Open GoogleCodeExporter opened 9 years ago
Debugging the code I discovered that segfault comes from similatiry.c:301
inside entropy(). When segfault occurred size_orig was too long compared. I
don't now what entropy exactly does, but in other times that it was called
size_orig was always equal to strlen(c_orig) so I force size_orig to be equal
to c_orig inside entropy. Besides i could detect that this problem was caused
by this instruction "PyArg_ParseTuple( args, "s#", &input, &input_size );" at
elsign.cc:1262 what seems to parse the tuple wrong, resulting in a wrong input
size. I don't now what is the real impact of my changes but, doing what I've
described androsign could detect malwares that were in Androguard database.
Original comment by oshiro.h...@gmail.com
on 18 Mar 2015 at 6:10
Original issue reported on code.google.com by
oshiro.h...@gmail.com
on 20 Jan 2015 at 3:18