Description
A flaw has been found in Squirrel up to 3.2. Impacted is the function validate_format in the library sqstdlib/sqstdstring.cpp. Executing a manipulation can lead to stack-based buffer overflow. The attack can only be executed locally. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Problem types
Timeline
| 2026-05-10: | Advisory disclosed |
| 2026-05-10: | VulDB entry created |
| 2026-05-10: | VulDB entry last update |
Credits
biniam (VulDB User)
VulDB CNA Team
References
vuldb.com/vuln/362555 (VDB-362555 | Squirrel sqstdstring.cpp validate_format stack-based overflow)
vuldb.com/vuln/362555/cti (VDB-362555 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/submit/809873 (Submit #809873 | albertodemichelis squirrel 3.2 Stack-based Buffer Overflow)
github.com/albertodemichelis/squirrel/issues/325
github.com/.../tree/main/squirrel-validate_format-memcpy-oob