Home / Companies / GitHub / Blog / Post Details
Content Deep Dive

Fuzzing sockets: Apache HTTP, Part 3: Results

Blog post from GitHub

Post Details
Company
Date Published
Author
Antonio Morales
Word Count
1,682
Language
English
Hacker News Points
-
Summary

In the final part of a series on fuzzing the Apache HTTP server, the author, Antonio Morales, details his findings of various vulnerabilities, including a NULL dereference, an off-by-one error, a use-after-free, a heap-based out-of-bounds write, and a race condition leading to use-after-free. These vulnerabilities, discovered through custom fuzzing techniques, can lead to severe security issues such as denial of service and memory corruption when certain modules are enabled. Morales also discusses a minor integer overflow bug and emphasizes the potential for discovering critical vulnerabilities in widely used open-source software like Apache HTTP. This research aims to enhance the security of Apache HTTP and illustrates the effectiveness of fuzzing in identifying vulnerabilities. The series on fuzzing sockets concludes with plans to explore fuzzing JavaScript engines in future posts.