Add fuzzers for SDP and STUN parsing.

The STUN fuzzer is split into two parts: validation and parsing. The
latter should be able to handle invalid packets instead of assuming
the validation deals with them, since an adversary could set a valid
HMAC on an invalid packet.

NOTRY=true

Review-Url: https://codereview.webrtc.org/2044523002
Cr-Commit-Position: refs/heads/master@{#13050}
This commit is contained in:
katrielc 2016-06-06 09:45:25 -07:00 committed by Commit bot
parent 68718e32c4
commit 7b496e026b
4 changed files with 103 additions and 0 deletions

View File

@ -84,6 +84,33 @@ webrtc_fuzzer_test("rtp_packet_fuzzer") {
]
}
webrtc_fuzzer_test("sdp_parser_fuzzer") {
sources = [
"sdp_parser_fuzzer.cc",
]
deps = [
"//webrtc/api:libjingle_peerconnection",
]
}
webrtc_fuzzer_test("stun_parser_fuzzer") {
sources = [
"stun_parser_fuzzer.cc",
]
deps = [
"//webrtc/p2p:rtc_p2p",
]
}
webrtc_fuzzer_test("stun_validator_fuzzer") {
sources = [
"stun_validator_fuzzer.cc",
]
deps = [
"//webrtc/p2p:rtc_p2p",
]
}
source_set("audio_decoder_fuzzer") {
public_configs = [ "../..:common_inherited_config" ]
sources = [

View File

@ -0,0 +1,25 @@
/*
* Copyright (c) 2016 The WebRTC project authors. All Rights Reserved.
*
* Use of this source code is governed by a BSD-style license
* that can be found in the LICENSE file in the root of the source
* tree. An additional intellectual property rights grant can be found
* in the file PATENTS. All contributing project authors may
* be found in the AUTHORS file in the root of the source tree.
*/
#include <stddef.h>
#include <stdint.h>
#include "webrtc/api/jsepsessiondescription.h"
namespace webrtc {
void FuzzOneInput(const uint8_t* data, size_t size) {
std::string message(reinterpret_cast<const char*>(data), size);
webrtc::SdpParseError error;
std::unique_ptr<webrtc::SessionDescriptionInterface> sdp(
CreateSessionDescription("offer", message, &error));
}
} // namespace webrtc

View File

@ -0,0 +1,28 @@
/*
* Copyright (c) 2016 The WebRTC project authors. All Rights Reserved.
*
* Use of this source code is governed by a BSD-style license
* that can be found in the LICENSE file in the root of the source
* tree. An additional intellectual property rights grant can be found
* in the file PATENTS. All contributing project authors may
* be found in the AUTHORS file in the root of the source tree.
*/
#include <stddef.h>
#include <stdint.h>
#include "webrtc/p2p/base/stun.h"
namespace webrtc {
void FuzzOneInput(const uint8_t* data, size_t size) {
const char* message = reinterpret_cast<const char*>(data);
// Normally we'd check the integrity first, but those checks are
// fuzzed separately in stun_validator_fuzzer.cc. We still want to
// fuzz this target since the integrity checks could be forged by a
// malicious adversary who receives a call.
std::unique_ptr<cricket::IceMessage> stun_msg(new cricket::IceMessage());
rtc::ByteBufferReader buf(message, size);
stun_msg->Read(&buf);
}
} // namespace webrtc

View File

@ -0,0 +1,23 @@
/*
* Copyright (c) 2016 The WebRTC project authors. All Rights Reserved.
*
* Use of this source code is governed by a BSD-style license
* that can be found in the LICENSE file in the root of the source
* tree. An additional intellectual property rights grant can be found
* in the file PATENTS. All contributing project authors may
* be found in the AUTHORS file in the root of the source tree.
*/
#include <stddef.h>
#include <stdint.h>
#include "webrtc/p2p/base/stun.h"
namespace webrtc {
void FuzzOneInput(const uint8_t* data, size_t size) {
const char* message = reinterpret_cast<const char*>(data);
cricket::StunMessage::ValidateFingerprint(message, size);
cricket::StunMessage::ValidateMessageIntegrity(message, size, "");
}
} // namespace webrtc