Buffer Overflow and Format String Overflow Vulnerabilities

Publication Year:
2002
Usage 4631
Downloads 4393
Abstract Views 238
Repository URL:
https://surface.syr.edu/eecs/96
Author(s):
Lhee, Kyung-suk; Chapin, Steve J.
Tags:
Buffer overflow; format string overflow; array and pointer range checking; Linux; ELF; Computer Sciences
article description
This article surveys representative techniques of exploiting buffer overflow and format string overflow vulnerabilities and their currently available defensive measures. We also describe our buffer overflow detection technique that range checks the referenced buffers at run time. We augment executable files with type information of automatic buffers (local variables and parameters of functions) and static buffers (global variables in the data/bss section), and maintain the sizes of allocated heap buffers in order to detect an actual occurrence of buffer overflow. We describe a simple implementation with which we currently protect vulnerable copy functions in the C library.