Buffer overflow and format string overflow vulnerabilities

被引:45
|
作者
Lhee, KS [1 ]
Chapin, SJ [1 ]
机构
[1] Syracuse Univ, Ctr Syst Assurance, Syracuse, NY 13210 USA
来源
SOFTWARE-PRACTICE & EXPERIENCE | 2003年 / 33卷 / 05期
关键词
buffer overflow; format string overflow; array and pointer range checking; Linux; ELF;
D O I
10.1002/spe.515
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Buffer overflow vulnerabilities are among the most widespread of security problems. Numerous incidents of buffer overflow attacks have been reported and many solutions have been proposed, but a solution that is both complete and highly practical is yet to be found. Another kind of vulnerability called format string overflow has recently been found and although not as widespread as buffer overflow, format string overflow attacks are no less dangerous. This article surveys representative techniques of exploiting buffer overflow and format string overflow vulnerabilities and their currently available defensive measures. We also describe our buffer overflow detection technique that range checks the referenced buffers at run-time. We augment executable files with the type information of automatic buffers (local variables and parameters of functions) and static buffers (global variables in the data/bss section) and maintain the sizes of allocated heap buffers in order to detect an actual occurrence of buffer overflow. We describe a simple implementation with which we currently protect vulnerable copy functions in the C library. Copyright (C) 2003 John Wiley Sons, Ltd.
引用
收藏
页码:423 / 460
页数:38
相关论文
共 50 条
  • [31] Auditing Buffer Overflow Vulnerabilities using Hybrid Static-Dynamic Analysis
    Padmanabhuni, Bindu Madhavi
    Tan, Hee Beng Kuan
    2014 IEEE 38TH ANNUAL INTERNATIONAL COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2014, : 394 - 399
  • [32] Buffer Overflow Vulnerability Detection based on Format-Matching on Source Level
    Wang, Xiaoyu
    Zhang, Zhao
    Wen, Qiaoyan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON LOGISTICS, ENGINEERING, MANAGEMENT AND COMPUTER SCIENCE, 2014, 101 : 298 - 301
  • [33] Taxonomy of C Overflow Vulnerabilities Attack
    Ahmad, Nurul Haszeli
    Aljunid, Syed Ahmad
    Ab Manan, Jamalul-lail
    SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 376 - +
  • [34] A Taxonomy of Buffer Overflow Characteristics
    Bishop, Matt
    Engle, Sophie
    Howard, Damien
    Whalen, Sean
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (03) : 305 - 317
  • [35] The Cost of Preventing a Buffer Overflow
    Gordonov, Anatoliy S.
    2014 ZONE 1 CONFERENCE OF THE AMERICAN SOCIETY FOR ENGINEERING EDUCATION (ASEE ZONE 1), 2014,
  • [36] RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow
    Wang Yong
    Gu Dawu
    Xu Jianping
    Wen Mi
    Deng Liwen
    CHINA COMMUNICATIONS, 2010, 7 (06) : 10 - 16
  • [37] Stack Overflow Fence: A Technique for Defending Against Buffer Overflow Attacks
    Madan, Bharat B.
    Phoha, Shashi
    Trivedi, Kishor S.
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (02): : 129 - 136
  • [38] Vulnerability scanning for buffer overflow
    Iyer, A
    Liebrock, LM
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 116 - 117
  • [39] Software Vulnerabilities by Example: A Fresh Look at the Buffer Overflow Problem-Bypassing SafeSEH
    Kimball, William B.
    Perugini, Saverio
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2012, 7 (01): : 1 - 13
  • [40] Research of buffer overflow vulnerabilities detection based on novel K-means clustering
    Cao, Laicheng
    Su, Xiangqian
    Wu, Youxiao
    Journal of Computational Information Systems, 2015, 11 (04): : 1453 - 1461