C library functions that make changes to arrays or objects usually take at least two arguments: a pointer to the array or object and an integer indicating the number of elements or bytes to be manipulated. If the arguments are supplied improperly during such a function call, the function may cause the pointer to not point to the object at all or to point past the end of the object, leading to undefined behavior.
Definitions
Wiki Markup |
---|
According to N1579The C Secure Coding Rules Draft Technical Specification \[1SD:ISO/IEC 2011\] defines the following terms: |
Given an integer expression E, the derived type
T
of E is determined as follows:,
- if E is a
sizeof
expression;
- then
T
is the type of the operand of the expressioninteger
- ,
- otherwise, if E is an
;
- identifier, then
T
is the derived type of the expression last used to store a value in E;
- ,
- otherwise, if the derived type of each of E's subexpressions is the same, then
T
is that type
- ,
- otherwise, the derived type is an unspecified character type compatible with any of
char
,signed char
, andunsigned char
.EXAMPLE For the following declarations:
Code Block
lang c double a[40]; size_t n0 = sizeof (int); size_t n1 = 256; size_t n2 = sizeof a / sizeof (*a);
The derived type of
n0
isint
, and the derived type ofn1
andn2
is a (hypothetical) unspecified character type that is compatible with any ofchar
,signed char
, andunsigned char
.
Consider the following code:
...
The derived type for c1
and c2
is int
, because both subexpressions have the same type. The derived type for c3
is an unspecified character type compatible with any of char
, signed char
, and unsigned char
.
Expresses either the size of an object with an effective type, or the number of bytes allocated for such an object.
For an object with an effective type
T
the effective size of the object is the result of thesizeof(T)
expression. For an object with no effective type (for example, an object for which space has just been allocated by a call tomalloc(N)
), the effective size is the number of bytes allocated for it (that is,N
).EXAMPLE 1 The effective size of
*p
refers to the effective size of the object or space referenced byp
minus the offset ofp
from the beginning of the space or object, respectively.EXAMPLE 2 For the following declarations
Code Block
lang c int a[5]; void *p = a + 2;
the effective size of
*p
is equal tosizeof(a - 2) * sizeof(*a)
, or 12 whensizeof(int)
is 4.
The effective size of a pointer is the size of the object to which it points.
...
In this example, the effective type of p
is char
. The type of q
's type is not declared, but it is later assigned obj
. The effective type of q
is therefore equal to the effective type of obj
.
Standard Library Functions
Following is an incomplete list of C library functions to which this rule applies:
| |
| |
| | |
|
| |
| |
| | |
|
| | |
|
| | |
*Both functions take more than one size_t
argument. In such cases, the compliant code must be changed according to consistent with the purpose of these arguments. For example, in the case of fread()
:
Code Block |
---|
size_t fread(void *ptr, size_t size, size_t count, FILE *stream) |
the programmer should make sure the memory block to which ptr
points is of must ensure that the object referenced by ptr
is at least (size * count
) bytes.
Description
To guarantee that a library function does not construct an out-of-bounds pointer, programmers must heed the following rules when using functions that operate on pointed-to regions. These rules assume that func
is a function, p
and q
are pointers, and n
is an integer.
- For calls of the form
func(p,n)
, the value ofn
should not be greater than the effective size of the pointer. In situations wheren
is an expression, the effective type of the pointer should be compatible with either the derived type ofn
or unsigned char. - For calls of the form
func(p,q,n)
, the value ofn
should not be greater than the effective size of any of the two pointers (p
andq
). The effective type ofp
should be compatible with the derived type ofn
orunsigned char
whenn
is an expression. Similarly, the effective type ofp
should be compatible with the effective type ofq
orunsigned char
. - For any expression E of the form
T* p = func(n)
, the value ofn
should not be less thansizeof(T)
. Also, the effective type ofT
should be compatible with either the derived type ofn
orunsigned char
.
Noncompliant Code Example
This noncompliant code example assigns a value greater than the size of available memory to n
, which is then passed to memset()
.
Code Block | ||
---|---|---|
| ||
void f1(size_t nchars) { char *p = (char *)malloc(nchars); const size_t n = nchars + 1; memset(p, 0, n); /* ... */ } |
Compliant Solution
This compliant solution ensures that the value of n
is not greater than the size of the dynamic memory pointed to by the pointer p
:
Code Block | ||
---|---|---|
| ||
void f1(size_t nchars, size_t val) { char *p = (char *)malloc(nchars); const size_t n = val; if (nchars < n) { /* Handle Error */ } else { memset(p, 0, n); } /* ... */ } |
Noncompliant Code Example
Wiki Markup |
---|
In this noncompliant code example, the effective type of {{\*p}} is {{float}}, and the derived type of the expression {{n}} is {{int}}. This is calculated using the first rule from N1579's \[SD:1\] definition of derived types (see Definitions section). Because {{n}} contains the result of a {{sizeof}} expression, its derived type is equal to the type of the operand, which is {{int}}. |
Code Block | ||
---|---|---|
| ||
void f2() {
const size_t ARR_SIZE = 4;
float a[ARR_SIZE];
const size_t n = sizeof(int) * ARR_SIZE;
void *p = a;
memset(p, 0, n);
/* ... */
}
|
Note: While still noncompliant, this code will have no ill effects on architectures where sizeof(int)
is equal to sizeof(float)
.
Compliant Solution
In this compliant solution, the derived type of n
is also float
.
Code Block | ||
---|---|---|
| ||
void f2() { const size_t ARR_SIZE = 4; float a[ARR_SIZE]; const size_t n = sizeof(float) * ARR_SIZE; void *p = a; memset(p, 0, n); /* ... */ } |
Noncompliant Code Example
In this noncompliant code example, the size of n
could be greater than the size of *p
. Also, the effective type of *p
(int
) is different than the effective type of *q
(float
).
...
Note: While still noncompliant, this code will have no ill effects on architectures does not constitute a vulnerability on implementations where sizeof(int)
is equal to sizeof(float)
.
Compliant Solution
This compliant solution ensures that the value of n
is not greater than the minimum of the effective sizes of *p
and *q
and that the effective types of the two pointers are identical (float
).
Code Block | ||
---|---|---|
| ||
void f3(float *a, size_t val) { float b = 3.14; const size_t n = val; void *p = a; void *q = &b; if( (n > sizeof(a)) || (n > sizeof(b)) ) { /* Handle error */ } else { memcpy(p, q, n); /* ... */ } } |
Noncompliant Code Example
Wiki Markup |
---|
In this noncompliant code example, the value of {{n}} is greater than the size of {{T}}, that is, {{sizeof(wchar_t)}}. But the derived type of expression {{n}} ({{wchar_t *}}) is not the same as the type of {{T}} because its derived type (see Definitions section) will be equal to the type of {{p}}, which is {{wchar_t\*}}. The derived type of {{n}} is calculated using the first rule from N1579's \[SD:1\] definition of derived types (see Definitions section). Because {{n}} here is a {{sizeof}} expression, its derived type is equal to the type of the operand ({{p}}), which is {{wchar_t *}}. |
Code Block | ||
---|---|---|
| ||
wchar_t *f4() { const wchar_t *p = L"Hello, World!"; const size_t n = sizeof(p) * (wcslen(p) + 1); wchar_t *q = (wchar_t*) malloc(n); return q; } |
Compliant Solution
This compliant solution ensures that the derived type of n
(wchar_t
) is the same as the type of T
(wchar_t
) and that the value of n
is not less than the size of T
.
Code Block | ||
---|---|---|
| ||
wchar_t *f4() { const wchar_t *p = L"Hello, World!"; const size_t n = sizeof(wchar_t) * (wcslen(p) + 1); wchar_t *q = (wchar_t*) malloc(n); return q; } |
Risk Assessment
Depending on the library function called, the attacker may be able to use a heap overflow vulnerability to run arbitrary code. The detection of checks specified in the introduction can be automated, but the remediation has to be manual.
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
ARR38-C | high | likely | medium | P18 | L1 |
Related Guidelines
API00-C. Functions should validate their parameters (https://www.securecoding.cert.org/confluence/display/seccode/API00-C.+Functions+should+validate+their+parameters)
N1579: N1579, Rule 5.34 Forming invalid pointers by library functions
Bibliography
Wiki Markup |
---|
\[1SD:ISO/IEC 2011\] N1579: N1579, Section 4.5ISO/IEC. N1579 Information Technology â Programming languages, their environments and system software interfaces â C Secure Coding Rules C Secure Coding Rules. September, 2011. |