Icufuzzer: Fuzzing Icu Library For Exploitable Bugs In Multiple Software

Kun Yang,Yuan Deng,Chao Zhang,Jianwei Zhuge,Hai-Xin Duan
DOI: https://doi.org/10.1007/978-3-319-99136-8_4
2018-01-01
Abstract:Software is usually built on top of shared libraries. Vulnerabilities that lie in those dependencies may have huge impact on multiple software. ICU (International Components for Unicode) is one of the most widely used common components in modern software, providing Unicode and Globalization support. ICU is used in a wide range of software from over 70 companies and organizations, including very popular software such as Chrome, Android, macOS, iOS, Windows 10, Edge, Firefox.In this paper, we proposed a fuzzing method to discover vulnerabilities in ICU library that are reachable from upper layer application software. We also built a prototype named ICUFuzzer to uncover triggerable bugs in browsers' JavaScript Engine, with which we have detected three zero-day vulnerabilities affecting popular browsers like Chrome, Safari and Firefox. According to our further analysis, one of the bugs can be exploited to leak sensitive memory informations to bypass mitigations like ASLR and PIE.
What problem does this paper attempt to address?