Buffer overflow and format string overflow vulnerabilities

被引:45
|
作者
Lhee, KS [1 ]
Chapin, SJ [1 ]
机构
[1] Syracuse Univ, Ctr Syst Assurance, Syracuse, NY 13210 USA
来源
SOFTWARE-PRACTICE & EXPERIENCE | 2003年 / 33卷 / 05期
关键词
buffer overflow; format string overflow; array and pointer range checking; Linux; ELF;
D O I
10.1002/spe.515
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Buffer overflow vulnerabilities are among the most widespread of security problems. Numerous incidents of buffer overflow attacks have been reported and many solutions have been proposed, but a solution that is both complete and highly practical is yet to be found. Another kind of vulnerability called format string overflow has recently been found and although not as widespread as buffer overflow, format string overflow attacks are no less dangerous. This article surveys representative techniques of exploiting buffer overflow and format string overflow vulnerabilities and their currently available defensive measures. We also describe our buffer overflow detection technique that range checks the referenced buffers at run-time. We augment executable files with the type information of automatic buffers (local variables and parameters of functions) and static buffers (global variables in the data/bss section) and maintain the sizes of allocated heap buffers in order to detect an actual occurrence of buffer overflow. We describe a simple implementation with which we currently protect vulnerable copy functions in the C library. Copyright (C) 2003 John Wiley Sons, Ltd.
引用
收藏
页码:423 / 460
页数:38
相关论文
共 50 条
  • [1] PwnMaster: Automatic Buffer Overflow and Format String Vulnerability Detection and Exploitation
    Petrean, Florin
    Colesa, Adrian
    2024 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION, QUALITY AND TESTING, ROBOTICS, AQTR, 2024, : 105 - 109
  • [2] Precisely detecting buffer overflow vulnerabilities
    Wang, Lei
    Li, Ji
    Li, Bo-Yang
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2008, 36 (11): : 2200 - 2204
  • [3] Defending against Buffer-Overflow Vulnerabilities
    Padmanabhuni, Bindu Madhavi
    Tan, Hee Beng Kuan
    COMPUTER, 2011, 44 (11) : 53 - 60
  • [4] A Combinatorial Approach to Detecting Buffer Overflow Vulnerabilities
    Wang, Wenhua
    Lei, Yu
    Liu, Donggang
    Kung, David
    Csallner, Christoph
    Zhang, Dazhi
    Kacker, Raghu
    Kuhn, Rick
    2011 IEEE/IFIP 41ST INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2011, : 269 - 278
  • [5] ASSESSING TEST SUITES FOR BUFFER OVERFLOW VULNERABILITIES
    Shahriar, Hossain
    Zulkernine, Mohammad
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2010, 20 (01) : 73 - 101
  • [6] Buffer overflow vulnerabilities in CUDA: a preliminary analysis
    Miele, Andrea
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2016, 12 (02) : 113 - 120
  • [7] Automatic Exploit Generation for Buffer Overflow Vulnerabilities
    Xu, Luhang
    Jia, Weixi
    Dong, Wei
    Li, Yongjun
    2018 IEEE 18TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2018, : 463 - 468
  • [8] Statically detecting likely buffer overflow vulnerabilities
    Larochelle, D
    Evans, D
    USENIX ASSOCIATION PROCEEDINGS OF THE 10TH USENIX SECURITY SYMPOSIUM, 2001, : 177 - 189
  • [9] Static analysis method for detecting buffer overflow vulnerabilities
    Puchkov, FM
    Shapchenko, KA
    PROGRAMMING AND COMPUTER SOFTWARE, 2005, 31 (04) : 179 - 189
  • [10] PointGuard™:: Protecting pointers from buffer overflow vulnerabilities
    Cowan, C
    Beattie, S
    Johansen, J
    Wagle, P
    USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, 2003, : 91 - 104