
Cloud Vulnerability DB
A community-led vulnerabilities database
PicoC Version 3.2.2 was discovered to contain a heap buffer overflow vulnerability in the ExpressionAssign function in expression.c when called from ExpressionParseFunctionCall. The vulnerability was discovered and reported on October 25, 2022 (GitHub Issue, GitLab Issue).
The vulnerability is a heap-based buffer overflow that occurs in the ExpressionAssign function within expression.c. The issue manifests when reading 8 bytes at an address located 0 bytes to the right of a 31-byte allocated region. The overflow is triggered when the function is called from ExpressionParseMacroCall, which is in turn called from ExpressionParseFunctionCall (GitHub Issue).
A successful exploitation of this vulnerability could lead to memory corruption, potentially allowing an attacker to execute arbitrary code or cause a denial of service condition. The heap buffer overflow can corrupt adjacent memory regions, potentially compromising the integrity of the application (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."