aliasrobotics/RVD

RVD#3256: CWE-134 (format), If syslogs format strings can be influenced by an attacker, they can b... @ F767ZI-v1/px4nucleo_spi.c:77

Closed this issue · 0 comments

id: 3256
title: 'RVD#3256: CWE-134 (format), If syslogs format strings can be influenced by
  an attacker, they can b... @ F767ZI-v1/px4nucleo_spi.c:77'
type: bug
description: If syslogs format strings can be influenced by an attacker, they can
  be exploited (CWE-134). Use a constant format string for syslog. . Happening @ ...F767ZI-v1/px4nucleo_spi.c:77
cwe:
- CWE-134
cve: None
keywords:
- flawfinder
- flawfinder_level_4
- static analysis
- testing
- triage
- CWE-134
- bug
- 'version: v1.7.0'
- 'robot component: PX4'
- components software
system: ./Firmware/src/drivers/boards/px4nucleoF767ZI-v1/px4nucleo_spi.c:77:21
vendor: null
severity:
  rvss-score: 0
  rvss-vector: ''
  severity-description: ''
  cvss-score: 0
  cvss-vector: ''
links:
- https://github.com/aliasrobotics/RVD/issues/3256
flaw:
  phase: testing
  specificity: subject-specific
  architectural-location: application-specific
  application: N/A
  subsystem: N/A
  package: N/A
  languages: None
  date-detected: 2020-06-29 (20:52)
  detected-by: Alias Robotics
  detected-by-method: testing static
  date-reported: 2020-06-29 (20:52)
  reported-by: Alias Robotics
  reported-by-relationship: automatic
  issue: https://github.com/aliasrobotics/RVD/issues/3256
  reproducibility: always
  trace: '(context) #    define message syslog'
  reproduction: See artifacts below (if available)
  reproduction-image: gitlab.com/aliasrobotics/offensive/alurity/pipelines/active/pipeline_px4/-/jobs/616402716/artifacts/download
exploitation:
  description: ''
  exploitation-image: ''
  exploitation-vector: ''
  exploitation-recipe: ''
mitigation:
  description: Use a constant format string for syslog
  pull-request: ''
  date-mitigation: ''