Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5xf2-f6ch-6p8r

Опубликовано: 22 сент. 2025
Источник: github
Github: Прошло ревью
CVSS3: 5.9

Описание

CodeChecker has a buffer overflow in the log command

Summary

CodeChecker versions up to 6.26.1 contain a buffer overflow vulnerability in the internal ldlogger library, which is executed by the CodeChecker log command.

Details

Unsafe usage of strcpy() function in the internal ldlogger library allows attackers to trigger a buffer overflow by supplying crafted inputs from the command line. Specifically, the destination buffer is stack-allocated with a fixed size of 4096 bytes, while strcpy() is called without any length checks, enabling an attacker to overrun the buffer.

PoC

Example script is included below to illustrate how this vulnerability can be exploited.

#!/bin/bash export CC_LOGGER_DEF_DIRS=1; payload=''; for i in $(seq 1 4090); do payload+='A'; done CodeChecker log -b "/very/long/path/to/$payload/gcc a.c" -o compilation.json

Impact

Any environment where the vulnerable CodeChecker log command is executed with untrusted user input is affected by this vulnerability.

Пакеты

Наименование

codechecker

pip
Затронутые версииВерсия исправления

<= 6.26.1

6.26.2

EPSS

Процентиль: 4%
0.00018
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-121

Связанные уязвимости

CVSS3: 5.9
nvd
3 месяца назад

CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. CodeChecker versions up to 6.26.1 contain a buffer overflow vulnerability in the internal ldlogger library, which is executed by the CodeChecker log command. This issue affects CodeChecker: through 6.26.1.

EPSS

Процентиль: 4%
0.00018
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-121