Back to the previous page
Test Case ID | ![]() |
Bad / Good / Mixed | Bad![]() |
Author | IARPA STONESOUP Test and Evaluation team |
Associations | Test suite: 102 Application: 18 |
Added by | Charles Oliveira |
Language | C |
Type of test case | Source Code |
Input string | |
Expected Output | |
Instructions | See src/INSTALL file for instructions on how to install. |
Submission date | 2015-10-06 |
Description | This test case implements an unchecked read from a buffer. The buffer is declared as a fixed size member of a struct that is allocated on the heap. Untrusted input is not properly sanitized or restricted before being used to determine the number of characters to read from the buffer. This allows input greater than 63 characters in length to over read the buffer, printing the contents of the memory located after the buffer on the heap. Metadata - Base program: Gimp - Source Taint: SHARED_MEMORY - Data Type: STRUCT - Data Flow: ADDRESS_AS_CONSTANT - Control Flow: SEQUENCE |
File(s) |
|
Flaw |
There are no comments
Have any comments on this test case? Please,
.
- gimpdialogfactory.c
- C-C126C-GIMP-03-ST04-DT05-DF05-CF20-01.xml
- service_mon.sh
- shm_setup.c
- runFifos.py
- C-C126C-GIMP-03-ST04-DT05-DF05-CF20-01.yaml
File Contains:
CWE-126: Buffer Over-read on line(s): 2488, 2489, 2490, 2491, 2492, 2493, 2494
CWE-126: Buffer Over-read on line(s): 2488, 2489, 2490, 2491, 2492, 2493, 2494