This test case looks for the substring 'aba' within the taint source. If it finds the substring, it sets a pointer called stonesoup_second_buff to the beginning of the 'aba' substring, and the weakness continues without incident. If it does not find the substring, stonesoup_second_buff retains its initial value of NULL. The weakness subsequently calculates the length of stonesoup_second_buff, using strlen. If stonesoup_second_buff is NULL, this causes a segmentation fault.
- Base program: Subversion
- Source Taint: SOCKET
- Data Type: SIMPLE
- Data Flow: BUFFER_ADDRESS_ARRAY_INDEX
- Control Flow: UNCONDITIONAL_JUMP
Have any comments on this test case? Please, send us an email.