إرسال #585114: SourceCodester Simple Computer Store System v1.0 Buffer Overflowالمعلومات

عنوانSourceCodester Simple Computer Store System v1.0 Buffer Overflow
الوصفThe program uses the unsafe gets() function to read input into the PC.RAM buffer, which is a fixed-size character array (char RAM[100]). Since gets() does not perform any bounds checking, providing more than 100 characters will overflow the buffer and overwrite adjacent memory, leading to a classic stack buffer overflow vulnerability. An attacker can exploit this by crafting input that overwrites control data such as the return address, enabling arbitrary code execution or program crashes.
المصدر⚠️ https://github.com/byxs0x0/cve/issues/6
المستخدم
 wanglun (UID 73616)
ارسال27/05/2025 04:11 AM (11 أشهر منذ)
الاعتدال28/05/2025 08:16 AM (1 day later)
الحالةتمت الموافقة
إدخال VulDB310421 [SourceCodester Computer Store System 1.0 main.c Add laptopcompany/RAM/Processor تلف الذاكرة]
النقاط20

Do you want to use VulDB in your project?

Use the official API to access entries easily!