Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: parens are needed to "increment the value", pointed out by someone reading japanese version.

Wiki MarkupMany functions accept pointers as arguments. If the function dereferences an invalid pointer (see [as in EXP34-C. Ensure a null pointer is not dereferenced]), or reads or writes to a pointer that does not refer to an object, the results are [undefined|BB. Definitions#undefined]. Typically the program will terminate abnormally when the invalid pointer is dereferenced, but it is possible for an invalid pointer to be dereferenced, and its memory changed, without abnormal termination \[[Jack 07|AA. C References#Jack 07]\]. Such programs can be difficult to debug because of the difficulty in determining if a pointer is valid.Do not dereference null pointers) or reads or writes to a pointer that does not refer to an object, the results are undefined. Typically, the program will terminate abnormally when an invalid pointer is dereferenced, but it is possible for an invalid pointer to be dereferenced and its memory changed without abnormal termination [Jack 2007]. Such programs can be difficult to debug because of the difficulty in determining if a pointer is valid.

One way to eliminate invalid pointers is to define a function that accepts a pointer argument and indicates whether or not the pointer is valid One source of prevention of invalid pointers is a function that could take a pointer and indicate if the pointer is valid or invalid, for some definition of valid. For instanceexample, the following function declares any pointer to be valid except NULL.:

Code Block

int valid(void *ptr) {
  return (ptr != NULL);
}

...

The following code relies on the _etext address, which is provided by defined by the loader as the first address following the program text on many platforms, including AIX, Linux, QNX, IRIX, and Solaris. It is not POSIX-compliant, nor is it available on Windows.

Code Block

#include <stdio.h>
#include <stdlib.h>

int invalidvalid(void *p) {
  extern char _etext;
  return (p =!= NULL) ||&& ((char*) p <> &_etext);
}

int global;

int main(void) {
  int local;
  int *p;

  printf("pointer to local var invalidvalid? %d\n", invalidvalid(&local));
  printf("pointer to static var invalidvalid? %d\n", invalidvalid(&global));
  printf("pointer to function invalidvalid? %d\n", invalidvalid((void *)main));

  int *p = (int *) malloc(sizeof(int));
  printf("pointer to heap invalidvalid? %d\n", invalidvalid(p));
  printf("pointer to end of allocated heap invalidvalid? %d\n", invalidvalid(p++p));
  free(--p);
  printf("pointer to freed heap invalidvalid? %d\n", invalidvalid(p--));
  printf("null pointer invalidvalid? %d\n", invalidvalid(NULL));

  return 0;
}

On a Linux platform, this program produces the following output:

Code Block

pointer to local var invalidvalid? 01
pointer to static var invalidvalid? 01
pointer to function invalidvalid? 10
pointer to heap invalidvalid? 01
pointer to end of allocated heap invalidvalid? 01
pointer to freed heap invalidvalid? 01
null pointer invalidvalid? 10

As you can see, the invalidThe valid() function is does not perfectguarantee validity; it only identifies null pointers and pointers to functions as invalid.

Non-Compliant Code Example

However, it can be used to catch a substantial number of problems that might otherwise go undetected.

Noncompliant Code Example

In this noncompliant code example, the incr() This function increments the value pointed to referenced by its argument. It also ensures that its argument is not a null pointer. But the pointer could still be invalid, causing the function to corrupt memory , or possibly terminate abnormally.

Code Block
bgColor#FFCCCC
langc

void incr(int *intptr) {
  if (intptr == NULL) {
    /* handleHandle error */
  }
  (*intptr)++;
}

Compliant Solution

By This incr() function can be improved by using the invalidvalid() function defined above, the function . The resulting implementation is less likely to dereference an invalid pointer or write to modify memory that is outside its the bounds of a valid object.

Code Block
bgColor#ccccff
langc

void incr(int *intptr) {
  if (invalid!valid( intptr)) {
    /* handleHandle error */
  }
  (*intptr)++;
}

...

The valid(

...

Since invalid pointers are often indicative of a bug in the program, one can use the assert() macro to terminate immediately if an invalid pointer is discovered (see MSC11-A. Incorporate diagnostic tests using assertions).

Code Block
bgColor#ccccff

#include <assert.h>

void incr(int *intptr) {
  assert(!invalid( intptr));
  *intptr++;
}

) function can be implementation dependent and perform additional, platform-dependent checks when possible. In the worst case, the valid() function may only perform the same null-pointer check as the noncompliant code example. However, on platforms where additional pointer validation is possible, the use of a valid() function can provide checks.

Risk Assessment

A pointer validation library function can be used to identify detect and so prevent the execution of vulnerable code.

Failure to clear memory can result in leaked information. Occasionally, it can also lead to buffer overflows if the program falsely assumes that a null-termination byte is present.

prevent operations from being performed on some invalid pointers.

Rule

Severity

Likelihood

Remediation Cost

Priority

Level

MEM10-

A

C

high

High

unlikely

Unlikely

high

High

P3

L3

Automated Detection

Tool

Version

Checker

Description

LDRA tool suite
Include Page
LDRA_V
LDRA_V
159 SEnhanced enforcement

Related Vulnerabilities

Search for vulnerabilities resulting from the violation of this rule on the CERT website.

Related Guidelines

...

Define and use a pointer validation function
MITRE CWE

CWE-20, Improper Input Validation
CWE-79, Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-89, Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CWE-91, XML Injection (aka Blind XPath Injection)
CWE-94, Improper Control of Generation of Code ('Code Injection')
CWE-114, Process Control
CWE-601, URL Redirection to Untrusted Site ('Open Redirect')

Bibliography


...

Image Added Image Added

References

Wiki Markup
\[[ISO/IEC 9899:1999|AA. C References#ISO/IEC 9899-1999]\] Section 6.3.2.3, "Pointers"
\[[Jack 07|AA. C References#Jack 07]\]
\[[van Sprundel 06|AA. C References#van Sprundel 06]\]

MEM09-A. Do not assume memory allocation routines initialize memory      08. Memory Management (MEM)       Image Modified