Exploring and Exploiting the SQLite: Finding More Bugs by Targeted Fuzzing

Abstract

SQLite is one of the most widely deployed database engines. Because of its huge number of users, it also attracted many vendors and researchers to find the vulnerabilities. For example, Google has run many structure-aware fuzzers and targeted fuzzers on its ClusterFuzz, but there are still many vulnerabilities left undiscovered.

Back in November 2018, we discovered 5 vulnerabilities in SQLite, called Magellan. After we used Magellan vulnerability to attack Google Home and Chrome, many new protective measures have been introduced into SQLite, especially WebSQL.

This year, we have found another 7 vulnerabilities and 3 bugs that some of them can chain together, bypass the Defense-In-Depth, and cause RCE in Chrome through WebSQL, or any SQLite binary with FTS3 and queries available. These (Eg. CVE-2019-13734, CVE-2019-13750, CVE-2019-13751, CVE-2019-13752, CVE-2019-13753) vulnerabilities are discovered through both manual audit and fuzzing.

After we reported all the vulnerabilities to Google & SQLite, we also committed our fuzzer to Google, named sqlite3_shadow_table_fuzzer. It is now running by ClusterFuzz, and what is exhilarating is that it has found 6 more new vulnerabilities or bugs in the first week and 3 more in the next week since it started fuzzing (chromium issue ID: 1028722, 1029002, 1029027, 1029210, 1029506, 1030709, 1035663, 1035710, 1037786). At present, the fuzzer is running on Clusterfuzzer, and multiple vulnerabilities have been continuously discovered.

In this talk, I’ll show you how I manually audit the code to find the weakest part and then explain why Google’s fuzzer didn’t find the vulnerabilities I found. I will also introduce my research on the effectiveness of fuzzing focused targets, through a series of manual audits to find out the inadequacies in the existing fuzzer and how we can optimize them to achieve wonderful results. Also, how to use every byte wisely so that researchers can find security problems with fewer attempts when they don’t have as many machines as ClusterFuzz.

LOCATION: TRACK 2

DATE: July 25, 2020

TIME: 02:00 PM - 03:00 PM (GMT +8)

Wenxiang Qian

Got a question for our speakers or just want to chat? Join us on Discord!