Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix format string and buffer overflow vulnerabilities #12

Merged
merged 2 commits into from
May 28, 2024

Conversation

matthewpruett
Copy link
Contributor

@matthewpruett matthewpruett commented Apr 29, 2024

DMitry has multiple externally-controlled format string vulnerabilities and stack-based buffer overflows. The format string vulnerabilities are assigned CVE-2024-31837, and the buffer overflows appear to be related to CVE-2017-7938.

Format String reproducers:
Information disclosure:
./dmitry -i "8.8.8.8 %p"

Denial of service:
./dmitry -i "8.8.8.8 %s %s %s"

Buffer overflow reproducers:
./dmitry 8.8.8.8 1234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890

./dmitry google.com 1234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890

@jaygreig86 jaygreig86 merged commit 9805795 into jaygreig86:master May 28, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants