I triggered a stack-buffer-overflow bug reported by AddressSanitizer when fuzzing cantcoap. The bug was identified in the CoapPDU::getOptionDelta function at cantcoap.cpp, which occurs when processing CoAP options. This buffer overflow happens when accessing the option array without performing proper boundary checks.
I triggered a stack-buffer-overflow bug reported by AddressSanitizer when fuzzing cantcoap. The bug was identified in the CoapPDU::getOptionDelta function at cantcoap.cpp, which occurs when processing CoAP options. This buffer overflow happens when accessing the option array without performing proper boundary checks.
Affected Code:
Asan Report: