<html><head>
<style>
table { width:100%; text-align: center;}
table, th, td { border: 1px solid black; border-collapse: collapse;}
th, td { padding: 5px; text-align: center;}
table#t01 tr:nth-child(even) { background-color: #eee;}
table#t01 tr:nth-child(odd) { background-color:#fff;}
table#t01 th { background-color: white; color: black; }
</style>
</head><body><h3>Report for 0f20b3e172a4a8925e7c0309a54b3383.0f20b3e172a4a8925e7c0309a54b3383</h3><table border="0" id="t01" style="width:80%;"><th>Description</th><th>Data</th><tr><td> CMD </td><td style="text-align:left">app -f @@</br></td></tr><tr><td> Found after </td><td style="text-align:left">0:02:34.295747</td></td></tr><tr><td> Description </td><td style="text-align:left">Possible stack corruption</td></td></tr><tr><td> Signal </td><td style="text-align:left">Program terminated with signal SIGSEGV, Segmentation fault.</td></td></tr><tr><td> Classification </td><td style="text-align:left">EXPLOITABLE</td></td></tr><tr><td> Occurence </td><td style="text-align:left">2016-04-12 12:11:45.295747</td></td></tr><tr><td> Files </td><td style="text-align:left">fuzz/out/fuzzer0/crashes/id:000006,sig:11,src:000016,op:havoc,rep:4</br><textarea rows="3" cols="68" style="font-family: monospace; font-size: 14px;">0000000: 7374 6163 6b01 0000 0a00 0a0a 0000 0a62  stack..........b
0000010: 7566 6672 3232 3232 3232 3232 3232 3232  uffr222222222222
0000020: 3232 0a00 eb00 6400 0000 00              22....d....
</textarea></br></td></tr><tr><td> GDB exploitable: </td><td style="text-align:left">Core was generated by `./fuzz/app -f fuzz/out/fuzzer0/crashes/id:000006,sig:11,src:000016,op:havoc,rep'.</br>Program terminated with signal SIGSEGV, Segmentation fault.</br>#0  0x000000000040198f in printf (__fmt=0x4020b8 "= %d\n") at /usr/include/x86_64-linux-gnu/bits/stdio2.h:104</br>104	  return __printf_chk (__USE_FORTIFY_LEVEL - 1, __fmt, __va_arg_pack ());</br>(gdb) Description: Possible stack corruption</br>Short description: PossibleStackCorruption (7/22)</br>Hash: 0f20b3e172a4a8925e7c0309a54b3383.0f20b3e172a4a8925e7c0309a54b3383</br>Exploitability Classification: EXPLOITABLE</br>Explanation: GDB generated an error while unwinding the stack and/or the stack contained return addresses that were not mapped in the inferior's process address space and/or the stack pointer is pointing to a location outside the default stack region. These conditions likely indicate stack corruption, which is generally considered exploitable.</br>Other tags: SourceAv (19/22), AccessViolation (21/22)</br>(gdb)</br></td></tr></table></body></html>