-
-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
heap-buffer-overflow in pcap_thread_callback_ipv6() #43
Comments
Thanks! Will look at it on Monday, need to get fuzzing into our continuous
testing.
|
Issue DNS-OARC/drool#43, DNS-OARC/drool#44: Fix reverse reading a byte
@geeknik Could you give me a description on how you set this up so I can start looking at running this continuously in our testing platform? |
@jelu I'm just using cheap $2.50/month VPS for fuzzing things. Well multiple, but that's another story for another day.
For my starting corpus, I used a few CVE-worthy pcaps that I generated with AFL by disovering some tcpdump bugs, but AFL comes with a perfectly usable pcap in the testcases dir. Plus you have my 3 for regression testing. |
I like to fuzz everything. Built from
b0e787e
with afl-clang-fast on Debian 8.x x64../drool -c 'text:timing ignore;' -c 'text:client_pool target "127.0.0.1" "53";' -c 'text:client_pool skip_reply;' -r
test001.pcap
The text was updated successfully, but these errors were encountered: