This is the mail archive of the
binutils@sourceware.org
mailing list for the binutils project.
Re: vulnerabilities in libbfd (CVE-2014-beats-me)
- From: Michal Zalewski <lcamtuf at coredump dot cx>
- To: Yury Gribov <y dot gribov at samsung dot com>
- Cc: Nicholas Clifton <nickc at redhat dot com>, "Maciej W. Rozycki" <macro at linux-mips dot org>, bugtraq <bugtraq at securityfocus dot com>, binutils at sourceware dot org
- Date: Thu, 30 Oct 2014 07:20:32 -0700
- Subject: Re: vulnerabilities in libbfd (CVE-2014-beats-me)
- Authentication-results: sourceware.org; auth=none
- References: <CALx_OUBq4iRGZNPLdCuqXmehVV=6vhXN3J16ytzM91cFqVSAoQ at mail dot gmail dot com> <alpine dot LFD dot 2 dot 11 dot 1410271451411 dot 3413 at eddie dot linux-mips dot org> <54521A7F dot 4050501 at redhat dot com> <5452389B dot 502 at samsung dot com>
> We could cook a (simple) ELF fuzzer and run it on Binutils with
> AddressSanitizer enabled. Perhaps there is one I'm unaware of? Traditional
> fuzzers like afl are necessarily limited for highly structured inputs.
Either way should give you decent results. Pretty sure that you'd get
decent mileage out of afl - it can get pretty far with binary files.
/mz