<html><head>
<style>
table { width:100%; text-align: center;}
table, th, td { border: 1px solid black; border-collapse: collapse;}
th, td { padding: 5px; text-align: center;}
table#t01 tr:nth-child(even) { background-color: #eee;}
table#t01 tr:nth-child(odd) { background-color:#fff;}
table#t01 th { background-color: white; color: black; }
</style>
</head><body><h3>Report for 500740d118ae8bd1a6ef6ade030ce3c3.ba6f11a5ab622355cab20a2357e169ac</h3><table border="0" id="t01" style="width:80%;"><th>Description</th><th>Data</th><tr><td> CMD </td><td style="text-align:left">app -f @@</br></td></tr><tr><td> Found after </td><td style="text-align:left">0:01:56.737206</td></td></tr><tr><td> Description </td><td style="text-align:left">Possible stack corruption</td></td></tr><tr><td> Signal </td><td style="text-align:left">Program terminated with signal SIGSEGV, Segmentation fault.</td></td></tr><tr><td> Classification </td><td style="text-align:left">EXPLOITABLE</td></td></tr><tr><td> Occurence </td><td style="text-align:left">2016-04-12 12:11:07.737206</td></td></tr><tr><td> Files </td><td style="text-align:left">fuzz/out/fuzzer0/crashes/id:000003,sig:11,src:000016,op:havoc,rep:32</br><textarea rows="5" cols="68" style="font-family: monospace; font-size: 14px;">0000000: c2c2 6278 5f5f 5f5f 5fc2 c2c2 c2c2 c2c2  ..bx_____.......
0000010: c262 0e0a 0000 0a41 7100 0a62 0a0a 7374  .b.....Aq..b..st
0000020: 6163 6bc2 c2c2 c245 7374 6163 6bc2 620e  ack....Estack.b.
0000030: 0a00 000a 4171 0000 0001 0073 7461 636b  ....Aq.....stack
0000040: 0000 0a0a 10f6 ffff ffff 0a80            ............
</textarea></br></td></tr><tr><td> GDB exploitable: </td><td style="text-align:left">Core was generated by `./fuzz/app -f fuzz/out/fuzzer0/crashes/id:000003,sig:11,src:000016,op:havoc,rep'.</br>Program terminated with signal SIGSEGV, Segmentation fault.</br>#0  __memcpy_sse2 () at ../sysdeps/x86_64/multiarch/../memcpy.S:72</br>(gdb) Description: Possible stack corruption</br>Short description: PossibleStackCorruption (7/22)</br>Hash: 500740d118ae8bd1a6ef6ade030ce3c3.ba6f11a5ab622355cab20a2357e169ac</br>Exploitability Classification: EXPLOITABLE</br>Explanation: GDB generated an error while unwinding the stack and/or the stack contained return addresses that were not mapped in the inferior's process address space and/or the stack pointer is pointing to a location outside the default stack region. These conditions likely indicate stack corruption, which is generally considered exploitable.</br>Other tags: DestAv (8/22), AccessViolation (21/22)</br>(gdb)</br></td></tr></table></body></html>