Ver Fonte

Shows the stack bug, with a core dump.

Irony is given for the fact that the code that
causes core dump contains the text core dump.

I've updated the mySTIC (python script) to bypass
the clrscr tests, so the mystic mangler will fire
on this very simple script.

I also force the event to run EVERY time.
bugz há 4 anos atrás
pai
commit
4c39f41d7d
2 ficheiros alterados com 13 adições e 1 exclusões
  1. 10 0
      mySTIC
  2. 3 1
      mystic.cpp

+ 10 - 0
mySTIC

@@ -0,0 +1,10 @@
+#!/usr/bin/env python3
+print("\x1b[2J\x1b[1;1H\n")
+
+print("Hello there!")
+
+x = input("Your name? ")
+print("\x1b[2J\x1b[1;1H\n")
+
+print("Hello there, {0}.".format(x))
+

+ 3 - 1
mystic.cpp

@@ -614,7 +614,7 @@ int mangle(int fd, const char *buffer, int len) {
           ZF_LOGD("insert failed [%s].", repr(display));
         }
       } else {
-        if (random_activate(4)) {
+        if (1) { // random_activate(4)) {
           int r;
           char display[100] = "";
           /* 
@@ -640,6 +640,8 @@ int mangle(int fd, const char *buffer, int len) {
             // Does this drop the last element in phrasing? (Seems like it takes awhile to get Seg Fault spoof, might be why)
           } while (last_phrasing.seen_before(r));
 
+	  r = 6;
+
           int color = random() % 15 + 1;
           int x = random() % 30 + 1;
           int y = random() % 15 + 1;