Executive Summary:
Wallbleed is a memory disclosure vulnerability identified in the DNS injection subsystem of China’s Great Firewall. It allowed certain censorship middleboxes to inadvertently expose up to 125 bytes of internal memory through specially crafted DNS queries, providing insights into the internal architecture of the Great Firewall and the operational behaviors of censors.
Key Points:
- Vulnerability: Wallbleed is classified as a buffer over-read vulnerability.
- Effect: The vulnerability enables the exposure of up to 125 bytes of memory information during the censorship process.
- Insight: The findings offer a rare glimpse into the workings of the Great Firewall’s internal systems and censorship mechanisms.
- Authors: The study is authored by Shencha Fan, Jackson Sippe, Sakamoto San, Jade Sheffey, David Fifield, Amir Houmansadr, Elson Wedards, and Eric Wustrow.
- Event: The research was presented at the Network and Distributed System Security (NDSS) Symposium in 2025.
References:
- The full study can be accessed at the following link: Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China.
(Note: No specific keywords or additional quotes were provided in the content.)
12ft.io Link: https://12ft.io/https://gfw.report/publications/ndss25/en/
Archive.org Link: Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China
Original Link: https://gfw.report/publications/ndss25/en/
User Message: Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China
for more on see the post on bypassing methods