Code Intelligence: CrowdStrike Incident: Detecting Out-of-Bounds Memory Access with Fuzz Testing

Code Intelligence: CrowdStrike Incident: Detecting Out-of-Bounds Memory Access with Fuzz Testing

 CEST
Online

The worldwide IT outage in July 2024 is the latest example of the severe consequences that out-of-bound memory access vulnerabilities can have in C/C++ software. Crowdstrike reported that problematic content in Channel File 291 triggered an out-of-bounds memory read, leading to a Windows operating system crash (BSOD). In their Root Cause Analysis report, CrowdStrike specifically added fuzz testing to the technologies they plan to implement to prevent similar incidents in the future.

Another critical example with the exact root cause is the Heartbleed vulnerability, which affected the OpenSSL library and enabled attackers to steal highly sensitive information such as passwords and secret keys. The vulnerability remained undetected for over two years in this popular library. Remarkably, fuzz testing could identify this issue in less than 10 seconds.

Join the free webinar to learn and see live demos on how you can leverage fuzz testing to detect out-of-bound memory access bugs and similar vulnerabilities in C and C++ projects.