-
Notifications
You must be signed in to change notification settings - Fork 1k
So many buffer overflows. Can't count. #2
Comments
Ya I've been finding these too, started patching for them, however have no way to test. Anyone interested in working with me/testing before I submit patches? |
Also not really a fan of strlen() all sizes should be tracked instead, should never need to use strlen() |
As a rule of thumb i take the unsafe functions and redefine them to garbage so that if I do use one by mistake, compiling yells at me |
This is most likely due to the pre-C++11 IDE / compiler support.
|
Is this going to be fixed? Has it been fixed? A project I am working on wants to use this as a dependency but we cannot until we know it doesn't have (known) vulnerabilities. |
As far as I know, no one is working on this currently. |
Resolve Issue facebookarchive#8 - Incorrect/duplicated test conditional
…support_android_arm64 Remove unnecessary include for android builds
Did a quick:
grep -rn "sprintf(" .
and got 215 results. Some of these seem pretty serious, too. Like:
https://github.com/OculusVR/RakNet/blob/master/Source/EmailSender.cpp#L153
Which has a good chance of being remote.
I may try to make a pull request later, but this is going to need a big change and I thought you ought to know soon. "Swiss cheese" comes to mind. I'd recommend taking care of the low hanging fruit first, replace all unsafe string functions with their safe counterparts. IE: snprintf() instead of sprintf(). I'd also not recommend running this on any important systems until then.
Other things to grep for which will give you loads of dangerous overflows in the RakNet code:
"strcat", "strcpy", and "memcpy"
Thanks
The text was updated successfully, but these errors were encountered: