Back to the previous page
Test Case ID | ![]() |
Bad / Good / Mixed | Bad![]() |
Author | IARPA STONESOUP Test and Evaluation team |
Associations | Test suite: 102 Application: 14 |
Added by | Charles Oliveira |
Language | Java |
Type of test case | Source Code |
Input string | |
Expected Output | |
Instructions | See src/BUILD.txt file for instructions on how to install. |
Submission date | 2015-10-06 |
Description | The product does not properly check inputs that are used for loop conditions, potentially leading to a denial of service because of excessive looping. This test will try to access a user-controlled file, repeatedly trying if the access fails. The user provides an intentionally bad path, forcing the software to wait forever. Metadata - Base program: Apache Lucene - Source Taint: FILE_CONTENTS - Data Type: VOID_POINTER - Data Flow: JAVA_GENERICS - Control Flow: INTERPROCEDURAL_2 |
File(s) |
|
Flaw |
There are no comments
Have any comments on this test case? Please,
.
- IndexFileNames.java
- service_mon.sh
- J-C606A-LUCE-09-ST02-DT03-DF18-CF13-01.yaml
- J-C606A-LUCE-09-ST02-DT03-DF18-CF13-01.xml
- runFifos.py
File Contains:
CWE-606: Unchecked Input for Loop Condition on line(s): 332, 333, 334, 335, 336, 337, 338, 339, 340, 341, 342, 343, 344, 345
CWE-606: Unchecked Input for Loop Condition on line(s): 332, 333, 334, 335, 336, 337, 338, 339, 340, 341, 342, 343, 344, 345