National Institute of Standards and Technology
Package illustrating a test case

Test case 153825

Description

This test case implements an incorrectly checked write into a heap allocated buffer. The buffer is malloc()'d with a fixed size and pointed to by a local variable. Untrusted input is not properly sanitized or restricted before being copied into the buffer, from the last character to the first. This allows input greater than 63 characters in length to underflow the buffer, overwriting arbitrary memory, and potentially modifying other heap allocated variables depending on the layout of the heap.
Metadata
- Base program: Wireshark
- Source Taint: SHARED_MEMORY
- Data Type: VOID_POINTER
- Data Flow: BUFFER_ADDRESS_POINTER
- Control Flow: MACROS

Flaws

Test Suites

Documentation

Have any comments on this test case? Please, send us an email.