FINDING · DEPLOYMENT

Wallbleed was a buffer over-read in the GFW's DNS injection subsystem that caused middleboxes to append up to 125 bytes of their own process memory to forged DNS responses. The bug persisted for at least two years (confirmed from October 2021); the GFW issued an incorrect partial patch in November 2023 (Wallbleed v2 remained exploitable) and fully patched it in March 2024. Over 5.1 billion Wallbleed responses were collected during continuous measurement, and an IPv4-wide scan found 242 million IP addresses across 381 autonomous systems receiving Wallbleed-injected responses — including some traffic whose source and destination were both outside China, due to routing through China's network border.

From 2025-fan-wallbleedWallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China · §1–§3, §7 · 2025 · NDSS

Implications

Tags

censors
cn
techniques
dns-poisoningpacket-injection

Extracted by claude-sonnet-4-6 — review before relying.