<html><head>
<style>
table { width:100%; text-align: center;}
table, th, td { border: 1px solid black; border-collapse: collapse;}
th, td { padding: 5px; text-align: center;}
table#t01 tr:nth-child(even) { background-color: #eee;}
table#t01 tr:nth-child(odd) { background-color:#fff;}
table#t01 th { background-color: white; color: black; }
</style>
</head><body><h3>Report for 500740d118ae8bd1a6ef6ade030ce3c3.cb0cdc455fd880bd8567a6505d0f99f5</h3><table border="0" id="t01" style="width:80%;"><th>Description</th><th>Data</th><tr><td> CMD </td><td style="text-align:left">app -f @@</br></td></tr><tr><td> Found after </td><td style="text-align:left">0:00:38.105561</td></td></tr><tr><td> Description </td><td style="text-align:left">Possible stack corruption</td></td></tr><tr><td> Signal </td><td style="text-align:left">Program terminated with signal SIGSEGV, Segmentation fault.</td></td></tr><tr><td> Classification </td><td style="text-align:left">EXPLOITABLE</td></td></tr><tr><td> Occurence </td><td style="text-align:left">2016-04-16 09:11:23.105561</td></td></tr><tr><td> Files </td><td style="text-align:left">fuzz/out/fuzzer0/crashes/id:000004,sig:11,src:000000,op:havoc,rep:64</br><textarea rows="17" cols="68" style="font-family: monospace; font-size: 14px;">0000000: 7661 1061 6161 6161 6161 6161 614c 6c75  va.aaaaaaaaaaLlu
0000010: 6563 1276 6131 310a 7661 6c75 6531 3431  ec.va11.value141
0000020: 3108 7374 617b 6b32 3030 0a76 616c 7565  1.sta{k200.value
0000030: 2e00 0274 6176 6b31 3131 0a72 616c 7065  ...tavk111.ralpe
0000040: 3173 7461 636b 4830 3630 300a 7661 6c75  1stackH0600.valu
0000050: 652e 0a73 7e61 5d6b 3131 520a 9261 6c75  e..s~a]k11R..alu
0000060: 650a 7661 6c65 3530 300a 7361 636b 7661  e.vale500.sackva
0000070: 6c75 6563 7461 0000 1000 310a 7374 6163  luecta....1.stac
0000080: 6b32 3030 2a76 610a 7661 8475 650a 7661  k200*va.va.ue.va
0000090: 7a75 6575 650a 7661 7a75 6531 310a 7661  zueue.vazue11.va
00000a0: 6c75 6531 3431 3431 3108 7661 6c75 6531  lue141411.value1
00000b0: 3431 3431 0a76 616c 7565 4830 300a 7374  4141.valueH00.st
00000c0: 6163 6b98 6131 0a73 7461 636b bdbd bd32  ack.a1.stack...2
00000d0: 3030 0a76 618c 7565 743e 636b 3230 1f0a  00.va.uet>ck20..
00000e0: 7661 6c75 6573 7461 636b 636b 3131 310a  valuestackck111.
00000f0: 3134 310a 6461 6c75 6576 616c 7565 3134  141.daluevalue14
0000100: 3134 310a 7661 312c 0a76 6120 8000 3134  141.va1,.va ..14
</textarea></br></td></tr><tr><td> GDB exploitable: </td><td style="text-align:left">Core was generated by `./fuzz/app -f fuzz/out/fuzzer0/crashes/id:000004,sig:11,src:000000,op:havoc,rep'.</br>Program terminated with signal SIGSEGV, Segmentation fault.</br>#0  __memcpy_sse2 () at ../sysdeps/x86_64/multiarch/../memcpy.S:124</br>(gdb) Description: Possible stack corruption</br>Short description: PossibleStackCorruption (7/22)</br>Hash: 500740d118ae8bd1a6ef6ade030ce3c3.cb0cdc455fd880bd8567a6505d0f99f5</br>Exploitability Classification: EXPLOITABLE</br>Explanation: GDB generated an error while unwinding the stack and/or the stack contained return addresses that were not mapped in the inferior's process address space and/or the stack pointer is pointing to a location outside the default stack region. These conditions likely indicate stack corruption, which is generally considered exploitable.</br>Other tags: DestAv (8/22), AccessViolation (21/22)</br>(gdb)</br></td></tr></table></body></html>