2 links tagged with all of: security + vulnerabilities + fuzzing
Click any tag below to further narrow down your results
Links
The article discusses how some open-source projects, despite extensive fuzzing, still harbor serious vulnerabilities. It highlights specific cases like GStreamer, Poppler, and Exiv2, illustrating the need for human oversight and better coverage to effectively identify security flaws.
Dillon Franke explores using Mach IPC messages as an attack vector for finding and exploiting sandbox escapes in MacOS system daemons. He details his hybrid approach of knowledge-driven fuzzing, which combines automated fuzzing with manual reverse engineering, and shares insights on identifying vulnerabilities, specifically a type confusion issue in the coreaudiod daemon. The post includes resources for building a custom fuzzing harness and tools used throughout the research.