Fuzzing sockets: Apache HTTP, Part 3: Results
Blog post from GitHub
In the final part of a series on fuzzing the Apache HTTP server, the author, Antonio Morales, details his findings of various vulnerabilities, including a NULL dereference, an off-by-one error, a use-after-free, a heap-based out-of-bounds write, and a race condition leading to use-after-free. These vulnerabilities, discovered through custom fuzzing techniques, can lead to severe security issues such as denial of service and memory corruption when certain modules are enabled. Morales also discusses a minor integer overflow bug and emphasizes the potential for discovering critical vulnerabilities in widely used open-source software like Apache HTTP. This research aims to enhance the security of Apache HTTP and illustrates the effectiveness of fuzzing in identifying vulnerabilities. The series on fuzzing sockets concludes with plans to explore fuzzing JavaScript engines in future posts.