Back to the previous page
| Test Case ID | 153826 |
| Bad / Good / Mixed | Bad |
| Author | IARPA STONESOUP Test and Evaluation team |
| Associations | Test suite: 102 Application: 18 |
| Added by | Charles Oliveira |
| Language | C |
| Type of test case | Source Code |
| Input string | |
| Expected Output | |
| Instructions | See src/INSTALL file for instructions on how to install. |
| Submission date | 2015-10-06 |
| Description | This test case creates a struct on the stack that contains a function pointer and a char*. It examines the length of the taint source. If the length is not equal to 10, it sets the function pointer and char* within the struct to benign values. If the length is equal to 10, it does not set the function pointer or char* inside the struct, leaving them uninitialized. Subsequently, the test case calls the function pointer from the struct, using the char* from the struct as an argument. If these values have not been initialized, this will result in a segmentation fault or illegal instruction fault. Metadata - Base program: Gimp - Source Taint: FILE_CONTENTS - Data Type: STRUCT - Data Flow: BUFFER_ADDRESS_POINTER - Control Flow: INFINITE_LOOP |
| File(s) |
|
| Flaw |
There are no comments
Have any comments on this test case? Please,
.
- gimpactiongroup.c
- runFifos.py
- service_mon.sh
- C-C824B-GIMP-08-ST02-DT05-DF17-CF03-01.yaml
- C-C824B-GIMP-08-ST02-DT05-DF17-CF03-01.xml
File Contains:
CWE-824: Access of Uninitialized Pointer on line(s): 506, 507
CWE-824: Access of Uninitialized Pointer on line(s): 506, 507

