CWE-785 - Use of Path Manipulation Function without Maximum-sized Buffer
- Abstraction:Variant
- Structure:Simple
- Status:Incomplete
- Release Date:2009-07-27
- Latest Modification Date:2023-06-29
Weakness Name
Use of Path Manipulation Function without Maximum-sized Buffer
Description
The product invokes a function for normalizing paths or file names, but it provides an output buffer that is smaller than the maximum possible size, such as PATH_MAX.
Passing an inadequately-sized output buffer to a path manipulation function can result in a buffer overflow. Such functions include realpath(), readlink(), PathAppend(), and others.
Common Consequences
Scope: Integrity, Confidentiality, Availability
Impact: Modify Memory, Execute Unauthorized Code or Commands, DoS: Crash, Exit, or Restart