Hi,
While I was auditing frozen library using PyJFuzz, I came across a stack based overflow using the following testcase with address sanitizer.
e1f555ceb332dc1717778aba679cfdda20939edf.txt
I didn't investigate further, anyway there're other exploitable issue, I'll report later.
Thanks for your support!
Regards,
Daniele
Hi,
While I was auditing frozen library using PyJFuzz, I came across a stack based overflow using the following testcase with address sanitizer.
e1f555ceb332dc1717778aba679cfdda20939edf.txt
I didn't investigate further, anyway there're other exploitable issue, I'll report later.
Thanks for your support!
Regards,
Daniele