<html><head>
<style>
table { width:100%; text-align: center;}
table, th, td { border: 1px solid black; border-collapse: collapse;}
th, td { padding: 5px; text-align: center;}
table#t01 tr:nth-child(even) { background-color: #eee;}
table#t01 tr:nth-child(odd) { background-color:#fff;}
table#t01 th { background-color: white; color: black; }
</style>
</head><body><h3>Report for 500740d118ae8bd1a6ef6ade030ce3c3.9fa36bdc1e4d943f62358205d4b94d0a</h3><table border="0" id="t01" style="width:80%;"><th>Description</th><th>Data</th><tr><td> CMD </td><td style="text-align:left">app -f @@</br></td></tr><tr><td> Found after </td><td style="text-align:left">0:00:38.085561</td></td></tr><tr><td> Description </td><td style="text-align:left">Possible stack corruption</td></td></tr><tr><td> Signal </td><td style="text-align:left">Program terminated with signal SIGSEGV, Segmentation fault.</td></td></tr><tr><td> Classification </td><td style="text-align:left">EXPLOITABLE</td></td></tr><tr><td> Occurence </td><td style="text-align:left">2016-04-16 09:11:23.085561</td></td></tr><tr><td> Files </td><td style="text-align:left">fuzz/out/fuzzer0/crashes/id:000003,sig:06,src:000000,op:havoc,rep:64</br><textarea rows="20" cols="68" style="font-family: monospace; font-size: 14px;">0000000: 7661 6c75 6535 3030 0a73 746d 636b 7661  value500.stmckva
0000010: 310a 7354 6163 6b32 2030 0a76 616c 7565  1.sTack2 0.value
0000020: 7374 61ff 0065 31e8 6430 3030 300a 6761  sta..e1.d0000.ga
0000030: 8675 652e 0a73 7461 636b 3131 310a 7661  .ue..stack111.va
0000040: 6c73 650a 7661 6b75 6531 310a 73ff 7f63  lse.vakue11.s..c
0000050: 6b76 8231 0a73 6163 6b32 3030 0aff 7f0a  kv.1.sack200....
0000060: 7661 6c75 6531 3431 8073 7461 636b 7565  value141.stackue
0000070: 3530 3c0a 7374 6163 6b76 6131 0a73 7461  50<.stackva1.sta
0000080: 636b 3230 31fb fbfb fbfb fbfb fbfb fbfb  ck201...........
0000090: fbfb fbfb fbfb fbfb fbfb fbfb fb76 616c  .............val
00000a0: 7565 652e 0a73 7661 6c75 6531 310a 7661  uee..svalue11.va
00000b0: 6c73 5861 6c75 6574 6140 6b43 7661 0202  lsXalueta@kCva..
00000c0: 0202 7f30 300a 7374 6163 6b2e 0a8f 74fb  ...00.stack...t.
00000d0: fbfb fbf1 fb3e 6c75 6535 3065 2e35 3030  .....>lue50e.500
00000e0: 0a61 6c76 616c 7563 6363 6363 6363 6363  .alvaluccccccccc
00000f0: 6363 6363 6363 3431 3431 0a76 616c 7565  cccccc4141.value
0000100: 3530 300a 616c 7661 6c75 6530 0a73 7461  500.alvalue0.sta
0000110: 7f6b 2e0a 738a 6163 6b31 3131 0a76 616c  .k..s.ack111.val
0000120: 7573 7461 638c 7565 3131 0a76 616c 7565  ustac.ue11.value
0000130: 3134                                     14
</textarea></br></td></tr><tr><td> GDB exploitable: </td><td style="text-align:left">Core was generated by `./fuzz/app -f fuzz/out/fuzzer0/crashes/id:000003,sig:06,src:000000,op:havoc,rep'.</br>Program terminated with signal SIGSEGV, Segmentation fault.</br>#0  __memcpy_sse2 () at ../sysdeps/x86_64/multiarch/../memcpy.S:72</br>(gdb) Description: Possible stack corruption</br>Short description: PossibleStackCorruption (7/22)</br>Hash: 500740d118ae8bd1a6ef6ade030ce3c3.9fa36bdc1e4d943f62358205d4b94d0a</br>Exploitability Classification: EXPLOITABLE</br>Explanation: GDB generated an error while unwinding the stack and/or the stack contained return addresses that were not mapped in the inferior's process address space and/or the stack pointer is pointing to a location outside the default stack region. These conditions likely indicate stack corruption, which is generally considered exploitable.</br>Other tags: DestAv (8/22), AccessViolation (21/22)</br>(gdb)</br></td></tr></table></body></html>