forked from denisenkom/go-mssqldb
-
Notifications
You must be signed in to change notification settings - Fork 90
Open
Description
Writing this with reference to #218
The vulnerability sonatype-2023-1010 is still present.
Vulnerability Description
The github.com/microsoft/go-mssqldb package is vulnerable to Buffer Overflow attacks. The readPLPType() function in the types.go file uses the size defined by an RPC message for the read buffer instead of a fixed buffer size when handling PLP types. An attacker can exploit this behavior by supplying a specially-crafted message that would cause a large memory allocation leading to memory corruption, an application crash or other unexpected behavior.
Recommendation
Use fixed buffer size when reading variable length messages
Check out this:
gravitational#7
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels