Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:43767
HistoryOct 11, 2023 - 7:40 p.m.

Buffer Overflow

2023-10-1119:40:21
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
6
buffer overflow
libzephyr.so
sprintf()
path_max
denial of service
arbitrary code
security boundary
software

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

EPSS

0.001

Percentile

41.6%

libzephyr.so is vulnerable to Buffer Overflow. The vulnerability is caused by the insecure use of the sprintf() function. If the path parameter is PATH_MAX characters long, the sprintf() function will write one NULL byte off the stack variable mount_path. When the path parameter is attacker-controlled and crosses a security boundary, the attacker is able to exploit this vulnerability to cause a denial of service attacks or even execute arbitrary code.

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

EPSS

0.001

Percentile

41.6%

Related for VERACODE:43767