SAMATE Logo NIST Logo The SAMATE Project Department of Homeland Security
Downloads:  Download this Test Case #153807

Back to the previous page... Back to the previous page

Test Case IDCandidate153807
Bad / Good / MixedBadBad test case
AuthorIARPA STONESOUP Test and Evaluation team
Associations
Test suite: 102  
Application: 17  
Added byCharles Oliveira
LanguageC
Type of test caseSource Code
Input string
Expected Output
Instructions
See src/INSTALL file for instructions on how to install.
Submission date2015-10-06
DescriptionThis test case implements an unchecked write into a buffer is contained within a heap-allocated struct. The struct contains a function pointer, a fixed-size buffer, and another function pointer. Untrusted input is not properly sanitized or restricted before being copied into the target buffer, resulting in a buffer overflow. The overflow will destroy one of the function pointers either side of the buffer. The weakness then accesses those pointers, resulting in a crash or execution of attacker-specified code.
Metadata
- Base program: FFmpeg
- Source Taint: ENVIRONMENT_VARIABLE
- Data Type: STRUCT
- Data Flow: BUFFER_ADDRESS_ARRAY_INDEX
- Control Flow: UNCONDITIONAL_JUMP
File(s)
Flaw

There are no comments
Have any comments on this test case? Please, .

File Contains:
CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') on line(s): 2563, 2564, 2565