National Institute of Standards and Technology
Package illustrating a test case

Test case 1283

Description

Off-by-one overflow in fb_realpath() CAN-2003-0466.
From MIT benchmarks (models/wu-ftpd/f2)
An off-by-one overflow inside the fb_realpath() function
that expands a condensed pathname into a fully qualified pathname. To
exploit this vulnerability, an attacker would first have to create a
deep directory structure.
Bad file: realpath-bad.c
Bad line number: 475
To fix, replace > with >= on line 464
Taxonomy Classification : 0000300601130100051110
WRITE/READ = write
WHICH BOUND = upper
DATA TYPE = char
MEMORY LOCATION = stack
SCOPE = inter-file/inter-procedural
CONTAINER = no
POINTER = no
INDEX COMPLEXITY = N/A
ADDRESS COMPLEXITY = constant
LENGTH COMPLEXITY = none
ADDRESS ALIAS = yes, one level
INDEX ALIAS = N/A
LOCAL CONTROL FLOW = none
SECONDARY CONTROL FLOW = if
LOOP STRUCTURE = no
LOOP COMPLEXITY = N/A
ASYNCHRONY = no
TAINT = process environment
RUNTIME ENV. DEPENDENCE = yes
MAGNITUDE = 1 byte
CONTINUOUS/DISCRETE = continuous
SIGNEDNESS = no

Flaws

Test Suites

Have any comments on this test case? Please, send us an email.