You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hello, The program has a buffer overflow vulnerability when running the program pn_dev. Specifically, the startup command is: ./pn_dev -s qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq (There are 241 q) .
I have analyzed the code p-net/src/ports/linux/sampleapp_main.c and found that it is because when parsing the input parameter -s, the length of the input parameters is not limited. But output_arguments.station_name is defined as an array of length 241. The following is the corresponding source code.
Looking forward to your reply, thank you.
The text was updated successfully, but these errors were encountered:
Hello, The program has a buffer overflow vulnerability when running the program
pn_dev
. Specifically, the startup command is:./pn_dev -s qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq
(There are 241 q) .I have analyzed the code
p-net/src/ports/linux/sampleapp_main.c
and found that it is because when parsing the input parameter-s
, the length of the input parameters is not limited. Butoutput_arguments.station_name
is defined as an array of length 241. The following is the corresponding source code.Looking forward to your reply, thank you.
The text was updated successfully, but these errors were encountered: