Skip to content

Commit 8c8e2bf

Browse files
authored
Create gh-pages branch via GitHub
1 parent 3468487 commit 8c8e2bf

2 files changed

Lines changed: 10 additions & 3 deletions

File tree

index.html

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,13 @@ <h2>An experimental grammar fuzzer in Haskell using QuickCheck</h2>
3030
<section id="main-content">
3131
<p>QuickFuzz is a grammar fuzzer powered by <a href="http://www.cse.chalmers.se/%7Erjmh/QuickCheck/">QuickCheck</a>, <a href="https://wiki.haskell.org/Template_Haskell">Template Haskell</a> and specific libraries from Hackage to generate many complex file-formats like Jpeg, Png, Svg, Xml, Zip, Tar and more!. QuickFuzz is open-source (GPL3) and it can use other bug detection tools like <a href="http://caca.zoy.org/wiki/zzuf">zzuf</a>, <a href="https://github.com/aoh/radamsa">radamsa</a>, <a href="http://google.github.io/honggfuzz/">honggfuzz</a> and <a href="http://valgrind.org">valgrind</a>.</p>
3232

33+
<h2>
34+
<a id="news" class="anchor" href="#news" aria-hidden="true"><span aria-hidden="true" class="octicon octicon-link"></span></a>News</h2>
35+
36+
<ul>
37+
<li>An academic article on QuickFuzz will be presented on the Haskell Symposium 2016!</li>
38+
</ul>
39+
3340
<h2>
3441
<a id="bugs-lost-and-found" class="anchor" href="#bugs-lost-and-found" aria-hidden="true"><span aria-hidden="true" class="octicon octicon-link"></span></a><strong>Bugs <del>lost and</del> found</strong>
3542
</h2>
@@ -147,7 +154,7 @@ <h2>
147154
<h2>
148155
<a id="downloads" class="anchor" href="#downloads" aria-hidden="true"><span aria-hidden="true" class="octicon octicon-link"></span></a>Downloads</h2>
149156

150-
<p>Pre-compiled and <em>upx</em> compressed binaries are available here:</p>
157+
<p>Pre-compiled and compressed (bzexe) binaries are available here:</p>
151158

152159
<ul>
153160
<li><a href="https://github.com/CIFASIS/QuickFuzz/releases/download/v0.1/QuickFuzz.x86">Linux x86</a></li>
@@ -163,7 +170,7 @@ <h3>
163170
<a id="the-quickfuzz-team" class="anchor" href="#the-quickfuzz-team" aria-hidden="true"><span aria-hidden="true" class="octicon octicon-link"></span></a>The QuickFuzz team</h3>
164171

165172
<ul>
166-
<li>Pablo <strong>Buiras</strong> (<a href="http://www.chalmers.se/en/Pages/default.aspx">Chalmers University of Technology</a>)</li>
173+
<li>Pablo <strong>Buiras</strong> (Harvard University)</li>
167174
<li>Martín <strong>Ceresa</strong> (<a href="http://cifasis-conicet.gov.ar/">CIFASIS-Conicet</a>)</li>
168175
<li>Gustavo <strong>Grieco</strong> (<a href="http://cifasis-conicet.gov.ar/">CIFASIS-Conicet</a> and <a href="http://www-verimag.imag.fr/?lang=en">VERIMAG</a>)</li>
169176
</ul>

params.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"name": "QuickFuzz",
33
"tagline": "An experimental grammar fuzzer in Haskell using QuickCheck",
4-
"body": "QuickFuzz is a grammar fuzzer powered by [QuickCheck](http://www.cse.chalmers.se/~rjmh/QuickCheck/), [Template Haskell](https://wiki.haskell.org/Template_Haskell) and specific libraries from Hackage to generate many complex file-formats like Jpeg, Png, Svg, Xml, Zip, Tar and more!. QuickFuzz is open-source (GPL3) and it can use other bug detection tools like [zzuf](http://caca.zoy.org/wiki/zzuf), [radamsa](https://github.com/aoh/radamsa), [honggfuzz](http://google.github.io/honggfuzz/) and [valgrind](http://valgrind.org).\r\n\r\n## **Bugs ~~lost and~~ found**\r\n\r\n* Firefox ([failed assert in gif loader](https://bugzilla.mozilla.org/show_bug.cgi?id=1210745), [CVE-2016-1933](https://www.mozilla.org/en-US/security/advisories/mfsa2016-02/), [CVE-2015-7194](https://www.mozilla.org/en-US/security/advisories/mfsa2015-128/), [CVE-2015-7216, CVE-2015-7217](https://www.mozilla.org/en-US/security/advisories/mfsa2015-143/))\r\n* VLC ([CVE-2016-3941](https://bugs.launchpad.net/ubuntu/+source/vlc/+bug/1533633))\r\n* Libxml2 ([CVE-2016-3627](http://seclists.org/oss-sec/2016/q1/682), [CVE-2016-4483](http://seclists.org/oss-sec/2016/q2/214))\r\n* Mxml ([CVE-2016-4570, CVE-2016-4571](http://www.openwall.com/lists/oss-security/2016/05/09/16))\r\n* Cairo ([CVE-2016-3190](http://seclists.org/oss-sec/2016/q1/676))\r\n* GraphicsMagick ( [CVE-2015-8808](http://seclists.org/oss-sec/2016/q1/288), [CVE-2016-2317, CVE-2016-2318](http://seclists.org/oss-sec/2016/q1/297) )\r\n* LibGD ([CVE-2016-6132](http://seclists.org/oss-sec/2016/q2/636))\r\n* Librsvg ([CVE-2015-7557, CVE-2015-7558](http://www.openwall.com/lists/oss-security/2015/12/21/5), [CVE-2016-4348](http://www.openwall.com/lists/oss-security/2016/04/28/7))\r\n* Gdk-Pixbuf ([CVE-2015-7552](https://bugzilla.suse.com/show_bug.cgi?id=958963), [CVE-2015-4491](https://www.mozilla.org/en-US/security/advisories/mfsa2015-88/), [CVE-2015-7674](http://www.openwall.com/lists/oss-security/2015/10/02/10), [CVE-2015-7673](http://www.openwall.com/lists/oss-security/2015/10/02/9), [CVE-2015-8875](http://seclists.org/oss-sec/2016/q2/355), undisclosed)\r\n* Mplayer ([CVE-2016-4352](http://www.openwall.com/lists/oss-security/2016/04/29/7), [lots of crashes](https://lists.mplayerhq.hu/pipermail/mplayer-dev-eng/2015-December/073241.html) [and more](http://www.openwall.com/lists/oss-security/2015/11/10/8))\r\n* Jasper ([CVE-2015-5203](https://bugzilla.redhat.com/show_bug.cgi?id=1254242))\r\n* Jq ([CVE-2016-4074](http://www.openwall.com/lists/oss-security/2016/04/24/4))\r\n* Jansson ([CVE-2016-4425](http://www.openwall.com/lists/oss-security/2016/05/02/1))\r\n* Unzip ([CVE-2015-7696, CVE-2015-7697](http://www.openwall.com/lists/oss-security/2015/10/11/5))\r\n* CPIO ([reads out-of-bound](http://seclists.org/oss-sec/2016/q1/440), [CVE-2016-2037](http://seclists.org/oss-sec/2016/q1/136))\r\n* GNU Tar ([out-of-bound read](http://www.openwall.com/lists/oss-security/2015/08/31/1))\r\n* Optipng ([CVE-2015-7802](http://www.openwall.com/lists/oss-security/2015/09/23/4), [CVE-2015-7801](https://bugzilla.redhat.com/show_bug.cgi?id=1264015))\r\n* Libtiff ([CVE-2015-7313](http://www.openwall.com/lists/oss-security/2015/09/21/7))\r\n* Busybox ([pointer misuse](http://www.openwall.com/lists/oss-security/2015/10/25/3))\r\n* Libarchive ([big allocation in tar handling](https://bugs.launchpad.net/ubuntu/+source/libarchive/+bug/1487020))\r\n\r\n## Quick introduction to QuickFuzz\r\n\r\nTo generate corrupted gifs to test giffix using QuickFuzz and zzuf:\r\n\r\n $ QuickFuzz Gif \"/usr/bin/giffix @@\" -a zzuf -t 25 -s 10\r\n *** Error in `/usr/bin/giffix': double free or corruption (out): 0x0000000000b44f80 ***\r\n zzuf[s=-1193471787,r=0.004:1e-06]: signal 6 (SIGABRT)\r\n *** Error in `/usr/bin/giffix': free(): invalid pointer: 0x0000000002565f80 ***\r\n zzuf[s=1436598283,r=0.004:1e-06]: signal 6 (SIGABRT)\r\n zzuf[s=88548751,r=0.004:1e-06]: signal 11 (SIGSEGV)\r\n +++ OK, passed 25 tests.\r\n\r\nIt looks like we re-discovered several files to trigger [CVE-2015-7555](https://bugzilla.redhat.com/show_bug.cgi?id=1290785) in a few seconds! QuickFuzz can also print the structure of the generated file that triggered a crash or abort in Haskell syntax. For instance:\r\n\r\n GifFile {\r\n gifHeader = GifHeader {gifVersion = GIF87a, gifScreenDescriptor = LogicalScreenDescriptor {screenWidth = 1, screenHeight = 0, backgroundIndex = 1, hasGlobalMap = True, colorResolution = 0, isColorTableSorted = True, colorTableSize = 1}, gifGlobalMap = }, \r\n gifImages = [(Just GraphicControlExtension {gceDisposalMethod = DisposalRestorePrevious, gceUserInputFlag = True, gceTransparentFlag = True, gceDelay = 1, gceTransparentColorIndex = 0},GifImage {imgDescriptor = ImageDescriptor {gDescPixelsFromLeft = 1, gDescPixelsFromTop = 1, gDescImageWidth = 0, gDescImageHeight = 1, gDescHasLocalMap = False, gDescIsInterlaced = False, gDescIsImgDescriptorSorted = False, gDescLocalColorTableSize = 0}, imgLocalPalette = Just , imgLzwRootSize = 0, imgData = \"\"})], \r\n gifLoopingBehaviour = LoopingForever\r\n }\r\n\r\n## List of file types to generate\r\n\r\n|**Images**|**Archives**|**Code**|**Others**|\r\n|------|------|------|------|\r\n|Bmp|Bzip|Css|Ogg|\r\n|Gif|CPIO|Dot|TrueType fonts|\r\n|Jpeg|Gzip|Html|Unicode text|\r\n|Png|Tar|Javascript|Wav|\r\n|Pnm|Zip|Xml|Regex|\r\n|Svg|\r\n|Tga|\r\n|Tiff|\r\n\r\n## Downloads\r\n\r\nPre-compiled and *upx* compressed binaries are available here:\r\n\r\n* [Linux x86](https://github.com/CIFASIS/QuickFuzz/releases/download/v0.1/QuickFuzz.x86)\r\n* [Linux x86_64](https://github.com/CIFASIS/QuickFuzz/releases/download/v0.1/QuickFuzz.x86_64)\r\n\r\nOtherwise QuickFuzz can be [easy compiled](https://github.com/CIFASIS/QuickFuzz#instalation) using [stack](http://docs.haskellstack.org/en/stable/README/#how-to-install).\r\n\r\n## Authors\r\n### The QuickFuzz team\r\n\r\n* Pablo **Buiras** ([Chalmers University of Technology](http://www.chalmers.se/en/Pages/default.aspx))\r\n* Martín **Ceresa** ([CIFASIS-Conicet](http://cifasis-conicet.gov.ar/))\r\n* Gustavo **Grieco** ([CIFASIS-Conicet](http://cifasis-conicet.gov.ar/) and [VERIMAG](http://www-verimag.imag.fr/?lang=en))\r\n\r\n### Students\r\n\r\n* Franco Costantini\r\n\r\n### Former Members\r\n\r\n* Martín **Escarrá** ([Universidad Nacional de Rosario](http://www.unr.edu.ar/))\r\n\r\n### **Acknowledgements**\r\n\r\n* [ayberkt](https://github.com/ayberkt) for the bug reports and pull requests.\r\n* A special thanks goes to all the developers from the packages who made possible QuickFuzz to generate several complex file-formats.",
4+
"body": "QuickFuzz is a grammar fuzzer powered by [QuickCheck](http://www.cse.chalmers.se/~rjmh/QuickCheck/), [Template Haskell](https://wiki.haskell.org/Template_Haskell) and specific libraries from Hackage to generate many complex file-formats like Jpeg, Png, Svg, Xml, Zip, Tar and more!. QuickFuzz is open-source (GPL3) and it can use other bug detection tools like [zzuf](http://caca.zoy.org/wiki/zzuf), [radamsa](https://github.com/aoh/radamsa), [honggfuzz](http://google.github.io/honggfuzz/) and [valgrind](http://valgrind.org).\r\n\r\n## News\r\n\r\n* An academic article on QuickFuzz will be presented on the Haskell Symposium 2016!\r\n\r\n## **Bugs ~~lost and~~ found**\r\n\r\n* Firefox ([failed assert in gif loader](https://bugzilla.mozilla.org/show_bug.cgi?id=1210745), [CVE-2016-1933](https://www.mozilla.org/en-US/security/advisories/mfsa2016-02/), [CVE-2015-7194](https://www.mozilla.org/en-US/security/advisories/mfsa2015-128/), [CVE-2015-7216, CVE-2015-7217](https://www.mozilla.org/en-US/security/advisories/mfsa2015-143/))\r\n* VLC ([CVE-2016-3941](https://bugs.launchpad.net/ubuntu/+source/vlc/+bug/1533633))\r\n* Libxml2 ([CVE-2016-3627](http://seclists.org/oss-sec/2016/q1/682), [CVE-2016-4483](http://seclists.org/oss-sec/2016/q2/214))\r\n* Mxml ([CVE-2016-4570, CVE-2016-4571](http://www.openwall.com/lists/oss-security/2016/05/09/16))\r\n* Cairo ([CVE-2016-3190](http://seclists.org/oss-sec/2016/q1/676))\r\n* GraphicsMagick ( [CVE-2015-8808](http://seclists.org/oss-sec/2016/q1/288), [CVE-2016-2317, CVE-2016-2318](http://seclists.org/oss-sec/2016/q1/297) )\r\n* LibGD ([CVE-2016-6132](http://seclists.org/oss-sec/2016/q2/636))\r\n* Librsvg ([CVE-2015-7557, CVE-2015-7558](http://www.openwall.com/lists/oss-security/2015/12/21/5), [CVE-2016-4348](http://www.openwall.com/lists/oss-security/2016/04/28/7))\r\n* Gdk-Pixbuf ([CVE-2015-7552](https://bugzilla.suse.com/show_bug.cgi?id=958963), [CVE-2015-4491](https://www.mozilla.org/en-US/security/advisories/mfsa2015-88/), [CVE-2015-7674](http://www.openwall.com/lists/oss-security/2015/10/02/10), [CVE-2015-7673](http://www.openwall.com/lists/oss-security/2015/10/02/9), [CVE-2015-8875](http://seclists.org/oss-sec/2016/q2/355), undisclosed)\r\n* Mplayer ([CVE-2016-4352](http://www.openwall.com/lists/oss-security/2016/04/29/7), [lots of crashes](https://lists.mplayerhq.hu/pipermail/mplayer-dev-eng/2015-December/073241.html) [and more](http://www.openwall.com/lists/oss-security/2015/11/10/8))\r\n* Jasper ([CVE-2015-5203](https://bugzilla.redhat.com/show_bug.cgi?id=1254242))\r\n* Jq ([CVE-2016-4074](http://www.openwall.com/lists/oss-security/2016/04/24/4))\r\n* Jansson ([CVE-2016-4425](http://www.openwall.com/lists/oss-security/2016/05/02/1))\r\n* Unzip ([CVE-2015-7696, CVE-2015-7697](http://www.openwall.com/lists/oss-security/2015/10/11/5))\r\n* CPIO ([reads out-of-bound](http://seclists.org/oss-sec/2016/q1/440), [CVE-2016-2037](http://seclists.org/oss-sec/2016/q1/136))\r\n* GNU Tar ([out-of-bound read](http://www.openwall.com/lists/oss-security/2015/08/31/1))\r\n* Optipng ([CVE-2015-7802](http://www.openwall.com/lists/oss-security/2015/09/23/4), [CVE-2015-7801](https://bugzilla.redhat.com/show_bug.cgi?id=1264015))\r\n* Libtiff ([CVE-2015-7313](http://www.openwall.com/lists/oss-security/2015/09/21/7))\r\n* Busybox ([pointer misuse](http://www.openwall.com/lists/oss-security/2015/10/25/3))\r\n* Libarchive ([big allocation in tar handling](https://bugs.launchpad.net/ubuntu/+source/libarchive/+bug/1487020))\r\n\r\n## Quick introduction to QuickFuzz\r\n\r\nTo generate corrupted gifs to test giffix using QuickFuzz and zzuf:\r\n\r\n $ QuickFuzz Gif \"/usr/bin/giffix @@\" -a zzuf -t 25 -s 10\r\n *** Error in `/usr/bin/giffix': double free or corruption (out): 0x0000000000b44f80 ***\r\n zzuf[s=-1193471787,r=0.004:1e-06]: signal 6 (SIGABRT)\r\n *** Error in `/usr/bin/giffix': free(): invalid pointer: 0x0000000002565f80 ***\r\n zzuf[s=1436598283,r=0.004:1e-06]: signal 6 (SIGABRT)\r\n zzuf[s=88548751,r=0.004:1e-06]: signal 11 (SIGSEGV)\r\n +++ OK, passed 25 tests.\r\n\r\nIt looks like we re-discovered several files to trigger [CVE-2015-7555](https://bugzilla.redhat.com/show_bug.cgi?id=1290785) in a few seconds! QuickFuzz can also print the structure of the generated file that triggered a crash or abort in Haskell syntax. For instance:\r\n\r\n GifFile {\r\n gifHeader = GifHeader {gifVersion = GIF87a, gifScreenDescriptor = LogicalScreenDescriptor {screenWidth = 1, screenHeight = 0, backgroundIndex = 1, hasGlobalMap = True, colorResolution = 0, isColorTableSorted = True, colorTableSize = 1}, gifGlobalMap = }, \r\n gifImages = [(Just GraphicControlExtension {gceDisposalMethod = DisposalRestorePrevious, gceUserInputFlag = True, gceTransparentFlag = True, gceDelay = 1, gceTransparentColorIndex = 0},GifImage {imgDescriptor = ImageDescriptor {gDescPixelsFromLeft = 1, gDescPixelsFromTop = 1, gDescImageWidth = 0, gDescImageHeight = 1, gDescHasLocalMap = False, gDescIsInterlaced = False, gDescIsImgDescriptorSorted = False, gDescLocalColorTableSize = 0}, imgLocalPalette = Just , imgLzwRootSize = 0, imgData = \"\"})], \r\n gifLoopingBehaviour = LoopingForever\r\n }\r\n\r\n## List of file types to generate\r\n\r\n|**Images**|**Archives**|**Code**|**Others**|\r\n|------|------|------|------|\r\n|Bmp|Bzip|Css|Ogg|\r\n|Gif|CPIO|Dot|TrueType fonts|\r\n|Jpeg|Gzip|Html|Unicode text|\r\n|Png|Tar|Javascript|Wav|\r\n|Pnm|Zip|Xml|Regex|\r\n|Svg|\r\n|Tga|\r\n|Tiff|\r\n\r\n## Downloads\r\n\r\nPre-compiled and compressed (bzexe) binaries are available here:\r\n\r\n* [Linux x86](https://github.com/CIFASIS/QuickFuzz/releases/download/v0.1/QuickFuzz.x86)\r\n* [Linux x86_64](https://github.com/CIFASIS/QuickFuzz/releases/download/v0.1/QuickFuzz.x86_64)\r\n\r\nOtherwise QuickFuzz can be [easy compiled](https://github.com/CIFASIS/QuickFuzz#instalation) using [stack](http://docs.haskellstack.org/en/stable/README/#how-to-install).\r\n\r\n## Authors\r\n### The QuickFuzz team\r\n\r\n* Pablo **Buiras** (Harvard University)\r\n* Martín **Ceresa** ([CIFASIS-Conicet](http://cifasis-conicet.gov.ar/))\r\n* Gustavo **Grieco** ([CIFASIS-Conicet](http://cifasis-conicet.gov.ar/) and [VERIMAG](http://www-verimag.imag.fr/?lang=en))\r\n\r\n### Students\r\n\r\n* Franco Costantini\r\n\r\n### Former Members\r\n\r\n* Martín **Escarrá** ([Universidad Nacional de Rosario](http://www.unr.edu.ar/))\r\n\r\n### **Acknowledgements**\r\n\r\n* [ayberkt](https://github.com/ayberkt) for the bug reports and pull requests.\r\n* A special thanks goes to all the developers from the packages who made possible QuickFuzz to generate several complex file-formats.",
55
"google": "",
66
"note": "Don't delete this file! It's used internally to help with page regeneration."
77
}

0 commit comments

Comments
 (0)