SAMATE Logo NIST Logo The SAMATE Project Department of Homeland Security
Downloads:  Download this Test Case #154548

Back to the previous page... Back to the previous page

Test Case IDCandidate154548
Bad / Good / MixedBadBad test case
AuthorIARPA STONESOUP Test and Evaluation team
Associations
Test suite: 102  
Application: 11  
Added byCharles Oliveira
LanguageJava
Type of test caseSource Code
Input string
Expected Output
Instructions
See src/build.xml and src/maven-build.xml.
Submission date2015-10-06
DescriptionThis weakness takes in an integer and string "int string" where the integer is the size of the array to sort for timing and the string contains the value that is acted upon by the treads, stored in a global static variable. A divide by zero error occurs when the string starts with 'A' and the array size is significantly large. In practice the benign sort values are <50 and exploit are >5000000 to achieve (essentially) guaranteed effects.

Metadata
- Base program: Apache Jena
- Source Taint: FILE_CONTENTS
- Data Type: VOID_POINTER
- Data Flow: ADDRESS_AS_CONSTANT
- Control Flow: BREAK_WITH_LABEL
File(s)
Flaw

There are no comments
Have any comments on this test case? Please, .

File Contains:
CWE-567: Unsynchronized Access to Shared Data in a Multithreaded Context on line(s): 891, 892, 893, 894