296,676
Total vulnerabilities in the database
CodeChecker versions up to 6.26.1 contain a buffer overflow vulnerability in the internal ldlogger
library, which is executed by the CodeChecker log
command.
Unsafe usage of strcpy()
function in the internal ldlogger
library allows attackers to trigger a buffer overflow by supplying crafted inputs from the command line. Specifically, the destination buffer is stack-allocated with a fixed size of 4096 bytes, while strcpy()
is called without any length checks, enabling an attacker to overrun the buffer.
Example script is included below to illustrate how this vulnerability can be exploited.
#!/bin/bash
export CC_LOGGER_DEF_DIRS=1;
payload=''; for i in $(seq 1 4090); do payload+='A'; done
CodeChecker log -b "/very/long/path/to/$payload/gcc a.c" -o compilation.json
Any environment where the vulnerable CodeChecker log
command is executed with untrusted user input is affected by this vulnerability.