Back to the previous page
| Test Case ID | 153343 |
| Bad / Good / Mixed | Bad |
| Author | IARPA STONESOUP Test and Evaluation team |
| Associations | Test suite: 102 Application: 3 |
| Added by | Charles Oliveira |
| Language | C |
| Type of test case | Source Code |
| Input string | |
| Expected Output | |
| Instructions | See src/INSTALL file for instructions on how to install. |
| Submission date | 2015-10-06 |
| Description | This test case creates a struct on the stack that contains a function pointer and a char*. It examines the length of the taint source. If the length is not equal to 10, it sets the function pointer and char* within the struct to benign values. If the length is equal to 10, it does not set the function pointer or char* inside the struct, leaving them uninitialized. Subsequently, the test case calls the function pointer from the struct, using the char* from the struct as an argument. If these values have not been initialized, this will result in a segmentation fault or illegal instruction fault. Metadata - Base program: GNU Grep - Source Taint: FILE_CONTENTS - Data Type: SIMPLE - Data Flow: BASIC - Control Flow: SEQUENCE |
| File(s) |
|
| Flaw |
There are no comments
Have any comments on this test case? Please,
.
- dfa.c
- runFifos.py
- service_mon.sh
- C-C824B-GREP-01-ST02-DT02-DF11-CF20-01.yaml
- C-C824B-GREP-01-ST02-DT02-DF11-CF20-01.xml
File Contains:
CWE-824: Access of Uninitialized Pointer on line(s): 4111, 4112
CWE-824: Access of Uninitialized Pointer on line(s): 4111, 4112

