Hi,
our team have developed a recurring vulnerability detection tool. This tool mainly uses static analysis methods, and it has a high detection accuracy in our dataset. We have also received positive feedback from other projects before.
we have scanned your repo(GitHub - ONLYOFFICE/core: Server core components which are a part of ONLYOFFICE Document Server) and found some vulnerabilities, here are some details as follows:
- pixFewColorsOctcubeQuantMixed functions in the file DesktopEditor/raster/JBig2/source/LeptonLib/colorquant1.cpp. It may allow a heap-based buffer over-read. This vulnerability shares a similarity to CVE-2020-36281 and the fix of this CVE is Fixed issue 22140 in oss-fuzz: Heap-buffer-overflow · DanBloomberg/leptonica@5ee24b3 · GitHub
- findNextBorderPixel function in the file DesktopEditor/raster/JBig2/source/LeptonLib/ccbord.cpp. They may have a vulnerability that allows a heap-based buffer over-read. This vulnerability shares a similarity to CVE-2020-36278 and the fix of this CVE is Issue 23433 in oss-fuzz: Heap-buffer-overflow in findNextBorderPixel() · DanBloomberg/leptonica@8d6e175 · GitHub
Would you can help to check if this bug is true? If it’s true, please try to fix it, or I’d like to open a PR for that if necessary. Thank you for your effort and patience!