National Institute of Standards and Technology
Package illustrating a test case

Test case 153571

Description

This test case implements an incorrectly checked write into a buffer that is contained within a stack allocated struct. The buffer is declared as a struct member with a fixed size. Untrusted input is not properly sanitized or restricted before being copied into the buffer, from the last character to the first. This allows input greater than 63 characters in length to underflow the buffer, overwriting the function pointer declared before the buffer in the struct.
Metadata
- Base program: OpenSSL
- Source Taint: SOCKET
- Data Type: HEAP_POINTER
- Data Flow: ADDRESS_AS_FUNCTION_RETURN_VALUE
- Control Flow: INDIRECTLY_RECURSIVE

Flaws

Test Suites

Documentation

Have any comments on this test case? Please, send us an email.