This test case reads the taint source. If the length of the taint source is 63 bytes or less, it allocates a buffer to copy the taint source into. It then copies the taint source into the buffer, regardless of whether it actually allocated any memory or not. If it did not allocate memory, the buffer pointer is still NULL, and this causes a NULL pointer dereference.
- Base program: Subversion
- Source Taint: SHARED_MEMORY
- Data Type: TYPEDEF
- Data Flow: ADDRESS_AS_VARIABLE
- Control Flow: SET_JUMP_LONG_JUMP
Have any comments on this test case? Please, send us an email.