You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We would appreciate a concise description of the issue, not the link to your blog :/
What's your suggestion for a fix here?
I think what you meant is that this line uses char to store the result of strlen(username) + strlen(password) + 1, and it must stay under 127 bytes to not overflow the value
i prefer this solution, exactly, in this line should be validate string length lower than 127 bytes before defining "toencodeLen" for username and password
if you are want to error exception or you can use snprintf(buffer,toencodeLen+1,...) instead of sprintf.
the case is when remote user access the this function, they can trig to overflow
the function is vulnerable
you can fix it
https://medium.com/@Mr.deadbeef.py/esp-unusable-heap-based-buffer-overlow-ba6e8d99f813
The text was updated successfully, but these errors were encountered: