https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12093

            Bug ID: 12093
           Summary: Insecure use of sprintf functions
           Product: Wireshark
           Version: 2.0.1
          Hardware: All
                OS: All
            Status: UNCONFIRMED
          Severity: Normal
          Priority: Low
         Component: Qt UI
          Assignee: bugzilla-ad...@wireshark.org
          Reporter: wireshark_hammerh...@grr.la

Build Information:
N/A
--
Static code analysis of wireshark 2.0.1 reveals several buffer overflow bugs in
the QT user interface's capture_file_dialog.cpp source.

wireshark-2.0.1/ui/qt/capture_file_dialog.cpp:835: [4] (format) sprintf:
Potential format string problem (CWE-134). Make format string constant.

        preview_first_.setText(QString().sprintf(

wireshark-2.0.1/ui/qt/capture_file_dialog.cpp:853: [4] (format) sprintf:
Potential format string problem (CWE-134). Make format string constant.

        preview_elapsed_.setText(QString().sprintf("%02u days %02u:%02u:%02u",

wireshark-2.0.1/ui/qt/capture_file_dialog.cpp:856: [4] (format) sprintf:
Potential format string problem (CWE-134). Make format string constant.

-- 
You are receiving this mail because:
You are watching all bug changes.
___________________________________________________________________________
Sent via:    Wireshark-bugs mailing list <wireshark-bugs@wireshark.org>
Archives:    https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://wireshark.org/mailman/options/wireshark-bugs
             mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

Reply via email to