Displaying test cases 45226 - 45250 of 45437 in total
-
This test case checks if the taint source is less than 20 characters, and if so, allocates a buffer on the heap with 20 characters. It sets the buffer to all 0's, then calls realpath on the taint source, with the destination being the 20-character heap buffer. If realpath evaluates to more than 2...
-
This test case creates a buffer on the stack of 1024 bytes and a struct on the stack containing a 64-byte buffer and a pointer to the beginning of that buffer. It copies the taint source into the 1024-char buffer. It checks if the length of the taint source is less than the length of the 64-byte ...
-
Metadata - Base program: Tree - Source Taint: SOCKET - Data Type: SIMPLE - Data Flow: BASIC - Control Flow: SEQUENCE
-
Metadata - Base program: PostgreSQL - Source Taint: SOCKET - Data Type: VOID_POINTER - Data Flow: BUFFER_ADDRESS_POINTER - Control Flow: UNCONDITIONAL_JUMP
-
Metadata - Base program: Subversion - Source Taint: FILE_CONTENTS - Data Type: STRUCT - Data Flow: ADDRESS_AS_FUNCTION_RETURN_VALUE - Control Flow: SEQUENCE
-
Metadata - Base program: Gimp - Source Taint: FILE_CONTENTS - Data Type: HEAP_POINTER - Data Flow: ADDRESS_AS_CONSTANT - Control Flow: RECURSIVE
-
Metadata - Base program: Gimp - Source Taint: SOCKET - Data Type: ARRAY - Data Flow: ADDRESS_AS_NONLINEAR_EXPRESSION - Control Flow: INDIRECTLY_RECURSIVE
-
Metadata - Base program: Wireshark - Source Taint: SOCKET - Data Type: UNION - Data Flow: ADDRESS_AS_FUNCTION_RETURN_VALUE - Control Flow: CALLBACK
-
Metadata - Base program: PostgreSQL - Source Taint: SHARED_MEMORY - Data Type: VOID_POINTER - Data Flow: ADDRESS_AS_FUNCTION_RETURN_VALUE - Control Flow: RECURSIVE
-
Metadata - Base program: Gimp - Source Taint: FILE_CONTENTS - Data Type: VOID_POINTER - Data Flow: VAR_ARG_LIST - Control Flow: POINTER_TO_FUNCTION
-
This test case takes an unsigned long value and uses it in an initialization function for a struct. Within the initialization function, the long gets converted to an unsigned short when a struct uses the unsigned long as an initialization value for an unsigned short member. If the unsigned long n...
-
This test case takes a filename. It determines the size of the file, and attempts to check whether the size of the file is smaller than 128 characters. The arithmetic used in the if-check may cause an integer underflow, which will result in the if-check succeeding when it should fail. If the if-c...
-
This test case converts a user string to a short, and then converts that short to an unsigned int. If the short is negative, this will result in unexpected sign extension. The unsigned int value is used to determine how much data to read from a file, resulting in massive buffer overwrite if the f...
-
Metadata - Base program: PostgreSQL - Source Taint: SHARED_MEMORY - Data Type: SIMPLE - Data Flow: ADDRESS_ALIAS_1 - Control Flow: RECURSIVE
-
This weakness reads a number to be used as a loop counter. The loop counter is initially read as an unsigned long, then converted to an int. If the number read in is larger than MAX_UINT, it is silently converted to a negative number. This breaks the loop counter logic, resulting in an infinite l...
-
This test case takes a filename. It determines the size of the file, and attempts to check whether the size of the file is smaller than 128 characters. The arithmetic used in the if-check may cause an integer underflow, which will result in the if-check succeeding when it should fail. If the if-c...
-
This test case takes a filename. It determines the size of the file, and attempts to check whether the size of the file is smaller than 128 characters. The arithmetic used in the if-check may cause an integer underflow, which will result in the if-check succeeding when it should fail. If the if-c...
-
This weakness reads a number to be used as a loop counter. The loop counter is initially read as an unsigned long, then converted to an int. If the number read in is larger than MAX_UINT, it is silently converted to a negative number. This breaks the loop counter logic, resulting in an infinite l...
-
This test case allocates a stack buffer of size 16. It takes the user input and performs a check to see if it is possible to copy the user input into a 16-byte buffer. If the user input is larger than 15 bytes, then the check method returns a -1. This value is converted to an unsigned type (size_...
-
This test case implements a singleton struct without synchronization that can lead to two threads receiving separate instances of the singleton struct resulting in a deadlocked state. It takes a control integer, the names of two control files, and another integer as input. The control integer and...
-
This test case implements two thread that both lock two shared mutex locks such that if the timing works out, they will cause each other to deadlock. The test case takes a control integer, the names of two control files, and an input string. The control integer and the two control files are used ...
-
This test case implements a singleton struct without synchronization that can lead to two threads receiving separate instances of the singleton struct resulting in a deadlocked state. It takes a control integer, the names of two control files, and another integer as input. The control integer and...
-
This test case implements two threads that lock a counting semaphore multiple times, causing a deadlock if the lock is locked more times that it is unlocked. The test case takes a string as input and if the input string contains spaces spawns two threads, the first of which locks a semaphore twic...
-
This test case looks for the substring 'aba' within the taint source. If it finds the substring, it sets a pointer called stonesoup_second_buff to the beginning of the 'aba' substring, and the weakness continues without incident. If it does not find the substring, stonesoup_second_buff retains it...
-
This test case reads the taint source. If it contains a non-alphanumeric value, the source taint buffer is set to NULL. Subsequently, strcpy is called with the source taint buffer as this source. This causes a null pointer dereference. Metadata - Base program: OpenSSL - Source Taint: SHARED_MEM...