
Cloud Vulnerability DB
A community-led vulnerabilities database
A heap buffer overflow vulnerability was discovered in PicoC Version 3.2.2 in the StdioBasePrintf function within cstdlib/string.c when called from ExpressionParseFunctionCall. The vulnerability was reported on October 25, 2022 (GitHub Issue, GitLab Issue).
The vulnerability occurs when the StdioBasePrintf function attempts to read beyond the allocated buffer boundary, specifically reading 1 byte past a 27-byte allocated region at address 0x60300000563b. This happens during function call parsing in the expression evaluation system. The issue was discovered through fuzz testing with Address Sanitizer (ASAN) which detected the buffer overflow condition (GitHub Issue).
When exploited, this heap buffer overflow vulnerability could lead to memory corruption, potentially causing program crashes or enabling arbitrary code execution. The overflow occurs in a core string handling function, which means it could be triggered through normal program operation when processing certain inputs (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."