CWE-785 - Use of Path Manipulation Function without Maximum-sized Buffer
- Abstraction:Variant
- Structure:Simple
- Status:Incomplete
- Release Date:2009-07-27
- Latest Modification Date:2023-06-29
Weakness Name
Use of Path Manipulation Function without Maximum-sized Buffer
Description
The product invokes a function for normalizing paths or file names, but it provides an output buffer that is smaller than the maximum possible size, such as PATH_MAX.
Passing an inadequately-sized output buffer to a path manipulation function can result in a buffer overflow. Such functions include realpath(), readlink(), PathAppend(), and others.
Common Consequences
Scope: Integrity, Confidentiality, Availability
Impact: Modify Memory, Execute Unauthorized Code or Commands, DoS: Crash, Exit, or Restart
Related Weaknesses
CWE-20Improper Input ValidationHigh
CWE-120Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')High