Sie sind auf Seite 1von 57

Source code security

I. Source code security Overview


II. Common mistakes: signed-unsigned, integer over /
under - flow...
III. Smashing the stack. Heap Overrun
IV. Array Indexing Errors
V. File naming / file working vulnerabilities
VI. Race condition. Multithread programming security.
VII. String function library vulnerability
VIII. DB access security - SQL Injection
IX. Protecting program code from reverse engineering.
Obfuscators.
X. Virtual machine / environment vulnerabilities : .NET
XI. Denial of service (DoS)
XII. Exam
Source code security
- overview
A. Source code security myth
B. Most frequent causes:
New programming technologies, partial tested
Unprepared application to be run in an
interconnected environment (World Wild Web !)
Input data quality; validation !!
Using unsafe function library, internally unsecure
DB access is usually an insecured distance access
C. Language dependency: strong / unsafe ratio;
see pointer vulnerability in C++
Source code security
- overview
D. Why don't write secure / reliable code ?
E. Tradeoff:
how much is robustness cost
insecurity cost (stake, probability !)
next improving cost
F. Machine dependency; difficult to build a
context; circumstances compounding
G. Open source code ...
Evolution of a Security
Exploit
1. Someone finds a bug.
2. Someone (usually the same)
writes a demonstrative exploit.
3. Someone standardizes the exploit.
4. Script kiddies can now use the
exploit to break in.
5. A worm can be written to
automate exploit.
Source code security
- overview
Microsoft Clip Art Gallery had a buffer
overrun issue causing random code
running.
File restoring function under Solaris
(ufrestore) allowed to a anonymous
user to become admin (root ).
Sort command in many like Unix
systems, including OSX from Apple,
allowed a denial of service (DoS)
vulnerability.
Common mistakes:
signed-
unsigned
bool SafeCopy(char* str, int size)
{
char buf[80];
if(size < sizeof(buf))
{
strcpy(buf, str); return true;
}
else return false;
}

What return the following call:

printf( "\n %s", SafeCopy(Safe copy ???",-2) ?


Yes": No!! );
Common mistakes:
integer
overflow
bool AllocateStructs (void** ppMem ,
unsigned short DimStruct, unsigned short NrElem)
{
unsigned short necessary_bytes;
necessary_bytes = DimStruct * NrElem;
*ppMem = malloc (necessary_bytes);
if(*ppMem == NULL) return false;
else return true;
}

unsigned short nrBytesAlloc = nr*sizeof(Product);


printf(" Allocated: %u bytes instead of %u !!!",
nrBytesAlloc, 10000*sizeof(produs) );
Common mistakes:
integer underflow
bool Allocate
(void** ppMem, unsigned short NrBytes)
{
NrBytes -=2; // could we save 2 B ?!
*ppMem = malloc(NrBytes );
if(*ppMem == NULL) return false;
else return true;
}

How many bytes allocates the call :


char *pZona; unsigned nrBytes=1;
Allocate((void**)&pZona, nrBytes );
Pointers and references
A. Declaring / using pointers
B. Memory leak; dinging pointer

void main()
{
int *aux = new int, **table = new int* [10];
int i;
for(i=0; i<10; i++)
{
*aux=i; table[i] = aux;
}
for(i=0; i<10; i++)
cout << *table[i]<<" ";
}
Pointers and references
Function pointers. Reconfiguring application at
runtime late binding
void func(const char* input)
{
char buf[10];
// with no parameters printf display stack content !!!!
printf("Stack: \n%p\n%p\n%p\n%p\n%p\n%p\n\n");
strcpy(buf, input); printf("%s\n", buf);
printf("Stack:\n%p\n%p\n%p\n%p\n%p\n%p\n\n");
}
void hack(void)
{ printf(Hacked program! \n");}
void main(int argc, char* argv[])
{
printf("Address of func = %p\n", func);
printf("Address of hack = %p\n", hack);
func(argv[1]);
}
Automatic / Static

#include <stdio.h>

void main( )
{
for( int i=1; i<4; i++)
{
static int j=1; int k=1;
printf("\n i=%d j=%d k=%d", i,j,k);
j++; k++;
}
getchar();
}
Buffer Overrun
Write more data than the buffer can hold
Example:
December 2008 attack on XML parser in
Internet Explorer 7 - see
http://isc.sans.org/diary.html?storyid=5458
Two major types:
Heap overrun
Stack overrun
Buffer Overrun
MMU
V P
I Y
R S
T I
CPU U C
A A
L L
read or write
(untranslated
)

Virtual address translation to physical memory


Buffer Overrun
prog1 virtual address
code data heap stack

OS OS OS heap
cod1 data2 heap1 data1cod2heap2Unused stack2 stack1
cod data & stacks

code data heap stack


prog2 virtual address
Virtual address translation to physical memory
#include <stdio.h>
#include <string.h> buffOver1.cpp

#define BUFSIZE 16
#define OVERSIZE 5

void main()
{
unsigned long diff;
char * buf1 = (char *) malloc(BUFSIZE);
char * buf2 = (char *) malloc(BUFSIZE);
diff = (unsigned long )buf2 - (unsigned long)buf1;
printf("buf1 = %p, buf2 = %p, diff = 0x%x bytes\n",
buf1, buf2, diff );

memset(buf2, 'A', BUFSIZE-1), buf2[BUFSIZE-1] = '\0'


printf("before overflow: buf2 = %s\n", buf2);
memset(buf1, 'B', (unsigned int )(diff + OVERSIZE));
printf("after overflow: buf2 = %s\n", buf2); getchar()
}
Buffer overrun version 1

buf2 buf1

stack

AAAAAAAAABB BB BBBBBBBBBBB
BB B B

oversize diff= buf2 - buf1


heap
buffOver2.cpp
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <errno.h>
#define BUFSIZE 16
#define ADDRLEN 4 /* address length */
void main()
{
unsigned long diff; static char buf[BUFSIZE] , *bufptr;

bufptr = buf, diff = (unsigned long)&bufptr - (unsigned long)buf;


// pointer to bufptr, as static, resides in heap
printf("bufptr (%p) = %p, buf = %p, diff = 0x%x (%d) bytes\n",
&bufptr, bufptr, buf, diff, diff);
// initially, both bufptr and buf point the same area

memset(buf, 'A', (unsigned int)(diff + ADDRLEN));


printf("bufptr (%p) = %p, buf = %p, diff = 0x%x (%d) bytes\n",
&bufptr, bufptr, buf, diff, diff); getchar();
// overwriting behind the area where the pointer is stored,
// the pointer will contain AAAA, as address !!!
}
Buffer overrun version 2

stack

AAA AAAAAAAAAAA AAAAAAAAAAA


A AA A

heap

bufptr diff = &bufptr - buf

buf
buffOver3.cpp (1)

#include <stdio.h>

#include <string.h>

#define BUFSIZE 16
#define ADDRLEN 4 /* # of bytes in an address */

void f1()
{ printf("\nGood"); }

void f2()
{ printf("\nBad"); }
buffOver3.cpp (2)
void main()
{
unsigned long diff;
static char buf[BUFSIZE]; static void(*bufptr)();
bufptr = f1; // well intented
diff = (unsigned long)&bufptr - (unsigned long)buf;
printf("bufptr(%p)=%p,buf=%p,diff=0x%x (%d) bytes\n"
&bufptr, bufptr, buf, diff, diff);
bufptr(); // right function call !
buf[diff]=0x41; buf[diff+1]=0x10;
buf[diff+2]=0x41; buf[diff+3]=0x00;
bufptr(); // diverted call !
printf("\nf2=---%p----\n", f2);
printf("bufptr (%p)= %p,buf=%p,diff=0x%x (%d)bytes\n"
&bufptr, bufptr, buf, diff, diff);
getchar();
}
Buffer overrun version 3
stack
bufptr
heap

f1 / f2 AAAAAAAAAAA AAAAAAAAAAA
AA A
diff = &bufptr - buf

buf

code

f1 f2
Stack Overrun
The single most exploited
vulnerability
The first worm, called the Morris
Worm, used a stack overrun in
Sendmail 1988
Stack / Heap

stack High
memory
adresses

Unused memory adresses

Heap

Program Image
Stack Overrun
A few things to understand:
The stack usually grows downwards.
The stack frame in C

function arguments

return address

base pointer

local automatic variables


Stack walking
public static int f1(int x) { int r = f2(x); return r + 1; }

public static int f2(int value) { int retval = value; return retval; }

main() { f1(1); }

f2 local variables
f2 stack
return address in f1
frame
f2 arguments for

f1 local variables
f1 stack
return address in main
frame
f1arguments
Stack walking
value pointed by str is copied onto the
stack
void func(char *str)
{
char buf[100];
strcpy(buf,str);
}
If a string longer than 99 bytes is copied
into buffer, it will overwrite adjacent stack
Stack grows this way
locations
buf BP ret Frame of the
addr str pointer calling function

Local variables Pointer toExecute code Arguments


previous at this address
frame after func()
finishes
Stack walking
value pointed by str is copied onto stack
void func(char *str)
Allocate automatic buffer
{ (only 100 B reserved on stack)
char buf[100];

strcpy(buf,str); Copy without capacity checking


}
If a string longer than 99 bytes is copied
into buffer, it will overwrite adjacent stack
locations
buf
overflow BP str pointer Frame of the
calling function

This part will be interpreted


as return address!
Stack
void function(int a, int b, int c) phrack3.cpp
{
char buffer1[5]="ABCD";
char buffer2[10]="123456789";
char *ret;

ret = buffer1 + 20; // point where return adress is located


(*ret) += 8;
// modify to back in main, further (avoiding assignment)
buffer1[0]='A';
}

void main()
{
int x; x = 0; function(1,2,3);
x = 1;
printf("%d\n",x); getchar();
}
Stack
void function(char *param1, int b, int c)
phrack4.cpp
{
char buffer1[5]="ABCD"; char buffer2[10]="123456789";
char *ret; ret = buffer1 + 20; // address of return address
strncpy(ret,param1,4);//put f2 as return address !
buffer1[0]='a'; // used as breakpoint
}

void f2() { printf("\nHack"); getchar(); exit(1); }

void main()
{
int x=0; char s[4]={0xdb,0x11,0x41,0x00}; // f2 address
printf("Address of f2:%p\n",f2); // to know it later ...
function(s,2,3); // go to bring the address of f2;
x = 1;
printf("%d\n",x); getchar();
}
Stack / Heap
#include <stdio.h>
int f( char *s1,char * s2) testDebugger.cp
p
{ char text[21];
text[0]='A'; text[1]='B'; text[2]='C';text[3]='D';
text[16]='P';text[17]='Q'; text[18]='R';
text[19]='S';text[20]='T';
// char text[21]="ABCDEFGHIJKLMNOPQRST";
int y=5;
return y;
}
void main( )
{
int x;
char *a="AAAAAAAAAAAAAAAAAAAAAAAA",
*b="BBBBBBBBBBBBBBBBBBB";
f(a,b);
x=1; getchar();
}
arrayIndex.cpp
int* IntVector; // global pointer

void Attack(void)
{
printf("\nAttention! Hack...\n");
getchar(); // look at ...
exit(1); // no traces
}

void WriteAt(unsigned long index, unsigned long whatToWrite)


{
char buffer1[5]="ABCD";
printf("\nWrite memory at : %p with %p",
&(IntVector[index]), whatToWrite);

IntVector[index] = whatToWrite;
buffer1[0]='A';
}
bool AllocVector(int nElements)
{
IntVector = (int*)malloc( sizeof(int)* nElements );
printf("Address of IntVector: %d\n", IntVector);
if(IntVector == NULL) return false;
else return true;
}
void main(int argc, char* argv[]) arrayIndex.cpp
{
unsigned long index=0, adrAttack=0;
int stack = 0x0012FE6C+4; printf("Address of return address: %p\n",
printf("Address of Attack function: %p ( decimal %d )\n", Attack, Atta

//Allocate a vector; 64 KB are enough ...


if(!AllocVector(0xffff))
{
printf("Allocation failure !\n");
}

index = (stack + 0x100000000 -(int)IntVector ) /4;


adrAttack = (int)Attack;
// intialize as decimal, avoiding litle endian

WriteAt(index, adrAttack); // hit far from ...


getchar();;
}
Preventing execution of untrusted
code
Digitally signed all code; expensive!
Mark all writeable memory locations as
non-executable
Example: Microsofts Data Execution
Prevention (DEP); this will block (almost) all
code injection exploits
Mark stack as non-executable (marking stack segment
as non-executable exist for Linux, Solaris, OpenBSD. But
LISP interpreters? Variable format compilers? )
Preventing Buffer Overrun
Use safe programming languages ( Java ?!)
What about legacy C code?
Randomize stack location
Run-time checking of array and buffer bounds
StackGuard
Encrypt return address on stack by XOR-ing with
random string; decrypt failure; encrypt all
pointers:
PointGuard
Ensure that all control transfers are into a
trusted, approved code image
LibSafe
Run-Time Checking:
StackGuard
Array terminator canary: \0, newline, linefeed,
EOF; string functions like strcpy wont copy beyond
\0 !
Insert random value canary string in stack
frames; any overflow will damage the canary too
Verify their integrity prior to return in caller

ret
canary BP addr Frame of the Top of
automatic calling function
stack

Local variables Pointer to Return


previous execution to
frame this address

Attacker cant guess what the value of canary will


be
Run-Time Checking:
StackGuard
8% performance penalty for Apache Web
server
StackGuard requires code recompiling
StackGuard can be defeated!
Phrack Magazine article ( Bulba and Kil3r)

Defeating StackGuard
Suppose program contains strcpy(dst,src) where attacker controls both dst and src
Example: dst is a local pointer variable

src dst canary BP ret


addr

Return execution to
this address

BadPointer, attack code &RET canary BP ret


addr
Overwrite destination of strcpy with RET position strcpy will copy
BadPointer here
PointGuard
Encrypt all pointers while in memory
Generate a random key at execution time
Each pointer is XORed with this key when
loaded from memory to registers or stored
back into memory
Premise: pointers cannot be overflown while
in registers
Attacker cannot predict the target programs
key
Even if pointer is overwritten, after XORing
with key it will dereference to a random
memory address
Normal Pointer
Dereference [Cowan]
RegAdr
1. Fetch pointer value 2. Access data referenced by pointer

Pointer
Memory 0x1234 Data

0x1234

RegAdr
2. Access attack code referenced
by corrupted pointer
1. Fetch pointer value

Corrupted pointer
Attack
Memory 0x1234
0x1340
Data
code

0x1234 0x1340
PointGuard Dereference
[Cowan]
CPU
0x1234
1. Fetch pointer 2. Access data referenced by pointer
value Decrypt

Encrypted pointer
Memory 0x7239 Data

0x1234

Decrypts to
random value
CPU
2. Access random address;
0x9786 segmentation fault and crash
1. Fetch pointer
value Decrypt

Corrupted pointer
Attack
Memory 0x7239
0x1340
Data
code

0x1234 0x1340 0x9786


PointGuard Issues
Performance penalty ( pointer
dereferences are very frequent)
Compiler issues
Must encrypt and decrypt only pointers
If compiler spills registers, un-encrypted
pointer values end up in memory and can be
overwritten
Attacker should not be able to modify the
key
Store key in its own non-writable memory page
Point Guard-ed code doesnt mix well with
normal code
Run-Time Checking:
LibSafe
Dynamically loaded library
Intercepts unsafe calls
/strcpy(dst,src)/
Checks if there is sufficient space in
current stack frame
If | frame-pointer dest | >
strlen(src) top
BP ret-addr dst src buf BP ret-addr of
does strcpy; else terminates application
stack

libsafe main
Heap Overrun
Heap Overruns Until 2002
Analyze the heap and search for
convenient pointers
Exploit code highly dependent on exact
program state (frame structure)
Heap Overrun
Heap Overruns after 2002
Management of the individual
allocation blocks is done with a data
structure.
The pointers for that data structure are
maintained in the same area as the heap
Writing past the end of a buffer change
this structure.
When an application frees memory, free
heap sections are merged
an attacker can cause arbitrary values to
be written to arbitrary locations!
Race Condition
a programming error in a multitask
system when the system's work depends
on the order in which code sections are
executed
several threads of a multithread
application try to simultaneously get
access to the data, meanwhile at least
one thread performs saving.
See THERAC-25 ACCIDENTS at http
://www.cas.mcmaster.ca/%
7Ecs3se3/htm/therac.htm
Race Condition
a process has its own memory
space, its own set of variables, its own
stack and heap
processes are an architectural
construct.
One process could spawn another
process, but afterwards the two
processes become more or less
independently
Race Condition
all threads within a process share the
same state and same memory space,
and can communicate with each other
directly
a thread is a coding construct
a separate stream of execution that
takes place simultaneously with and
independently of everything else that
might be happening
Race Condition
cooperative threading that requires a
thread to explicitly yield control before
other
preemptive threading in which the
virtual machine guarantees that all threads
of the same priority get time in which to
run

53_RaceConditions_Thread
55_ControllingRaceCondition
raceCondition.c
s

public void Process()


{
Thread worker1 = new Thread(Work1);
Thread worker2 = new Thread(Work2);
worker1.Start(); worker2.Start();
Thread.Sleep(2500); Console.WriteLine(result);
}
void Work1()
{
int r = rndm.Next(2000);
Thread.Sleep(r); Console.WriteLine("One " +r);
result = 1;
}
void Work2()
{
int r = rndm.Next(2000);
Thread.Sleep(r); Console.WriteLine("Two " +r);
result = 2;
}
Common mistakes:
naming
problem
Multiple ways of naming lots of things

Canonicalization Conversion to a
single, standard name

Files
/x/data or
/y/z/../../x/data
/y/z/%2e%2e/x/data
links
Others ( DNS names, IP addresses, etc.)
Common mistakes:
file naming
problem
8.3 standard: FAT32 generate a name in 8.3 format for long
named file ( Windows 16 bits need access this kind of file too
Calcul02Buget.xls --------- CALCUL~1.XLS
Calcul03Buget.xls --------- CALCUL~2.XLS

private static string[] FisiereSensibile =


{ "Calcul02Buget.xls", "PlanFinanciar.Doc" };

private static bool permiteAcces(string sir, string[] lista)


{
foreach (string s in lista)
if (s == sir) return false;
return true;
}
Common mistakes:
file naming
problem
Processing file name before accesing file:
eliminate blanks and \
eliminate . when repeatly apears in file name
file names are insensitive case

The problem: many, many names


come in the same short name; it is
difficult to restrict access to some
files
How can we exploit ?
Common mistakes:
Temporary file
manipulation
Most common case - creating a

temporary file in a known location


and accesible to an attacker.
Allows bypassing of the security
model, changing internal program
data structures and, in some
cases, arbitrary code execution
#include <stdio.h> Memory allocation
#include <stdlib.h>

void main()
{
char * a, *c; void *b;

a = (char*)malloc(16); *a= 'x';


b = malloc(16);
fprintf(stderr, "a = %p | b = %p\n", a, b);

a = (char*)realloc(a, 32); fprintf(stderr, "a = %p | b = %p\n", a,

c = (char*)malloc(16); // first fit; old a-place ?!


fprintf(stderr, "a = %p | b = %p | c = %p\n", a, b, c);
printf("\n\n c = \'%c\'",*c); // old area was initialized ?
free(a); free(b); free(c);
getchar();
}
Pseudo-random numbers
generation
- random memory allocation
- cryptographic key generation
#include <stdlib.h>
#include <stdio.h>
#include <time.h>
int main( void )
{
int i;
srand( (unsigned)time(0 ) );
for( i = 0; i < 10;i++ )
printf( " %6d\n", rand() );
getchar();
}
time(NULL) returns the current time, as
measured by number of seconds since Jan 1,
1970.
it is highly predictable (3600*24*365 =
31536000 ~ 2 exp(25) seconds / year
if the number is used to generate a
cryptographic key, it is not hard to try each
one of them and try to decrypt the message (in
terms of minutes, for a modern computer)
1995, it was discovered that Netscape
browsers generated SSL session keys
1995, the XWindows magic cookie
authentication method
Kerberos was similarly flawed and keys were
guessable in seconds

Das könnte Ihnen auch gefallen