Buffer overflow and format string overflow vulnerabilities

被引:45
|
作者
Lhee, KS [1 ]
Chapin, SJ [1 ]
机构
[1] Syracuse Univ, Ctr Syst Assurance, Syracuse, NY 13210 USA
来源
SOFTWARE-PRACTICE & EXPERIENCE | 2003年 / 33卷 / 05期
关键词
buffer overflow; format string overflow; array and pointer range checking; Linux; ELF;
D O I
10.1002/spe.515
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Buffer overflow vulnerabilities are among the most widespread of security problems. Numerous incidents of buffer overflow attacks have been reported and many solutions have been proposed, but a solution that is both complete and highly practical is yet to be found. Another kind of vulnerability called format string overflow has recently been found and although not as widespread as buffer overflow, format string overflow attacks are no less dangerous. This article surveys representative techniques of exploiting buffer overflow and format string overflow vulnerabilities and their currently available defensive measures. We also describe our buffer overflow detection technique that range checks the referenced buffers at run-time. We augment executable files with the type information of automatic buffers (local variables and parameters of functions) and static buffers (global variables in the data/bss section) and maintain the sizes of allocated heap buffers in order to detect an actual occurrence of buffer overflow. We describe a simple implementation with which we currently protect vulnerable copy functions in the C library. Copyright (C) 2003 John Wiley Sons, Ltd.
引用
收藏
页码:423 / 460
页数:38
相关论文
共 50 条
  • [41] Analysis of Signature and Signature Free Buffer-overflow detection for gif and jpg format
    Pawar, Pankaj B.
    Nagle, Malti
    Kawadkar, Pankaj K.
    Ambare, Padmashree Kunthe
    2013 TENTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS (WOCN), 2013,
  • [42] Enforcement of architectural safety guards to deter malicious code attacks through buffer overflow vulnerabilities
    Choi, L
    Shin, Y
    ORGANIC AND PERVASIVE COMPUTING - ARCS 2004, 2004, 2981 : 47 - 60
  • [43] Buffer-overflow protection: The theory
    Piromsopa, Krerk
    Enbody, Richard J.
    2006 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY, 2006, : 454 - 458
  • [44] New mechanism for buffer overflow prevention
    Li, Cheng-Hung
    Luo, Chi-Wei
    Leu, Show-Wei
    Jan, Gene Eu
    IMECS 2006: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, 2006, : 481 - 486
  • [45] The Principle and Prevention of Windows Buffer Overflow
    Liu Feifei
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 1285 - 1288
  • [46] Classification of Buffer Overflow Vulnerability Monitors
    Shahriar, Hossain
    Zulkernine, Mohammad
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 519 - 524
  • [47] Efficient Buffer Overflow Detection on GPU
    Di, Bang
    Sun, Jianhua
    Chen, Hao
    Li, Dong
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2021, 32 (05) : 1161 - 1177
  • [48] A methodology for the automated identification of buffer overflow vulnerabilities in executable software without source-code
    Duraes, J
    Madeira, H
    DEPENDABLE COMPUTING, PROCEEDINGS, 2005, 3747 : 20 - 34
  • [49] Detecting Buffer-Overflow Vulnerabilities in Smart Grid Devices via Automatic Static Analysis
    Ying, Huan
    Zhang, Yanmiao
    Han, Lifang
    Cheng, Yushi
    Li, Jiyuan
    Ji, Xiaoyu
    Xu, Wenyuan
    PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 813 - 817
  • [50] Buffer overflow management in QoS switches
    Kesselman, A
    Lotker, Z
    Mansour, Y
    Patt-Shamir, B
    Schieber, G
    Sviridenko, M
    SIAM JOURNAL ON COMPUTING, 2004, 33 (03) : 563 - 583