Project

General

Profile

Bug #27

Audit of 04af5c7 - Buffer Overflow: sprintf

Added by Jason Pyeron almost 5 years ago. Updated almost 5 years ago.

Status:
Resolved
Priority:
High
Assignee:
-
Target version:
Start date:
12/19/2014
Due date:
% Done:

0%


Description

4.1. Buffer Overflow: sprintf

4.1.1. File ‎1.2.43
4.1.1.1. The code in this file executes with elevate permissions.
4.1.1.2. The DoTrueCryptShortcutsUninstall function uses szTmp2 string to hold computed paths. The input to sprintf are strings which can be longer than the destination, e.g. ‘sprintf (szTmp2, "%s%s", szLinkDir, "\\TrueCrypt.lnk")’.
4.1.1.3. If the application does not crash from the execution of the sprintf, the modified memory is then passed into system calls, e.g. ‘StatDeleteFile (szTmp2)’.

History

#1 Updated by Jason Pyeron almost 5 years ago

  • Status changed from New to Resolved

[pyeron-issues.ciphershed.org-27 b42e525] resolves https://issues.ciphershed.org/issues/27
2 files changed, 36 insertions(+), 34 deletions(-)

jpyeron@black /projects/cipherShed
$ git log -1
commit b42e5256fe6dcd0deb16a5b534922c73c5791e41
Author: Jason Pyeron <>
Date: Fri Dec 19 09:25:19 2014 -0500

resolves https://issues.ciphershed.org/issues/27
fix other sprintf calls found along the way. There are still many more calls to sprintf and wsprintf in the source as a whole.

#2 Updated by Rocki H almost 5 years ago

  • Target version set to 0.7.3 Alpha

Also available in: Atom PDF