Find Jobs
Hire Freelancers

buffer overflow vulnerability in the libmodbus library

$10-30 USD

In Progress
Posted over 5 years ago

$10-30 USD

Paid on delivery
to modify python file to exploit device that suffers from the buffer overflow vulnerability in the libmodbus library. The vulnerability can be found in the modbus reply function and is exploited by the remote write/read requests. In this function, rsp is a buffer which was defined in the stack. This buffer is used when the server tries to read/write from/to the registers (see the modbus reply function in modbus.c file). Since the number of requested registers is not checked in this function, rsp can be overwritten. This is exactly the main vulnerability of the modbus reply function.
Project ID: 18181423

About the project

1 proposal
Remote project
Active 5 yrs ago

Looking to make some money?

Benefits of bidding on Freelancer

Set your budget and timeframe
Get paid for your work
Outline your proposal
It's free to sign up and bid on jobs
1 freelancer is bidding on average $50 USD for this job
User Avatar
Hi Nice to meet you. I'm python expert and my last project on freelancer.com is also python scraping task. My past works: Youtube comment scrapping Real estate property list to csv Job-site content to csv And scrap posts from facebook, twitter, instagram using scrapy. I can help you related with python. Let me know if you are interested in me. Regards.
$50 USD in 1 day
4.9 (41 reviews)
5.7
5.7

About the client

Flag of SAUDI ARABIA
Saudi Arabia, Saudi Arabia
4.8
3
Payment method verified
Member since Feb 10, 2017

Client Verification

Thanks! We’ve emailed you a link to claim your free credit.
Something went wrong while sending your email. Please try again.
Registered Users Total Jobs Posted
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Loading preview
Permission granted for Geolocation.
Your login session has expired and you have been logged out. Please log in again.