National Institute of Standards and Technology
Package illustrating a test case

Test case 154452

Description

This weakness takes a string in the form: ' ' where qsize is the size of the array to sort (used to delay execution) and data is a string that is used for processing. The contents of this string are unimportant. Two threads are created, one of which fails to check for a mutex lock leading to a null pointer dereference. In order to hit the weakness qsize >= 5000000, benign values should use qsize <= 50.
Metadata
- Base program: Apache POI
- Source Taint: SOCKET
- Data Type: VOID_POINTER
- Data Flow: VAR_ARG_LIST
- Control Flow: INFINITE_LOOP

Flaws

Test Suites

Documentation

Have any comments on this test case? Please, send us an email.