Buffer overflow and format string overflow vulnerabilities

被引:45
|
作者
Lhee, KS [1 ]
Chapin, SJ [1 ]
机构
[1] Syracuse Univ, Ctr Syst Assurance, Syracuse, NY 13210 USA
来源
SOFTWARE-PRACTICE & EXPERIENCE | 2003年 / 33卷 / 05期
关键词
buffer overflow; format string overflow; array and pointer range checking; Linux; ELF;
D O I
10.1002/spe.515
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Buffer overflow vulnerabilities are among the most widespread of security problems. Numerous incidents of buffer overflow attacks have been reported and many solutions have been proposed, but a solution that is both complete and highly practical is yet to be found. Another kind of vulnerability called format string overflow has recently been found and although not as widespread as buffer overflow, format string overflow attacks are no less dangerous. This article surveys representative techniques of exploiting buffer overflow and format string overflow vulnerabilities and their currently available defensive measures. We also describe our buffer overflow detection technique that range checks the referenced buffers at run-time. We augment executable files with the type information of automatic buffers (local variables and parameters of functions) and static buffers (global variables in the data/bss section) and maintain the sizes of allocated heap buffers in order to detect an actual occurrence of buffer overflow. We describe a simple implementation with which we currently protect vulnerable copy functions in the C library. Copyright (C) 2003 John Wiley Sons, Ltd.
引用
收藏
页码:423 / 460
页数:38
相关论文
共 50 条
  • [11] BovInspector: Automatic Inspection and Repair of Buffer Overflow Vulnerabilities
    Gao, Fengjuan
    Wang, Linzhang
    Li, Xuandong
    2016 31ST IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2016, : 786 - 791
  • [12] Automated exploit generation for stack buffer overflow vulnerabilities
    V. A. Padaryan
    V. V. Kaushan
    A. N. Fedotov
    Programming and Computer Software, 2015, 41 : 373 - 380
  • [13] Automated exploit generation for stack buffer overflow vulnerabilities
    Padaryan, V. A.
    Kaushan, V. V.
    Fedotov, A. N.
    PROGRAMMING AND COMPUTER SOFTWARE, 2015, 41 (06) : 373 - 380
  • [14] Static Analysis Method for Detecting Buffer Overflow Vulnerabilities
    F. M. Puchkov
    K. A. Shapchenko
    Programming and Computer Software, 2005, 31 : 179 - 189
  • [15] Exploiting Buffer Overflow Vulnerabilities in Software Defined Radios
    Hitefield, S. D.
    Fowler, M.
    Clancy, T. Charles
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1921 - 1927
  • [16] HackSim: An automation of penetration testing for remote buffer overflow vulnerabilities
    Kwon, OH
    Lee, SM
    Lee, H
    Kim, J
    Kim, SC
    Nam, GW
    Park, JG
    INFORMATION NETWORKING: CONVERGENCE IN BROADBAND AND MOBILE NETWORKING, 2005, 3391 : 652 - 661
  • [17] Method for precisely detecting buffer overflow vulnerabilities in C programs
    School of Computer Science and Technology, Beijing University of Aeronautics and Astronautics, Beijing 100083, China
    Beijing Hangkong Hangtian Daxue Xuebao, 2008, 3 (319-322): : 319 - 322
  • [18] Assisting in Auditing of Buffer Overflow Vulnerabilities via Machine Learning
    Meng, Qingkun
    Feng, Chao
    Zhang, Bin
    Tang, Chaojing
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2017, 2017
  • [19] BUFFER OVERFLOW
    Spruth, W. G.
    COMPUTER, 2012, 45 (08) : 7 - 7
  • [20] ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis
    Xu, Lili
    Xu, Mingjie
    Li, Feng
    Huo, Wei
    CYBERSECURITY, 2020, 3 (01)