Buffer overflow and format string overflow vulnerabilities

被引:45
|
作者
Lhee, KS [1 ]
Chapin, SJ [1 ]
机构
[1] Syracuse Univ, Ctr Syst Assurance, Syracuse, NY 13210 USA
来源
SOFTWARE-PRACTICE & EXPERIENCE | 2003年 / 33卷 / 05期
关键词
buffer overflow; format string overflow; array and pointer range checking; Linux; ELF;
D O I
10.1002/spe.515
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Buffer overflow vulnerabilities are among the most widespread of security problems. Numerous incidents of buffer overflow attacks have been reported and many solutions have been proposed, but a solution that is both complete and highly practical is yet to be found. Another kind of vulnerability called format string overflow has recently been found and although not as widespread as buffer overflow, format string overflow attacks are no less dangerous. This article surveys representative techniques of exploiting buffer overflow and format string overflow vulnerabilities and their currently available defensive measures. We also describe our buffer overflow detection technique that range checks the referenced buffers at run-time. We augment executable files with the type information of automatic buffers (local variables and parameters of functions) and static buffers (global variables in the data/bss section) and maintain the sizes of allocated heap buffers in order to detect an actual occurrence of buffer overflow. We describe a simple implementation with which we currently protect vulnerable copy functions in the C library. Copyright (C) 2003 John Wiley Sons, Ltd.
引用
收藏
页码:423 / 460
页数:38
相关论文
共 50 条
  • [21] ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis
    Lili Xu
    Mingjie Xu
    Feng Li
    Wei Huo
    Cybersecurity, 3
  • [22] Buttercup: On network-based detection of polymorphic buffer overflow vulnerabilities
    Pasupulati, A
    Coit, J
    Levitt, K
    Wu, SF
    Li, SH
    Kuo, JC
    Fan, KP
    NOMS 2004: IEEE/IFIP NETWORK OPERATIONS AND MANAGMENT SYMPOSIUM: MANAGING NEXT GENERATION CONVERGENCE NETWORKS AND SERVICES, 2004, : 235 - 248
  • [23] SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities
    Chen, Gang
    Jin, Hai
    Zou, Deqing
    Zhou, Bing Bing
    Liang, Zhenkai
    Zheng, Weide
    Shi, Xuanhua
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2013, 10 (06) : 368 - 379
  • [24] Rule-Based Source Level Patching of Buffer Overflow Vulnerabilities
    Shahriar, Hossain
    Haddad, Hisham M.
    PROCEEDINGS OF THE 2013 10TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2013, : 627 - 632
  • [25] A Study of Overflow Vulnerabilities on GPUs
    Di, Bang
    Sun, Jianhua
    Chen, Hao
    NETWORK AND PARALLEL COMPUTING, 2016, 9966 : 103 - 115
  • [26] Method of integer overflow detection to avoid buffer overflow
    School of Computer Science and Engineering, Southeast University, Nanjing 211189, China
    不详
    J. Southeast Univ. Engl. Ed., 2009, 2 (219-223):
  • [27] Communication-Traffic-Assisted Mining and Exploitation of Buffer Overflow Vulnerabilities in ADASs
    Li, Yufeng
    Liu, Mengxiao
    Cao, Chenhong
    Li, Jiangtao
    FUTURE INTERNET, 2023, 15 (05):
  • [28] A comparative analysis of Buffer Overflow vulnerabilities in High-End IoT devices
    Calatayud, Blas Molina
    Meany, Liam
    2022 IEEE 12TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2022, : 694 - 701
  • [29] Auditing buffer overflow vulnerabilities using hybrid static-dynamic analysis
    Padmanabhuni, Bindu Madhavi
    Tan, Hee Beng Kuan
    IET SOFTWARE, 2016, 10 (02) : 54 - 61
  • [30] Characterizing Buffer Overflow Vulnerabilities in Large C/C plus plus Projects
    Pereira, Jose D'Abruzzo
    Ivaki, Naghmeh
    Vieira, Marco
    IEEE ACCESS, 2021, 9 : 142879 - 142892