static
May 23rd, 2011, 05:47
Hi guys,
Maybe this is amazing that you can almost find anything in the Internet, However always there are some exceptions.
If you search google for "how to analyze a vulnerability", You'll get nothing.
So I want to discuss on some general methods or methodologies for analyzing a vulnerability, And I'm pretty sure some of you guys like it.
If you encounter a common stack or heap based buffer overflow vulnerability, analyzing will be quite easy.
However, sometimes you encounter some challenging vulnerabilities like this:
VLC Vulnerabilities handling .AMV and .NSV files:
http://www.coresecurity.com/content/vlc-vulnerabilities-amv-nsv-files
A sample:
http://samples.libav.org/samples/nsv/64vp3.nsv
just change value at 0x0b to 0x0e to 0XFFFFFFFF and vlc will crash.
Source code of VLC 1.1.7:
http://download.videolan.org/pub/videolan/vlc/1.1.7/vlc-1.1.7.tar.bz2
Win32 compiled version:
http://download.videolan.org/pub/videolan/vlc/1.1.7/win32/vlc-1.1.7-win32.7z
To be honest, I tried to analyze it, but i failed, even by reading the patch:
Could anybody find out what is the root of this vulnerability?
Believe me, It's not easy, however if you do some analysis, just let us know the result and your methodology.
We can discuss more to reach a general methodology.
static
Maybe this is amazing that you can almost find anything in the Internet, However always there are some exceptions.
If you search google for "how to analyze a vulnerability", You'll get nothing.
So I want to discuss on some general methods or methodologies for analyzing a vulnerability, And I'm pretty sure some of you guys like it.
If you encounter a common stack or heap based buffer overflow vulnerability, analyzing will be quite easy.
However, sometimes you encounter some challenging vulnerabilities like this:
VLC Vulnerabilities handling .AMV and .NSV files:
http://www.coresecurity.com/content/vlc-vulnerabilities-amv-nsv-files
A sample:
http://samples.libav.org/samples/nsv/64vp3.nsv
just change value at 0x0b to 0x0e to 0XFFFFFFFF and vlc will crash.
Source code of VLC 1.1.7:
http://download.videolan.org/pub/videolan/vlc/1.1.7/vlc-1.1.7.tar.bz2
Win32 compiled version:
http://download.videolan.org/pub/videolan/vlc/1.1.7/win32/vlc-1.1.7-win32.7z
To be honest, I tried to analyze it, but i failed, even by reading the patch:
--- a/src/video_output/video_output.c
+++ b/src/video_output/video_output.c
@@ -297,7 +297,7 @@ vout_thread_t * vout_Create( vlc_object_t *p_parent, video_format_t *p_fmt )
char *psz_parser;
char *psz_name;
- if( i_width <= 0 || i_height <= 0 )
+ if( i_width <= 0 || i_height <= 0 || i_width > 8192 || i_height > 8192 )
return NULL;
vlc_ureduce( &p_fmt->i_sar_num, &p_fmt->i_sar_den,
Could anybody find out what is the root of this vulnerability?
Believe me, It's not easy, however if you do some analysis, just let us know the result and your methodology.
We can discuss more to reach a general methodology.
static