Skip to content

jasper/REDTEAM-CVE-2021-3272 #172

@ChrisTimperley

Description

@ChrisTimperley
                Running Concrete Execution
                ------------------------------------------------------------------------------------------

                     Using Arguments: ['--input', '$POC', '--output', 'output.jp2']
                     Using Input File: /CrashRepair/experiments/vulnloc/jasper/REDTEAM-CVE-2021-3272/exploit
                building program
                        setting environment variables
                        cleaning files
                        configuring program
                        compiling program
                     Using Binary: /data/vulnloc/jasper/REDTEAM-CVE-2021-3272/src/src/appl/jasper
                extracting bytecode
                executing klee in concrete mode
                extracting instruction trace
                [warning] Unknown Crash Reason: __ubsan_handle_type_mismatch_v1

                        [note] program crashed
                [warning] Unknown Crash Reason: __ubsan_handle_type_mismatch_v1

                collecting tainted expressions
                collecting tainted concrete values
/usr/bin/crepair: line 5: 151767 Killed                  python3.8 "$(dirname $SCRIPT_DIR)/Repair.py" "$@"
FATAL ERROR: analysis failed: no localization file was produced

Metadata

Metadata

Assignees

Labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions