Open fabzzap opened 4 years ago
Thanks for the report! The bug is triggered because the executable contains a conditional jump to another function. I'll investigate how to best solve this.
Interesting, maybe that's a tail call optimisation?
Yes, kind of; the code is reusing a part of another function:
Boomerang does not recognize that the jae
instructions are conditional calls and that 0x806a060
is a separate function.
OS:
Ubuntu 18.10 64 bit Boomerang version or git hash:
509e4cce0
Steps to reproduce:
csw
from http://ramsoft.bbk.org.omegahg.com/software/csw130.tgzcsw
from the downloaded one, that is UPX-compressed<install path>/bin/boomerang-cli csw
Expected behaviour/output: The program is decompiled
Actual behaviour/output: Segmentation fault. When run under gdb, the stack trace is also printed
Additional comments:
[...]