a few thoughts about project zero’s last blog postThis shouldn’t have happened: A vulnerability postmortem
well, imho this is most understandable project zero writeup so far :) and it is really well explained by @taviso. actually writeup, in line with the results of the vulnerability, it scrutinize on fuzzer which couldn’t find this 7 years old memcpy bug.
without further ado, mentioned bug it’s called “BigSig” that found in NSSNetwork Security Services is Mozilla’s widely used, cross-platform cryptography library. . Simply it caused from the maximum size signature, so untrusted signature is simply copied into this fixed-sized buffer, overwriting adjacent members with arbitrary attacker-controlled data. The signature size must match the size of the key, but there are no other limitations. The result is turns out memory corruption.
keypoints
honestly, I’m not very interested in fuzzing, but this detailed writeup help me learn some new cool things.