Open
Description
Hello, The program has a buffer overflow vulnerability when running the program pn_dev
. Specifically, the startup command is: ./pn_dev -s qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq
(There are 241 q) .
I have analyzed the code p-net/src/ports/linux/sampleapp_main.c
and found that it is because when parsing the input parameter -s
, the length of the input parameters is not limited. But output_arguments.station_name
is defined as an array of length 241. The following is the corresponding source code.
Looking forward to your reply, thank you.
Metadata
Metadata
Assignees
Labels
Type
Projects
Milestone
Relationships
Development
No branches or pull requests
Activity