BF Specification of CVE-2018-14557
-0.png)
Erroneous declaration of the 's' object leads to a wrong type (char instead of an array of chars), allowing a pointer reposition over its bounds, which, when used in 'sprintf()' leads to stack buffer overflow. If exploited, this can lead to denial of service.
vendor:product: tenda:ac7_firmware:* | Bug Report | Code with Bug | Code with Fix | NVD Entry |
Class | Definition |
DCL | An object, a function, a type, or a namespace is declared or defined improperly. |
MAD | The pointer to an object is initialized, repositioned, or reassigned to an improper memory address. |
MUS | An object is initialized, read, written, or cleared improperly. |
Operation | Definition |
Declare | Specify the name and type of an object; the name, return type, and parameters of a function; or the name and type parameters of a type. |
Reposition | Change the pointer to another position inside its object. |
Write | Change the data value of an object to another meaningful value. |
Cause/Consequence | Definition |
Code Defect Bug | The operation has a bug, which is the first cause for the chain of weaknesses underlying a software security vulnerability. The bug must be fixed to resolve the vulnerability. |
Erroneous Code | The operation implementation has a bug. |
Type | The set or range of allowed values is wrong or the operations allowed on them are wrong. |
Wrong Type | A data type range or structure is not correct. |
Address Error/Fault | The object address in use is wrong. |
Over Bounds Pointer | Points above the upper boundary of its object. |
Memory Corruption/Disclosure Final Error | An exploitable or undefined system behavior caused by memory addressing, allocation, use, and deallocation bugs. |
Buffer Overflow | Writes above the upper bound of an object -- aka Buffer Over-Write. |
Operation Attribute | Definition |
Mechanism | Shows how the buggy/faulty operation code is performed. |
Simple | Non-polymorphic. |
Sequential | The operation is performed after iterating over the object elements. |
Source Code | Shows where the buggy/faulty operation code is in the program -- in what kind of software. |
Codebase | The operation is in the programmer's code - in the application itself. |
Execution Space | Shows where the buggy/faulty operation code is running or with what privilege level). |
Bare-Metal | The bugged code runs in an environment without privilege control. Usually, the program is the only software running and has total access to the hardware. |
Operand Attribute | Definition |
Name Kind | Shows what the entity with this name is. |
Data Type | A set of allowed values and the operations allowed over them. |
Type Kind | Shows what the data type composition is. |
Primitive | A scalar data type that mimics the hardware units - e.g., int (long, short, signed), float, double, string, Boolean. A primitive data type is only language defined and is not built from other data types. |
Address State | Shows where the address is in the memory layout. |
Stack | The object is a non-static local variable (defined in a function, a passed parameter, or a function return address). |
Size Kind | Shows what the limit for traversal of the object is. |
Actual | The real size of an object. |