Skip to content

Potential security concern in rm_digest_hexstring function #753

@ret2ldz

Description

@ret2ldz

Hi,
I’d like to bring to your attention a potential security concern I noticed related to the rm_digest_steal function.

From my understanding, this function is called by rm_tm_extract, where the buffer length is 0x200. It seems that the parameter controlling the write to this buffer might be controllable, which could pose a security risk.

However, I want to emphasize that I haven’t verified this issue myself, and my confidence level in this observation is about 50%.
Please consider reviewing this when you have time. I’m happy to provide more details or collaborate if needed.
Thank you for your hard work on this project!

Metadata

Metadata

Assignees

No one assigned

    Labels

    need-infoFurther information from issue author is requested

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions