<html><head>
<style>
table { width:100%; text-align: center;}
table, th, td { border: 1px solid black; border-collapse: collapse;}
th, td { padding: 5px; text-align: center;}
table#t01 tr:nth-child(even) { background-color: #eee;}
table#t01 tr:nth-child(odd) { background-color:#fff;}
table#t01 th { background-color: white; color: black; }
</style>
</head><body><h3>Report for 500740d118ae8bd1a6ef6ade030ce3c3.a25c8f26ef4f0982e099d25909f0bc8e</h3><table border="0" id="t01" style="width:80%;"><th>Description</th><th>Data</th><tr><td> CMD </td><td style="text-align:left">app -f @@</br></td></tr><tr><td> Found after </td><td style="text-align:left">0:00:01.032138</td></td></tr><tr><td> Description </td><td style="text-align:left">Possible stack corruption</td></td></tr><tr><td> Signal </td><td style="text-align:left">Program terminated with signal SIGSEGV, Segmentation fault.</td></td></tr><tr><td> Classification </td><td style="text-align:left">EXPLOITABLE</td></td></tr><tr><td> Occurence </td><td style="text-align:left">2016-04-16 09:10:46.032138</td></td></tr><tr><td> Files </td><td style="text-align:left">fuzz/out/fuzzer44/crashes/id:000002,sig:11,src:000000,op:havoc,rep:128</br><textarea rows="21" cols="68" style="font-family: monospace; font-size: 14px;">0000000: 7661 7661 0075 5a0a 7661 6c75 6531 310a  vava.uZ.value11.
0000010: 3010 0a76 696c 7565 6531 3e25 736c 6182  0..viluee1>%sla.
0000020: 6b31 31c4 0a97 0080 7565 0a69 616c 753e  k11.....ue.ialu>
0000030: 3131 0a76 617c 7565 3157 3134 310e 7661  11.va|ue1W141.va
0000040: 6c00 0001 0018 3530 300a 7374 6163 6b8b  l.....500.stack.
0000050: 6131 0a63 6b32 3000 8076 616c 7565 3976  a1.ck20..value9v
0000060: 616c 7565 3182 616c 7565 7634 3132 4747  alue1.aluev412GG
0000070: 4747 4747 4747 5100 0047 4747 4747 4747  GGGGGGQ..GGGGGGG
0000080: 4747 310e 7661 6163 53ef 6140 0000 0061  GG1.vaacS.a@...a
0000090: 636b 3230 300a 0001 0000 3431 3431 0010  ck200.....4141..
00000a0: 616c 7565 3521 7565 2e16 800a 7374 6163  alue5!ue....stac
00000b0: 6b76 6131 0a5c 7461 806b 3230 3008 7673  kva1.\ta.k200.vs
00000c0: 7461 632e 0a73 7461 6361 6c00 0001 0018  tac..stacal.....
00000d0: 3530 300a 7374 6163 6b8b 614c 3131 310a  500.stack.aL111.
00000e0: 7661 6c75 6500 ff61 6c75 6531 310a 7661  value..alue11.va
00000f0: 6c75 6531 3431 3431 6464 61fa 8065 1530  lue14141dda..e.0
0000100: 300a 006b 6b6b 6b6b 6b6b 6b81 6b66 4976  0..kkkkkkkk.kfIv
0000110: 616c 7565 313e 1731 6c75 6535 2330 0a76  alue1>.1lue5#0.v
0000120: 6120 0065 3134 3621 310a 7661 6c75 6535  a .e146!1.value5
0000130: 3030 0a66 7449 0100 0630 1231 0a76 6100  00.ftI...0.1.va.
0000140: 0003 e861 3131 0a76 616c 7565 313e       ...a11.value1>
</textarea></br></td></tr><tr><td> GDB exploitable: </td><td style="text-align:left">Core was generated by `./fuzz/app -f fuzz/out/fuzzer44/crashes/id:000002,sig:11,src:000000,op:havoc,re'.</br>Program terminated with signal SIGSEGV, Segmentation fault.</br>#0  __memcpy_sse2 () at ../sysdeps/x86_64/multiarch/../memcpy.S:72</br>(gdb) Description: Possible stack corruption</br>Short description: PossibleStackCorruption (7/22)</br>Hash: 500740d118ae8bd1a6ef6ade030ce3c3.a25c8f26ef4f0982e099d25909f0bc8e</br>Exploitability Classification: EXPLOITABLE</br>Explanation: GDB generated an error while unwinding the stack and/or the stack contained return addresses that were not mapped in the inferior's process address space and/or the stack pointer is pointing to a location outside the default stack region. These conditions likely indicate stack corruption, which is generally considered exploitable.</br>Other tags: DestAv (8/22), AccessViolation (21/22)</br>(gdb)</br></td></tr></table></body></html>