Skip to content

Commit 7f963a3

Browse files
authored
Update README.md
1 parent 4e28036 commit 7f963a3

File tree

1 file changed

+11
-0
lines changed

1 file changed

+11
-0
lines changed

README.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,17 @@ are using HTTP instead of HTTPS to resolve dependencies.
2424

2525
**Pull Requests Generated: 1,596**
2626

27+
28+
## Project 1.5: Prevent `rhostname` array overflow
29+
30+
GitHub Security Lab's [pwntester](https://github.com/pwntester) leveraged this project to generate pull requests to fix an array overflow. This is a variant of [CVE-2020-8597](https://nvd.nist.gov/vuln/detail/CVE-2020-8597).
31+
32+
You can read in more detail about this vulnerability in [CERT Advisory VU#782301](https://kb.cert.org/vuls/id/782301/).
33+
34+
The vulnerability occurs because, given that `vallen` was checked to be less than len, it can never be the case that `vallen >= len + sizeof(rhostname)`. Therefore, `rhostname` never gets trimmed and the `rhostname` array may overflow.
35+
36+
**Pull Requests Generated: [1,885](https://github.com/search?o=desc&q=author%3Aghsecuritylab+&s=comments&type=Issues)**
37+
2738
## Project 2: CVE-2019-16303 - JHipster Vulnerability Fix - Use CSPRNG in RandomUtil
2839

2940
In 2019, I discovered a vulnerability in the [JHipster](https://www.jhipster.tech/) code generator where it was

0 commit comments

Comments
 (0)