National Institute of Standards and Technology
Package illustrating a test case

Test case 153089

Description

This test case implements an unchecked write into a buffer is contained within a heap-allocated struct. The struct contains a function pointer, a fixed-size buffer, and another function pointer. Untrusted input is not properly sanitized or restricted before being copied into the target buffer, resulting in a buffer overflow. The overflow will destroy one of the function pointers either side of the buffer. The weakness then accesses those pointers, resulting in a crash or execution of attacker-specified code.
Metadata
- Base program: Subversion
- Source Taint: ENVIRONMENT_VARIABLE
- Data Type: HEAP_POINTER
- Data Flow: ADDRESS_AS_NONLINEAR_EXPRESSION
- Control Flow: SET_JUMP_LONG_JUMP

Flaws

Test Suites

Documentation

Have any comments on this test case? Please, send us an email.