sate 2010 analysis aurélien delaitre, nist [email protected] october 1, 2010 the samate...

19
SATE 2010 Analysis Aurélien Delaitre, NIST [email protected] October 1, 2010 The SAMATE Project http://samate.nist.gov/

Upload: gary-austin

Post on 13-Jan-2016

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SATE 2010 Analysis Aurélien Delaitre, NIST aurelien.delaitre@nist.gov October 1, 2010 The SAMATE Project

SATE 2010 Analysis

Aurélien Delaitre, [email protected] 1, 2010

The SAMATE Projecthttp://samate.nist.gov/

Page 2: SATE 2010 Analysis Aurélien Delaitre, NIST aurelien.delaitre@nist.gov October 1, 2010 The SAMATE Project

Outline

What tools find

What people find– CVEs

– Manual analysis

Page 3: SATE 2010 Analysis Aurélien Delaitre, NIST aurelien.delaitre@nist.gov October 1, 2010 The SAMATE Project

Building on SATE 2009

SATE 2010

SATE 2009

SATE 2009

SATE 2010

Page 4: SATE 2010 Analysis Aurélien Delaitre, NIST aurelien.delaitre@nist.gov October 1, 2010 The SAMATE Project

Improving categories

True

Insignificant

SATE 2009

Security

Quality

Insignificant

SATE 2010

Page 5: SATE 2010 Analysis Aurélien Delaitre, NIST aurelien.delaitre@nist.gov October 1, 2010 The SAMATE Project

Improving the guidelines

45 lines → 314 lines

Considering weakness types

Better uniformity in evaluations

Page 6: SATE 2010 Analysis Aurélien Delaitre, NIST aurelien.delaitre@nist.gov October 1, 2010 The SAMATE Project

Decision process

Security

False

Insignificant

Unknown

Quality

Path ... Type...

Context ...

Bug...

Page 7: SATE 2010 Analysis Aurélien Delaitre, NIST aurelien.delaitre@nist.gov October 1, 2010 The SAMATE Project

Sampling

02468

101214161820

% analyzed

1 2 3 4 5

Severity

Warnings of each class of severity 1 - 4

Page 8: SATE 2010 Analysis Aurélien Delaitre, NIST aurelien.delaitre@nist.gov October 1, 2010 The SAMATE Project

Weakness categories

cmd_inj

api_abuse

sec_feat

race

buf

err_handl

num_err

quality

input_val

xss

info_leak

uncateg

time_state

encaps

1 10 100 1000 10000 100000

JavaC/C++

Page 9: SATE 2010 Analysis Aurélien Delaitre, NIST aurelien.delaitre@nist.gov October 1, 2010 The SAMATE Project

Quality and security related

buf

num_err

err_handl

quality

input_val

xss

encaps

JavaC/C++

Page 10: SATE 2010 Analysis Aurélien Delaitre, NIST aurelien.delaitre@nist.gov October 1, 2010 The SAMATE Project

Non-false overlap

Page 11: SATE 2010 Analysis Aurélien Delaitre, NIST aurelien.delaitre@nist.gov October 1, 2010 The SAMATE Project

CVEs

Key elements of the path for matching:

Blocks of code

Sink or upflow path elements

But not exhaustive

Page 12: SATE 2010 Analysis Aurélien Delaitre, NIST aurelien.delaitre@nist.gov October 1, 2010 The SAMATE Project

Example /* Dialect Index */

dialect = tvb_get_letohs(tvb, offset);

if (si->sip && si->sip->extra_info_type==SMB_EI_DIALECTS) {

dialects = si->sip->extra_info;

if (dialect <= dialects->num) {

dialect_name = dialects->name[dialect];

}

}

if (!dialect_name) {

dialect_name = "unknown";

}

Page 13: SATE 2010 Analysis Aurélien Delaitre, NIST aurelien.delaitre@nist.gov October 1, 2010 The SAMATE Project

Manual analysis

Dovecot for C

Pebble for Java

– Used a slightly later version

Page 14: SATE 2010 Analysis Aurélien Delaitre, NIST aurelien.delaitre@nist.gov October 1, 2010 The SAMATE Project

Dovecot

No remotely exploitable vulnerability found

Threatmodeling

Fuzzing

Codereview

Page 15: SATE 2010 Analysis Aurélien Delaitre, NIST aurelien.delaitre@nist.gov October 1, 2010 The SAMATE Project

Pebble

Several vulnerabilities found

Threatmodeling

Pen.test

Codereview

Page 16: SATE 2010 Analysis Aurélien Delaitre, NIST aurelien.delaitre@nist.gov October 1, 2010 The SAMATE Project

Tools ∩ humans

7

5

3

24

Pebble (10)

Tomcat (29)

Related warnings None

No human findings for Dovecot

No matches for Chrome and Wireshark

Page 17: SATE 2010 Analysis Aurélien Delaitre, NIST aurelien.delaitre@nist.gov October 1, 2010 The SAMATE Project

Interpretation

All weaknesses

CVEs

Tool findings

CVEs ∩ tool findings = ∅

Page 18: SATE 2010 Analysis Aurélien Delaitre, NIST aurelien.delaitre@nist.gov October 1, 2010 The SAMATE Project

InterpretationCVE descriptions ∩ tool findings = ∅

All weaknesses

CVEs

Tool findings

CVE descriptions

Page 19: SATE 2010 Analysis Aurélien Delaitre, NIST aurelien.delaitre@nist.gov October 1, 2010 The SAMATE Project

Questions