-
Notifications
You must be signed in to change notification settings - Fork 46
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
buffer overflow in USBDevice #28
Comments
bug 2 - out of bound read and buffer overflow in dfu_upload path
code
if case 2
it could check
the length of
it could lead buffer overflow when read data to
|
bug 3- buffer overflow in dfu_download path
code
it could check |
Thanks for this analysis, I have provided fixes that should remedy these exploitable bugs. Please keep me updated with newer results. Just out of curiosity, what tool are you using to analyze the code? |
I analyze the code by vscode. these patch seems ok. I also have a question
Where is the |
Those are defined by the author of the application, as part of a const struct. |
ok, and do we need to verify that |
bug 1 - buffer overflow in USBD_CtrlReceiveData
path
code
dev->Setup.Length
is recv from other USB device, ifdev->Setup.Length > the size of data
, it will overflow.The text was updated successfully, but these errors were encountered: