FINDING · DEPLOYMENT
Wallbleed was a buffer over-read in the GFW's DNS injection subsystem that caused middleboxes to append up to 125 bytes of their own process memory to forged DNS responses. The bug persisted for at least two years (confirmed from October 2021); the GFW issued an incorrect partial patch in November 2023 (Wallbleed v2 remained exploitable) and fully patched it in March 2024. Over 5.1 billion Wallbleed responses were collected during continuous measurement, and an IPv4-wide scan found 242 million IP addresses across 381 autonomous systems receiving Wallbleed-injected responses — including some traffic whose source and destination were both outside China, due to routing through China's network border.
From 2025-fan-wallbleed — Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China · §1–§3, §7 · 2025 · NDSS
Implications
- GFW DNS injection devices are Linux x86_64 userspace processes with ASLR enabled; they run as a fleet of middleboxes at China's network border, not as kernel modules — inform threat models accordingly.
- DNS-over-HTTPS or DNS-over-TLS fully bypasses GFW DNS injection; plain UDP DNS queries to any destination IP in China will be intercepted.
Tags
Extracted by claude-sonnet-4-6 — review before relying.