National Institute of Standards and Technology
Package illustrating a test case

Test case 149328

Description

This test case reads the taint source. If it contains a non-alphanumeric value, the source taint buffer is set to NULL. Subsequently, strcpy is called with the source taint buffer as this source. This causes a null pointer dereference.
Metadata
- Base program: OpenSSL
- Source Taint: SOCKET
- Data Type: VOID_POINTER
- Data Flow: ADDRESS_AS_FUNCTION_RETURN_VALUE
- Control Flow: SET_JUMP_LONG_JUMP

Flaws

Test Suites

Documentation

Have any comments on this test case? Please, send us an email.