Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Wireshark vulnerability research #3

Open
HockeyInJune opened this issue Feb 28, 2013 · 3 comments
Open

Wireshark vulnerability research #3

HockeyInJune opened this issue Feb 28, 2013 · 3 comments

Comments

@HockeyInJune
Copy link
Collaborator

http://www.wireshark.org/
http://www.wireshark.org/develop.html
http://www.wireshark.org/docs/wsdg_html_chunked/
https://bugs.wireshark.org/bugzilla/
https://bugs.wireshark.org/bugzilla/buglist.cgi?quicksearch=fuzz

Methodology

This methodology assumes you have already completed the Hack Night curriculum.

  • Find a previously patched security vulnerability in the bug tracker.
  • Analyze this vulnerability until you understand it completely. This will help you to start understanding the code base and get you familiar with how this type of bug manifests in the target application.
  • Exploit this vulnerability or continue onto the next step.
  • Choose a method to find new bugs in the target application (Also see Finding Bugs below):
  • Report and/or exploit the bug you found in the target application.

Finding Bugs

Remember always focus on the easiest way to find bugs first. This might change from project to project, but here's a guide.

  • Start with a dumb fuzzer. It's easy to set up and it might find low-hanging fruit.
  • Search for vulnerable API calls, either through source code analysis or reverse engineering.
  • Do an operational review of the target application, find out what libraries it uses and how the application is designed to be used.
  • Figure out how the target application is architected and start learning more about where input enters the program and how input is structured.
  • Once you start learning about how input is structured, you can use a smarter fuzzer, or build your own fuzzer.
  • Keep learning more about the target application to find interesting parts of the program that might have unsafe functionality or hidden bugs.
@moshekaplan
Copy link

Reported bugs:

@evanpjensen
Copy link
Member

Reported:
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8364 DOS

Denial of service in a dissector that requires no user interaction and affects all recent versions of Wireshark on all tested operating systems and architectures.

@evanpjensen
Copy link
Member

Wireshark developers don't understand how integers work. Examine all integer comparisons and memory allocating/copying functions. In my experience there is at least one integer bug at least every ~3K lines in the dissectors.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants