SourceCodester Computer Store System 10, Stack-Based Buffer Overflow, CVE-2025-5297 (Critical)

Listen to this Post

How the CVE Works

CVE-2025-5297 is a critical stack-based buffer overflow vulnerability in SourceCodester Computer Store System 1.0, specifically in the `Add` function of main.c. The flaw occurs due to improper bounds checking when processing user-supplied input in the laptopcompany, RAM, and `Processor` arguments. An attacker can exploit this by providing excessively long input, overwriting the stack’s return address, and executing arbitrary code with the privileges of the application. Since the attack requires local access, exploitation may lead to privilege escalation or system compromise.

DailyCVE Form

Platform: SourceCodester
Version: 1.0
Vulnerability: Buffer Overflow
Severity: Critical
Date: 06/10/2025

Prediction: Patch by 07/15/2025

What Undercode Say:

Analytics:

  • Exploitability Index: High (Local)
  • Attack Vector: Local (AV:L)
  • CVSS Score: 4.8 (Medium)
  • Affected Component: `main.c`

Exploit Commands:

Crash PoC (Python)
import subprocess
payload = "A" 1024
subprocess.call(["./compstore", "--laptopcompany", payload, "--RAM", payload, "--Processor", payload])

Mitigation Steps:

1. Input Validation:

if (strlen(laptopcompany) > 64 || strlen(RAM) > 16 || strlen(Processor) > 32) {
exit(1);
}

2. Compiler Protections:

gcc -fstack-protector-strong -D_FORTIFY_SOURCE=2 -O2 main.c -o compstore

3. Workaround: Restrict local user access until patched.

Detection (Linux):

Check vulnerable processes
ps aux | grep compstore

Log Analysis:

grep -i "segmentation fault" /var/log/syslog

Patch Verification:

strings compstore | grep "stack_chk_fail"

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top