Add check to see if stack pointer is off the stack according to the memory
mappings when rating Linux exploitability. R=ivanpe@chromium.org Review URL: https://codereview.chromium.org/1286033002 git-svn-id: http://google-breakpad.googlecode.com/svn/trunk@1487 4c0a9323-5329-0410-9bdc-e9ce6186880e
This commit is contained in:
@@ -127,6 +127,10 @@ TEST(ExploitabilityTest, TestLinuxEngine) {
|
||||
ExploitabilityFor("linux_inside_module_exe_region1.dmp"));
|
||||
ASSERT_EQ(google_breakpad::EXPLOITABILITY_INTERESTING,
|
||||
ExploitabilityFor("linux_inside_module_exe_region2.dmp"));
|
||||
ASSERT_EQ(google_breakpad::EXPLOITABILITY_INTERESTING,
|
||||
ExploitabilityFor("linux_stack_pointer_in_stack.dmp"));
|
||||
ASSERT_EQ(google_breakpad::EXPLOITABILITY_HIGH,
|
||||
ExploitabilityFor("linux_stack_pointer_in_module.dmp"));
|
||||
|
||||
}
|
||||
}
|
||||
|
Reference in New Issue
Block a user