Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Use of Path Manipulation Function without Maximum-sized Buffer

The weakness exists due to improper passing of output buffer to a path manipulation function (e.g. realpath(), readlink(), PathAppend()) that leads to size reduction and butter overflow.
Such problems can cause modifying of memory, unauthorized code or commands execution and even denial of service or application crash.
The vulnerability is introduced during Implementation stage.