Skip to content

Potential buffer overflow in sinsp_plugin::get_metrics

Low
LucaGuerra published GHSA-6fm5-j96m-mgr8 May 29, 2024

Package

falcosecurity/libs

Affected versions

0.17.0

Patched versions

0.17.1

Description

Impact

In Libs 0.17.0 the function sinsp_plugin::get_metrics contains a buffer overflow while concatenating the plugin name with the metric name. Both the metric name and plugin name are not directly controllable by the user or other lesser privileged programs that run on the same machine as Falco but depend on the plugin and its implementation, so in order to exploit this vulnerability there would need to be a plugin that exposes a metric name that is too long or somehow controllable by untrusted input.

Patches

The issue has been corrected in Falco libs 0.17.1 .
This patch addresses the issue: #1880

Workarounds

None

Severity

Low

CVE ID

No known CVE

Weaknesses

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow. Learn more on MITRE.

Credits