Back to the previous page
| Test Case ID | 153313 |
| Bad / Good / Mixed | Bad |
| Author | IARPA STONESOUP Test and Evaluation team |
| Associations | Test suite: 102 Application: 3 |
| Added by | Charles Oliveira |
| Language | C |
| Type of test case | Source Code |
| Input string | |
| Expected Output | |
| Instructions | See src/INSTALL file for instructions on how to install. |
| Submission date | 2015-10-06 |
| Description | This test case implements an incorrectly checked write into a heap allocated buffer. The buffer is malloc()'d with a fixed size and pointed to by a local variable. Untrusted input is not properly sanitized or restricted before being copied into the buffer, from the last character to the first. This allows input greater than 63 characters in length to underflow the buffer, overwriting arbitrary memory, and potentially modifying other heap allocated variables depending on the layout of the heap. Metadata - Base program: GNU Grep - Source Taint: ENVIRONMENT_VARIABLE - Data Type: SIMPLE - Data Flow: BASIC - Control Flow: SEQUENCE |
| File(s) |
|
| Flaw |
There are no comments
Have any comments on this test case? Please,
.
- dfa.c
- runFifos.py
- service_mon.sh
- C-C124B-GREP-01-ST01-DT02-DF11-CF20-01.xml
- C-C124B-GREP-01-ST01-DT02-DF11-CF20-01.yaml
File Contains:
CWE-124: Buffer Underwrite ('Buffer Underflow') on line(s): 4067, 4068, 4069, 4070, 4071, 4072, 4073, 4074, 4075, 4076
CWE-124: Buffer Underwrite ('Buffer Underflow') on line(s): 4067, 4068, 4069, 4070, 4071, 4072, 4073, 4074, 4075, 4076

