New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
segmentation fault when execute_command and the stack overflow caused by parameters #40
Comments
You're right. There is surely more instances like this one. Tagging this as a security bug to be fixed at some point. Thanks! |
Well, there are other security issues. There is no limit to the length of program parameters, which may cause overflow. src/client/client.c void main(int argc, char* argv[]){
...
int opt;
char dest_address[32];
char path_arg[512];
while ((opt = getopt(argc, argv, ":S:c:e:u:a:p:s:h")) != -1) {
switch (opt) {
case 'S':
...
strcpy(dest_address, optarg); |
Is this the reason I get
I have not been able to carry out a PoC due to the above errors. |
https://nvd.nist.gov/vuln/detail/CVE-2022-35505 |
hi, great project!
I think it's better to limit the size of
res
, otherwise it may cause the program to crash, such as performing "cat /dev/random | od -x", which maybe unlikely in reality.The text was updated successfully, but these errors were encountered: