Skip to content

Fuzzing Vulnerability Fixes#3

Open
Frostielocks wants to merge 2 commits into
sancus-tee:masterfrom
Frostielocks:master
Open

Fuzzing Vulnerability Fixes#3
Frostielocks wants to merge 2 commits into
sancus-tee:masterfrom
Frostielocks:master

Conversation

@Frostielocks
Copy link
Copy Markdown

During Fuzz testing of VulCAN, it was discovered that both VatiCAN and LeiA exhibited bugs that allowed an unauthenticated user to adjust the RPM LEDs at will on the demo bench.
The LEDs would respond with "GOOD" and an RPM value calculated from the unauthenticated message.

The bugs occurred when performing moderate flooding with extended CAN ID packets.
Extended CAN ID packets were/are broadcast on ID 0x0, which meant that they caused garbled authenticated packets but also arrived on the right component due to being broadcast.

The following fixes patch some of that behavior.
They cause these garbled packets to be outright rejected instead of being accepted and causing an LED adjustment.

@Frostielocks Frostielocks changed the title Fuzzing Vulnerability Fixing Fuzzing Vulnerability Fixes Jul 18, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant