| शीर्षक | PX4 Autopilot main branch Stack-based Buffer Overflow |
|---|
| विवरण | A stack-buffer-overflow vulnerability exists in PX4’s mavlink_log_handler.cpp/.h when handling logs: LogEntry.filepath is a fixed-size buffer (~60 bytes), but logdata.txt parsing uses sscanf(..., "%s", entry->filepath) without a width limit, so an overly long filename/path token can overflow the stack and crash. In practice this is remotely triggerable via the FTP microservice: an attacker creates a log file in the log directory with an excessively long filename, then sends LOG_REQUEST_LIST (receiving LOG_ENTRY) followed by LOG_REQUEST_DATA; when the handler processes the long filename during log access/parsing, the unbounded %s write overflows LogEntry.filepath, leading to a remote denial-of-service and potentially more severe memory-corruption impact. |
|---|
| स्रोत | ⚠️ https://github.com/PX4/PX4-Autopilot/issues/26118 |
|---|
| उपयोगकर्ता | Fuzz0X (UID 93056) |
|---|
| सबमिशन | 17/12/2025 03:37 AM (4 महीनों पहले) |
|---|
| संयम | 27/12/2025 02:39 PM (10 days later) |
|---|
| स्थिति | स्वीकृत |
|---|
| VulDB प्रविष्टि | 338527 [PX4 PX4-Autopilot तक 1.16.0 mavlink_log_handler.cpp log_entry_from_id बफ़र ओवरफ़्लो] |
|---|
| अंक | 20 |
|---|