Back to the previous page
| Test Case ID | 153651 |
| Bad / Good / Mixed | Bad |
| Author | IARPA STONESOUP Test and Evaluation team |
| Associations | Test suite: 102 Application: 8 |
| Added by | Charles Oliveira |
| Language | C |
| Type of test case | Source Code |
| Input string | |
| Expected Output | |
| Instructions | See src/INSTALL file for instructions on how to install. |
| Submission date | 2015-10-06 |
| Description | This test case implements an unchecked write into a heap allocated buffer. The buffer is malloc'ed with a fixed size. Untrusted input is not properly sanitized or restricted before being copied into the target buffer, resulting in a buffer overflow. The overflow potentially modifies other variables in the heap, including special values used by the memory manager to keep track of which memory is allocated and which has been freed. Depending upon the layout of the heap, the overflow will eventually overwrite one of these special values, resulting in a crash from the memory manager. Metadata - Base program: Wireshark - Source Taint: SOCKET - Data Type: UNION - Data Flow: ADDRESS_AS_LINEAR_EXPRESSION - Control Flow: MACROS |
| File(s) |
|
| Flaw |
There are no comments
Have any comments on this test case? Please,
.
- conversation.c
- runFifos.py
- service_mon.sh
- C-C120B-WIRE-07-ST03-DT07-DF13-CF22-01.xml
- C-C120B-WIRE-07-ST03-DT07-DF13-CF22-01.yaml
File Contains:
CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') on line(s): 1250, 1251, 1252
CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') on line(s): 1250, 1251, 1252

