Detecting Out-of-Bounds Memory Access, Which Caused The Crowdstike's Incident

Поделиться
HTML-код
  • Опубликовано: 12 сен 2024
  • The Crowdstrike incident is a recent example of out-of-bounds memory access in C/C++ causing a crash. CrowdStrike reported that problematic content in Channel File 291 triggered an out-of-bounds memory read, leading to a Windows operating system crash (BSOD).
    Another critical example with the exact root cause is the Heartbleed vulnerability, which affected the OpenSSL library. Remarkably, fuzz testing could identify this issue in less than 10 seconds. Watch the video to see fuzz testing in action.

Комментарии •