Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
Australian researcher Silvio Cesare has released a tool capable of automatically detecting bugs and vulnerabilities in embedded Linux libraries.
The script correlates vulnerability advisory CVEs for third party libraries to determine if holes have carried over to Linux platforms or have not been patched.
It identifies similar source files based on file names and content to identify relationships between source packages. Fuzzy hashing using ssdeep produces hashes that can be used to determine similar packages. Graph Theory is used to perform the analysis.
Such holes often escape the eye of developers because the libraries may not be kept updated with sources. This is further compounded because vulnerabilities in cross distributed packages can leave Linux platforms vulnerable.
Linux vendors have previously used laborious manual techniques to find holes in libraries. Debian alone manually tracks some 420 embedded packages, Cesare said at Ruxcon 2011.
“Processes used by developers so far have been ad-hoc and very slow,” Cesare told SC.
The researcher found 30 vulnerabilities in libraries embedded in Linux platforms when developing the tool as part of his PhD at Deakin University.
He found five packages in Debian and Fedora that were vulnerable to a buffer overflow found in libtiff in April. Mozilla Firefox had embedded libpng and was vulnerable for more than three months after the flaw was discovered.
Flaws in the vulnerability identification process meant that known vulnerabilities were often assigned different CVEs for separate packages.
While about 90 per cent of vulnerabilities produced by the tool were false-positives, Cesare said vetting the results takes seconds and was considerably faster than using manual processes.
Fedora incorporated Cesare’s results in an embedded library list database.
Cesare said he will publish an academic paper on the subject and plans to similar conduct binary analysis for Windows platforms.
Copyright © SC Magazine, Australia
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.