The binary for the IOS platform has been compiled without the Stack Smashing Protector (SSP) and Automatic Reference Counting (ARC) flags which provide protection against Stack Overflow attacks and memory corruption.
Overwrite registers in memory or cause a denial of service through buffer overflow attacks.
Compile binaries with ARC and fstack-protector-all flags.
Internal attacker with access to the IPA.
⌚ 450 minutes.
Default score using CVSS 3.1. It may change depending on the context of the src.
Default score using CVSS 4.0. It may change depending on the context of the src.
The application includes ARC and fstack-protector-all flags configured for binary file compilation
sample_app = executable('sample_app',
'app/main.c',
dependencies: libc_dep,
# Added flag below
c_args: '-fstack-protector-all',
c_args: '-f-objc-arc',
link_args: [
linker_script_flags,
map_file.format(meson.current_build_dir()+'/sample_app'),
],
link_depends: linker_script_deps,
native: false
)
The application has insecure configuration for binary file compilation
sample_app = executable('sample_app',
'app/main.c',
dependencies: libc_dep,
# Added flag below
c_args: '-fstack-protector-none',
c_args: '-fno-objc-arc',
link_args: [
linker_script_flags,
map_file.format(meson.current_build_dir()+'/sample_app'),
],
link_depends: linker_script_deps,
native: false
)