...
Wiki Markup |
---|
The above statement is evaluated at runtime allocating storage for {{s{}}}characters in stack memory. If a size argument supplied to VLAs is not a positive integer value of reasonable size, then the program may behave in an unexpected way. An attacker may be able to leverage this behavior to overwrite critical program data \[[Griffiths 06|http://felinemenace.org/papers/p63-0x0e_Shifting_the_Stack_Pointer.txt]\]. The programmer must ensure that size arguments to VLAs are valid and have not been corrupted as the result of an exceptional integer condition. |
Non-Compliant Example
In this example, a VLA of size s
is declared. In accordance with recommendation INT01-A. Use size_t for all integer values representing the size of an object, s
is of type size_t
as it is used to specify the size of an object. However, it is unclear whether or not the value of s
is a valid size argument. Depending on how VLAs are implemented s
may be interpreted as a negative value or a very large positive value. In either case, this may result in a security vulnerability.
Code Block |
---|
void func(size_t s) { int vla[s]; ... } ... func(size); ... |
Compliant Solution
Validate size arguments used in VLA declarations. The solution below ensures the size argument, s
, used to allocate vla
is in a valid range: 1 to a user defined constant.
Code Block |
---|
#define MAX_ARRAY 1024 void func(size_t s) { int vla[s]; ... } ... if (s < MAX_ARRAY && s != 0) { func(s); } else { /* Handle Error */ } ... |
References
Griffiths 06 Clutching at straws: When you can shift the stack pointer