The product invokes a potentially dangerous function that could introduce a vulnerability if it is used incorrectly, but the function can also be used safely.
N/A
Threat Mapped score: 0.0
Industry: Finiancial
Threat priority: Unclassified
CVE: CVE-2007-1470
Library has multiple buffer overflows using sprintf() and strcpy()
CVE: CVE-2009-3849
Buffer overflow using strcat()
CVE: CVE-2006-2114
Buffer overflow using strcpy()
CVE: CVE-2006-0963
Buffer overflow using strcpy()
CVE: CVE-2011-0712
Vulnerable use of strcpy() changed to use safer strlcpy()
CVE: CVE-2008-5005
Buffer overflow using strcpy()
N/A
N/A
Phase | Note |
---|---|
Implementation | N/A |
Intro: The following code attempts to create a local copy of a buffer to perform some manipulations to the data.
Body: However, the programmer does not ensure that the size of the data pointed to by string will fit in the local buffer and copies the data with the potentially dangerous strcpy() function. This may result in a buffer overflow condition if an attacker can influence the contents of the string parameter.
void manipulate_string(char * string){ char buf[24]; strcpy(buf, string); ... }