Description
This test case reads the taint source. If it contains a non-alphanumeric value, the source taint buffer is set to NULL. Subsequently, strcpy is called with the source taint buffer as this source. This causes a null pointer dereference.
Metadata
- Base program: OpenSSL
- Source Taint: SOCKET
- Data Type: VOID_POINTER
- Data Flow: ADDRESS_AS_FUNCTION_RETURN_VALUE
- Control Flow: SET_JUMP_LONG_JUMP
Flaws
Test Suites
Documentation
Have any comments on this test case? Please, send us an email.