<html><head>
<style>
table { width:100%; text-align: center;}
table, th, td { border: 1px solid black; border-collapse: collapse;}
th, td { padding: 5px; text-align: center;}
table#t01 tr:nth-child(even) { background-color: #eee;}
table#t01 tr:nth-child(odd) { background-color:#fff;}
table#t01 th { background-color: white; color: black; }
</style>
</head><body><h3>Report for 500740d118ae8bd1a6ef6ade030ce3c3.04a0d3c119dd8df50099c4fc88552008</h3><table border="0" id="t01" style="width:80%;"><th>Description</th><th>Data</th><tr><td> CMD </td><td style="text-align:left">app -f @@</br></td></tr><tr><td> Found after </td><td style="text-align:left">0:00:05.152294</td></td></tr><tr><td> Description </td><td style="text-align:left">Possible stack corruption</td></td></tr><tr><td> Signal </td><td style="text-align:left">Program terminated with signal SIGSEGV, Segmentation fault.</td></td></tr><tr><td> Classification </td><td style="text-align:left">EXPLOITABLE</td></td></tr><tr><td> Occurence </td><td style="text-align:left">2016-04-16 09:10:50.152294</td></td></tr><tr><td> Files </td><td style="text-align:left">fuzz/out/fuzzer0/crashes/id:000000,sig:11,src:000000,op:flip1,pos:64</br><textarea rows="26" cols="68" style="font-family: monospace; font-size: 14px;">0000000: 7661 6c75 6535 3030 0a73 7461 636b 7661  value500.stackva
0000010: 310a 7374 6163 6b32 3030 0a76 616c 7565  1.stack200.value
0000020: 2e0a 7374 6163 6b31 3131 0a76 616c 7565  ..stack111.value
0000030: 3131 0a76 616c 7565 0a76 616c 7565 3131  11.value.value11
0000040: 8a76 616c 7565 3134 3134 310a 7661 6c75  .value14141.valu
0000050: 6535 3030 3030 0a76 616c 7565 2e0a 7374  e50000.value..st
0000060: 6163 6b31 3131 0a76 616c 7565 0a76 616c  ack111.value.val
0000070: 7565 3131 0a76 616c 7565 3134 3134 310a  ue11.value14141.
0000080: 7661 6c75 6535 3030 0a73 7461 636b 7661  value500.stackva
0000090: 310a 7374 6163 6b32 3030 0a76 616c 7565  1.stack200.value
00000a0: 2e0a 7374 6163 6b31 3131 0a76 616c 7565  ..stack111.value
00000b0: 0a76 616c 7565 3131 0a76 616c 7565 3134  .value11.value14
00000c0: 3134 310a 7661 6c75 6535 3030 0a73 7461  141.value500.sta
00000d0: 636b 7661 310a 7374 6163 6b32 3030 0a76  ckva1.stack200.v
00000e0: 616c 7565 2e0a 7374 6163 6b31 3131 0a76  alue..stack111.v
00000f0: 616c 7565 0a76 616c 7565 3131 0a76 616c  alue.value11.val
0000100: 7565 3134 3134 310a 7661 6c75 6535 3030  ue14141.value500
0000110: 0a73 7461 636b 7661 310a 7374 6163 6b32  .stackva1.stack2
0000120: 3030 0a76 616c 7565 2e0a 7374 6163 6b31  00.value..stack1
0000130: 3131 0a76 616c 7565 0a76 616c 7565 3131  11.value.value11
0000140: 0a76 616c 7565 3134 3134 310a 7661 6c75  .value14141.valu
0000150: 6535 3030 0a76 616c 7565 3134 3134 310a  e500.value14141.
0000160: 7661 6c75 6535 3030 0a73 7461 636b 7661  value500.stackva
0000170: 310a 7374 6163 6b32 3030 0a76 616c 7565  1.stack200.value
0000180: 2e0a 7374 6163 6b31 3131 0a76 616c 7565  ..stack111.value
0000190: 0a76 616c 7565 3131 0a76 616c 7565 3134  .value11.value14
</textarea></br></td></tr><tr><td> GDB exploitable: </td><td style="text-align:left">Core was generated by `./fuzz/app -f fuzz/out/fuzzer0/crashes/id:000000,sig:11,src:000000,op:flip1,pos'.</br>Program terminated with signal SIGSEGV, Segmentation fault.</br>#0  __memcpy_sse2 () at ../sysdeps/x86_64/multiarch/../memcpy.S:72</br>(gdb) Description: Possible stack corruption</br>Short description: PossibleStackCorruption (7/22)</br>Hash: 500740d118ae8bd1a6ef6ade030ce3c3.04a0d3c119dd8df50099c4fc88552008</br>Exploitability Classification: EXPLOITABLE</br>Explanation: GDB generated an error while unwinding the stack and/or the stack contained return addresses that were not mapped in the inferior's process address space and/or the stack pointer is pointing to a location outside the default stack region. These conditions likely indicate stack corruption, which is generally considered exploitable.</br>Other tags: DestAv (8/22), AccessViolation (21/22)</br>(gdb)</br></td></tr></table></body></html>