Back to the previous page
Test Case ID | ![]() |
Bad / Good / Mixed | Good![]() |
Author | MIT |
Associations | Bad pair: 2073 Replaced by: 2073 Test suite: 89 |
Added by | MIT |
Language | C |
Type of test case | Source Code |
Input string | |
Expected Output | |
Instructions | |
Submission date | 2005-12-27 |
Description | Buffer Overflow. This code has been donated by MIT. This test case has the following characteristics : write/read = Write, Which bound = Upper, Data type = character, Memory location = stack, Scope = same, Container = no, Pointer = no, Index complexity = function return value, Address complexity = constant, Length complexity = N/A, Address alias = no, Index alias = none, Local control flow = if, Secondary control flow = none, Loop structure = N/A, Loop complexity = no, Asynchrony = argc/argv, Taint = yes, Runtime env. dependence = none, Magnitude = discrete, Continuous/discrete = discrete, Signedness = no. |
File(s) |
|
Flaw |
There is 1 comment
Have any comments on this test case? Please,
.
File Contains:
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer on line(s): 61
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer on line(s): 61