Use of Path Manipulation Function without Maximum-sized Buffer
The weakness exists due to improper passing of output buffer to a path manipulation function (e.g. realpath(), readlink(), PathAppend()) that leads to size reduction and butter overflow.
Such problems can cause modifying of memory, unauthorized code or commands execution and even denial of service or application crash.
The vulnerability is introduced during Implementation stage.
Such problems can cause modifying of memory, unauthorized code or commands execution and even denial of service or application crash.
The vulnerability is introduced during Implementation stage.