a specific passwordecho "Launching steghide with password 'MY_SECRET_PASS'..."
3 .Verify the Data Leak: Locate the core dump and search for the password string. Using coredumpctl (systemd default on Kali)coredumpctl dump steghide > crash.dump Result: The strings command outputs MY_SECRET_PASS multiple times, confirming the passphrase leaked to disk. | ||||
| Date Modified | Username | Field | Change |
|---|---|---|---|
| 2026-01-15 01:43 | erikdervishi | New Issue |