Out-of-Bounds Write in Shared Memory Operation Interface
This vulnerability involves an out-of-bounds write in the Triton Inference Server's shared memory operation interface, specifically affecting version r23.04 and patched in version 24.04. The flaw arises from insufficient validation of offset and size parameters in shared memory operations, enabling attackers to perform unauthorized memory read and write operations.
Available publicly on May 18 2024 | Available with Premium on May 17 2024
Threat Overview
The vulnerability is rooted in the server's handling of shared memory for inference request parameters. By manipulating the offset and size parameters during shared memory registration and inference request processing, an attacker can cause illegal memory operations. This can lead to segmentation faults, program instability, or potentially remote code execution by writing arbitrary data to controlled memory locations.
Attack Scenario
An attacker first sets up a malicious shared memory region and registers it with the server. They then craft an inference request with a specially designed offset that points to an illegal memory address. When the server processes this request, it attempts to write inference results to the specified out-of-bounds address, leading to a segmentation fault or other unintended behavior.
Who is affected
This vulnerability affects users of the Triton Inference Server version r23.04. Specifically, clients utilizing the shared memory functionality for inference requests are at risk, as attackers can exploit this vulnerability to cause denial of service or potentially execute arbitrary code.
Technical Report
Want more out of Sightline?
Sightline offers even more for premium customers
Go Premium
We have - related security advisories that are available with Sightline Premium.