FINDING · DEPLOYMENT
The GFW's DNS packet injector (Injector 3, identified by TTL mirroring and zero IP ID) contained an out-of-bounds read vulnerability: due to missing label-length and null-terminator validation, malformed DNS requests caused the injector to copy adjacent stack memory into forged responses. Over three days in October 2023, researchers collected over 1 TB of data containing over 13 billion leaks, ~87.43% with non-duplicate content, including live Internet traffic transiting China's backbone and stack frames of the GFW's packet-handling processes.
From 2024-sakamoto-bleeding — Bleeding Wall: A Hematologic Examination on the Great Firewall · §3 Vulnerability · 2024 · Free and Open Communications on the Internet
Implications
- The GFW's DNS injector responds to malformed DNS queries containing blocked domains regardless of type/class fields — circumvention tools relying on DNS must account for this aggressive, format-tolerant matching behavior.
- The injector operates only on UDP port 53 (using RST injection for TCP DNS) — using DNS-over-TCP or DNS-over-HTTPS eliminates this injection vector entirely.
Tags
Extracted by claude-sonnet-4-6 — review before relying.