On Sun, Jul 14, 2013 at 4:49 AM, Dominique RIGHETTO
<dominique.righe...@gmail.com> wrote:
> Hi Tomas,
>
> Thanks you very much.
>
> I try to understand the objective of each of the value in
> ["-0000012345", "-2147483649", "-2147483648", "0000012345", "2147483647",
> "2147483648", "4294967295", "4294967296", "0000023456"].
>
> For values: 2147483647,2147483648,-2147483649,-2147483648
> I understand because it's a for testing around the limits of the Integer
> type but for other values I dont understand why they are used and from where
> they come from ?

The most important part seems to be here [0]

[0] https://code.google.com/p/skipfish/source/browse/trunk/src/checks.c#1872

> As I understand the vulnerability, according the all the stuff that I can
> read, is the fact below:
>
> A parameter has a Integer overflow vuln if, in the case in which you submit
> a value over the max/min limit of the Integer, it return a very small
> negative or positive value.
>
> Ex:
> You submit "2147483648" and the returned value is negative
> You submit "-2147483648" and the returned value is positive
>
> Can you confirm to me that's my understanding is correct ?

I'm no good with these low level bugs, but my basic understanding of
the vuln makes me think that the best way to detect this vuln is:
    * Send HTTP request with a test payload, lets say... 5 , save it
    * Send HTTP request with a test for integer overflow, which if
successful would be the same as sending the number 5, (calculate that,
but it should be -(2^31-5) or something like that), save it
    * Compare the two. If they are equal we're in a case where integer
overflow is present OR the input is not even used
    * Send one more HTTP request with a number 8 (different from the
previous), compare with any of the previous ones. If it's different
then integer overflow is present.

If you want to have lower false positives, after running through those
steps you could run one more test round, repeating step 1 and 2 with a
number different than 5.

@Thomas: is this how you were doing it?

> I apologize for all my questions but I really want to fully understand the
> context of the vulnerability in order to take in account all the cases into
> the plugin implementation and also learn new things.
>
> W3AF team is a very cool learning environment, I feel like a dwarf among
> giants ;o)))))
>
> Thanks in advance.
>
> Best regards,
>
> Dom
>
>
>
> On 13/07/2013 15:48, Tomas Velazquez wrote:
>>
>> Hi Dominique,
>>
>> Months ago I code a poc of integer overflow, but it is unfinished.
>>
>> My code is based on skipfish detection:
>> http://code.google.com/p/skipfish/source/browse/trunk/src/checks.c
>>
>> Regards,
>>
>>
>>
>> On Sat, Jul 13, 2013 at 10:09 AM, Dominique Righetto
>> <dominique.righe...@gmail.com <mailto:dominique.righe...@gmail.com>>
>> wrote:
>>
>>     Hi Andres,
>>
>>     I'm working on integer overflow detection plugin and I try to
>>     understand, in a audit plugin, how to access to injection points
>>     detected by in discovery part.
>>
>>     Can you give me some pointer or plugin example ?
>>
>>     Thanks in advance
>>
>>     Dom
>>
>>
>> ------------------------------------------------------------------------------
>>     See everything from the browser to the database with AppDynamics
>>     Get end-to-end visibility with application monitoring from AppDynamics
>>     Isolate bottlenecks and diagnose root cause in seconds.
>>     Start your free trial of AppDynamics Pro today!
>>
>> http://pubads.g.doubleclick.net/gampad/clk?id=48808831&iu=/4140/ostg.clktrk
>>     _______________________________________________
>>     W3af-develop mailing list
>>     W3af-develop@lists.sourceforge.net
>>     <mailto:W3af-develop@lists.sourceforge.net>
>>     https://lists.sourceforge.net/lists/listinfo/w3af-develop
>>
>>
>



--
Andrés Riancho
Project Leader at w3af - http://w3af.org/
Web Application Attack and Audit Framework
Twitter: @w3af
GPG: 0x93C344F3

------------------------------------------------------------------------------
See everything from the browser to the database with AppDynamics
Get end-to-end visibility with application monitoring from AppDynamics
Isolate bottlenecks and diagnose root cause in seconds.
Start your free trial of AppDynamics Pro today!
http://pubads.g.doubleclick.net/gampad/clk?id=48808831&iu=/4140/ostg.clktrk
_______________________________________________
W3af-develop mailing list
W3af-develop@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/w3af-develop

Reply via email to