{"id":3315,"date":"2012-06-07T11:58:21","date_gmt":"2012-06-07T10:58:21","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3315"},"modified":"2012-06-07T12:00:10","modified_gmt":"2012-06-07T11:00:10","slug":"cert-triage-tools-vulnerability-impact-assessment-tool","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2012\/06\/cert-triage-tools-vulnerability-impact-assessment-tool\/","title":{"rendered":"CERT Triage Tools – Vulnerability Impact Assessment Tool"},"content":{"rendered":"

The CERT Triage Tools can be used to assist software vendors and analysts in identifying the impact of defects discovered through techniques such as fuzz testing and prioritizing their remediation in the software development process. The CERT Triage Tools include a GNU Debugger (GDB) extension called “exploitable” that classifies Linux application bugs by severity and a wrapper script for batch execution.<\/p>\n

In 2009, Microsoft released a set of security extensions for the Windows debugger, including a command named !exploitable<\/a>, that provides automated crash analysis and security risk assessment for software that runs on the Windows platform. Subsequently, Apple released a tool called CrashWrangler (Apple Developer Connection account required) to perform similar analysis on crash logs for software that runs on the Mac OS X platform. In the course of our vulnerability discovery work in developing the CERT Basic Fuzzing Framework<\/a>, we noted the lack of such a tool for software that runs on the Linux platform. The CERT Triage Tools were developed to serve purposes similar to Microsoft’s !exploitable and Apple’s CrashWrangler on the Linux platform.<\/p>\n

Requirements<\/strong><\/p>\n