Back to the previous page
Test Case ID | ![]() |
Bad / Good / Mixed | Bad![]() |
Author | IARPA STONESOUP Test and Evaluation team |
Associations | Test suite: 102 Application: 6 |
Added by | Charles Oliveira |
Language | C |
Type of test case | Source Code |
Input string | |
Expected Output | |
Instructions | See src/INSTALL file for instructions on how to install. |
Submission date | 2015-10-06 |
Description | This test case implements an unchecked write into a buffer is contained within a heap-allocated struct. The struct contains a function pointer, a fixed-size buffer, and another function pointer. Untrusted input is not properly sanitized or restricted before being copied into the target buffer, resulting in a buffer overflow. The overflow will destroy one of the function pointers either side of the buffer. The weakness then accesses those pointers, resulting in a crash or execution of attacker-specified code. Metadata - Base program: Tree - Source Taint: SHARED_MEMORY - Data Type: SIMPLE - Data Flow: BASIC - Control Flow: SEQUENCE |
File(s) |
|
Flaw |
There are no comments
Have any comments on this test case? Please,
.
- color.c
- C-C120C-CTRE-01-ST04-DT02-DF11-CF20-01.yaml
- service_mon.sh
- shm_setup.c
- runFifos.py
- C-C120C-CTRE-01-ST04-DT02-DF11-CF20-01.xml
File Contains:
CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') on line(s): 594, 595, 596
CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') on line(s): 594, 595, 596