This test case reads the taint source, and converts it to an integer, then an unsigned int. It uses a wrapped malloc to allocate a buffer of the size specified by the taint source. If the size is greater than 512, the wrapped malloc returns NULL. The program attempts to use the buffer, and if the buffer is NULL, this causes a segmentation fault.
- Base program: Wireshark
- Source Taint: FILE_CONTENTS
- Data Type: VOID_POINTER
- Data Flow: BUFFER_ADDRESS_ARRAY_INDEX
- Control Flow: UNCONDITIONAL_JUMP
Have any comments on this test case? Please, send us an email.