Unspecified

UNKNOWN No Patch (2837 days)

Threat Intelligence

Low Risk
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

The CWE-400 vulnerability is a buffer overflow in the scanf function of the C standard library. This allows an attacker to execute arbitrary code on a system by crafting a malicious input string that gets passed to scanf.

Am I affected?

Not specified in advisory.

Affected Products

Not specified / C standard library

How to fix

To fix this issue, you can use a safer alternative to scanf, such as fgets or sscanf with bounds checking. For example:

char buffer[1024];
printf("Enter your name: ");
fgets(buffer, sizeof(buffer), stdin);

Alternatively, you can use the secure version of scanf, which is not vulnerable to this issue.