﻿id	summary	reporter	owner	description	type	status	priority	milestone	component	version	resolution	keywords	cc
4787	Buffer Overflow security vulnerability in ParModelica	sajeeb.lohani@…	Mahder Alemseged Gebremedhin	"While looking through the code within the OMCompiler, a buffer overflow vulnerability was identified. This implies a user can change the execution flow of the program by overflowing the options variable using the environment variable ""OPENMODELICAHOME"". 

The link below shows where the options variable (of size 100 chars), has the environment variable ""OPENMODELICAHOME"" concatenated to it:
https://github.com/OpenModelica/OMCompiler/blob/372119f675c2e26d1aef42f3e7aa84b7979bf3cf/SimulationRuntime/ParModelica/explicit/openclrt/ocl_offcomp.c#L92

If we fill the environment variable with values of size > 300, it will overflow the intended size of the variable and cause a crash in the program. This can then be manipulated to change the execution flow of the program. "	defect	closed	high		ParModelica		fixed		
