Back to the previous page
Test Case ID | ![]() |
Bad / Good / Mixed | Bad![]() |
Author | IARPA STONESOUP Test and Evaluation team |
Associations | Test suite: 102 Application: 18 |
Added by | Charles Oliveira |
Language | C |
Type of test case | Source Code |
Input string | |
Expected Output | |
Instructions | See src/INSTALL file for instructions on how to install. |
Submission date | 2015-10-06 |
Description | This test case allocates a buffer on the stack, with a canary function pointer immediately after it. It checks if the taint source is less than 20 characters, and if so, it sets the canary function pointer to strlen and call realpath on the taint source, putting the result into the stack buffer. If realpath evaluates to 20 or more characters, realpath will overwrite the canary function pointer. The test case then calls the canary function pointer. If this pointer has been over-written, this call will result in a segmentation fault or illegal instruction fault. Metadata - Base program: Gimp - Source Taint: FILE_CONTENTS - Data Type: TYPEDEF - Data Flow: BUFFER_ADDRESS_ARRAY_INDEX - Control Flow: INFINITE_LOOP |
File(s) |
|
Flaw |
There are no comments
Have any comments on this test case? Please,
.
- gimpimage.c
- service_mon.sh
- C-C785A-GIMP-05-ST02-DT06-DF16-CF03-01.yaml
- runFifos.py
- C-C785A-GIMP-05-ST02-DT06-DF16-CF03-01.xml
File Contains:
CWE-785: Use of Path Manipulation Function without Maximum-sized Buffer on line(s): 1342, 1343, 1344, 1345, 1346, 1347, 1348, 1349, 1350
CWE-785: Use of Path Manipulation Function without Maximum-sized Buffer on line(s): 1342, 1343, 1344, 1345, 1346, 1347, 1348, 1349, 1350