National Institute of Standards and Technology
Package illustrating a test case

Test case 149847


This test case reads the taint source, and converts it to an integer, then an unsigned int. It uses a wrapped malloc to allocate a buffer of the size specified by the taint source. If the size is greater than 512, the wrapped malloc returns NULL. The program attempts to use the buffer, and if the buffer is NULL, this causes a segmentation fault.
- Base program: Wireshark
- Source Taint: SHARED_MEMORY
- Data Type: TYPEDEF
- Data Flow: BASIC
- Control Flow: CALLBACK


Test Suites


Have any comments on this test case? Please, send us an email.