<html><head>
<style>
table { width:100%; text-align: center;}
table, th, td { border: 1px solid black; border-collapse: collapse;}
th, td { padding: 5px; text-align: center;}
table#t01 tr:nth-child(even) { background-color: #eee;}
table#t01 tr:nth-child(odd) { background-color:#fff;}
table#t01 th { background-color: white; color: black; }
</style>
</head><body><h3>Report for 500740d118ae8bd1a6ef6ade030ce3c3.0f3582e74954d0fdf09628f8f9155c8d</h3><table border="0" id="t01" style="width:80%;"><th>Description</th><th>Data</th><tr><td> CMD </td><td style="text-align:left">app -f @@</br></td></tr><tr><td> Found after </td><td style="text-align:left">0:00:00.944135</td></td></tr><tr><td> Description </td><td style="text-align:left">Possible stack corruption</td></td></tr><tr><td> Signal </td><td style="text-align:left">Program terminated with signal SIGSEGV, Segmentation fault.</td></td></tr><tr><td> Classification </td><td style="text-align:left">EXPLOITABLE</td></td></tr><tr><td> Occurence </td><td style="text-align:left">2016-04-16 09:10:45.944135</td></td></tr><tr><td> Files </td><td style="text-align:left">fuzz/out/fuzzer44/crashes/id:000000,sig:11,src:000000,op:havoc,rep:16</br><textarea rows="27" cols="68" style="font-family: monospace; font-size: 14px;">0000000: 7661 6c75 6535 3030 310a 7374 6163 6b32  value5001.stack2
0000010: 3030 0a76 616c 7565 2e0a 7374 6163 6b31  00.value..stack1
0000020: 3131 0a76 616c 7565 0a76 616c 7565 3131  11.value.value11
0000030: 0a76 616c 7565 3134 312e 330a 7661 6c75  .value141.3.valu
0000040: ffff 8000 0a73 7461 636b 7661 310a 7374  .....stackva1.st
0000050: 6163 6b32 3030 0a76 616c 7565 2e0a 7374  ack200.value..st
0000060: 6163 6b32 3030 0a76 616c 7565 2e0a 7374  ack200.value..st
0000070: 6163 6b23 3131 0a76 616c 7565 0a76 616c  ack#11.value.val
0000080: 7565 3131 0a76 616c 7565 3134 3134 310a  ue11.value14141.
0000090: 7661 6c6d 6d6d 6d6d 6d6d 6d6d 6d6d 6d6d  valmmmmmmmmmmmmm
00000a0: 6d6d 6d6d 6d6d 6d6d 6d6d 6d6d 6d6d 7565  mmmmmmmmmmmmmmue
00000b0: 3131 0a76 616c 7565 0a76 616c 7565 1131  11.value.value.1
00000c0: 0a76 616c 7565 3134 3134 310a 7661 6c75  .value14141.valu
00000d0: 6535 3030 0a73 7461 636b 7661 310a 7374  e500.stackva1.st
00000e0: 6163 6b32 3030 0a76 7461 636b 3131 310a  ack200.vtack111.
00000f0: 7661 6c75 650a 7661 6c75 6531 310a 7661  value.value11.va
0000100: 6c75 6552 3431 3431 0a76 616c 7565 3530  lueR4141.value50
0000110: 300a 7370 6163 6b76 6131 0a73 7461 636b  0.spackva1.stack
0000120: 3230 300a 7661 6c75 652e 0a73 7461 636b  200.value..stack
0000130: 3131 310a 7661 6c75 650a 0000 0001 6531  111.value.....e1
0000140: 310a 7661 6c75 6531 3431 2b31 0a76 616c  1.value141+1.val
0000150: 7565 3530 300a 7661 6c75 6531 3441 34ff  ue500.value14A4.
0000160: ff7f ff6c 7565 3530 300a 7374 6163 6b76  ...lue500.stackv
0000170: 6131 0a73 7461 6535 3030 310a 7374 6163  a1.stae5001.stac
0000180: 6b32 3063 6b4e 3030 0a76 616c 7565 3131  k20ckN00.value11
0000190: 0a76 616c 756e 0a76 616c 7565 3131 0a76  .valun.value11.v
00001a0: 616c 7565 3134                           alue14
</textarea></br></td></tr><tr><td> GDB exploitable: </td><td style="text-align:left">Core was generated by `./fuzz/app -f fuzz/out/fuzzer44/crashes/id:000000,sig:11,src:000000,op:havoc,re'.</br>Program terminated with signal SIGSEGV, Segmentation fault.</br>#0  __memcpy_sse2 () at ../sysdeps/x86_64/multiarch/../memcpy.S:72</br>(gdb) Description: Possible stack corruption</br>Short description: PossibleStackCorruption (7/22)</br>Hash: 500740d118ae8bd1a6ef6ade030ce3c3.0f3582e74954d0fdf09628f8f9155c8d</br>Exploitability Classification: EXPLOITABLE</br>Explanation: GDB generated an error while unwinding the stack and/or the stack contained return addresses that were not mapped in the inferior's process address space and/or the stack pointer is pointing to a location outside the default stack region. These conditions likely indicate stack corruption, which is generally considered exploitable.</br>Other tags: DestAv (8/22), AccessViolation (21/22)</br>(gdb)</br></td></tr></table></body></html>