RVD#3256: CWE-134 (format), If syslogs format strings can be influenced by an attacker, they can b... @ F767ZI-v1/px4nucleo_spi.c:77
Closed this issue · 0 comments
rvd-bot commented
id: 3256
title: 'RVD#3256: CWE-134 (format), If syslogs format strings can be influenced by
an attacker, they can b... @ F767ZI-v1/px4nucleo_spi.c:77'
type: bug
description: If syslogs format strings can be influenced by an attacker, they can
be exploited (CWE-134). Use a constant format string for syslog. . Happening @ ...F767ZI-v1/px4nucleo_spi.c:77
cwe:
- CWE-134
cve: None
keywords:
- flawfinder
- flawfinder_level_4
- static analysis
- testing
- triage
- CWE-134
- bug
- 'version: v1.7.0'
- 'robot component: PX4'
- components software
system: ./Firmware/src/drivers/boards/px4nucleoF767ZI-v1/px4nucleo_spi.c:77:21
vendor: null
severity:
rvss-score: 0
rvss-vector: ''
severity-description: ''
cvss-score: 0
cvss-vector: ''
links:
- https://github.com/aliasrobotics/RVD/issues/3256
flaw:
phase: testing
specificity: subject-specific
architectural-location: application-specific
application: N/A
subsystem: N/A
package: N/A
languages: None
date-detected: 2020-06-29 (20:52)
detected-by: Alias Robotics
detected-by-method: testing static
date-reported: 2020-06-29 (20:52)
reported-by: Alias Robotics
reported-by-relationship: automatic
issue: https://github.com/aliasrobotics/RVD/issues/3256
reproducibility: always
trace: '(context) # define message syslog'
reproduction: See artifacts below (if available)
reproduction-image: gitlab.com/aliasrobotics/offensive/alurity/pipelines/active/pipeline_px4/-/jobs/616402716/artifacts/download
exploitation:
description: ''
exploitation-image: ''
exploitation-vector: ''
exploitation-recipe: ''
mitigation:
description: Use a constant format string for syslog
pull-request: ''
date-mitigation: ''