Dynamic memory management is a common source of programming flaws that can lead to security vulnerabilities. Poor memory management can lead to security issues, such as heap-buffer overflows, dangling pointers, and double-free issues [Seacord 2013]. From the programmer's perspective, memory management involves allocating memory, reading and writing to memory, and deallocating memory.
Allocating and freeing memory in different modules and levels of abstraction burdens the programmer with tracking the lifetime of that block of memory. This may cause confusion regarding may make it difficult to determine when and if a block of memory has been allocated, or freed, leading to programming defects, such as memory leaks, double-free vulnerabilities, accessing freed memory, or writing to un-allocated freed or unallocated memory.
To avoid these situations, it is recommended that memory should be allocated and freed at the same level of abstraction and, ideally, and preferably in the same code module. This includes the use of the following memory allocation and deallocation functions described in subclause 7.23.3 of the C Standard [ISO/IEC 9899:2011]:
Code Block |
---|
void *malloc(size_t size);
void *calloc(size_t nmemb, size_t size);
void *realloc(void *ptr, size_t size);
void *aligned_alloc(size_t alignment, size_t size);
void free(void *ptr);
|
Failing to follow this recommendation has led to real-world vulnerabilities. For example, freeing The affects of not following this recommendation are best demonstrated by an actual vulnerability. Freeing memory in different modules resulted in a vulnerability in MIT Kerberos 5 http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-002-dblfree.txt. The problem is the [MIT 2004]. The MIT Kerberos 5 code contains in this case contained error-handling logic, which frees freed memory allocated by the ASN.1 decoders if pointers to the allocated memory are were non-null. However, if a detectable error occursoccurred, the ASN.1 decoders themselves free freed the memory which that they have had allocated. When some library functions receive received errors from the ASN.1 decoders, they also attempt attempted to free the same memory, causing resulting in a double-free vulnerability.
...
Noncompliant Code Example
...
This example demonstrates an error that can occur when memory is freed in different functions. First, an array of number
integers is dynamically allocated. That array, referred to by list
, and its size, number
, are then passed to func2
. If the number of elements in the array is greater than the value MIN_SIZE_ALLOWED
, the array is processed. Otherwise, it is assumed an error has occurred, noncompliant code example shows a double-free vulnerability resulting from memory being allocated and freed at differing levels of abstraction. In this example, memory for the list
array is allocated in the process_list()
function. The array is then passed to the verify_size()
function that performs error checking on the size of the list. If the size of the list is below a minimum size, the memory allocated to the list is freed, and the function returns . If the error occurs in func2
the dynamic memory referred to by list
will be freed twice: once in func2
and again at the end of func1
.to the caller. The calling function then frees this same memory again, resulting in a double-free and potentially exploitable vulnerability.
Code Block | ||||
---|---|---|---|---|
| ||||
enum { | ||||
Code Block | ||||
#define MIN_SIZE_ALLOWED 10 = 32 }; voidint func2verify_size(intchar *list, size_t list_size) { if (size < MIN_SIZE_ALLOWED) { /* handleHandle Errorerror Conditioncondition */ free(list); return -1; } /* Process list */return 0; } int func1 void process_list(size_t number) { intchar *list = malloc (numberchar * sizeof)malloc(intnumber)); if (list == NULL) { /* Handle Allocationallocation Errorerror */ } func2 if (verify_size(list, number) == -1) { free(list); return; } /* Continue Processprocessing list */ free(list); } |
...
The call to free memory in the verify_size()
function takes place in a subroutine of the process_list()
function, at a different level of abstraction from the allocation, resulting in a violation of this recommendation. The memory deallocation also occurs in error-handling code, which is frequently not as well tested as "green paths" through the code.
Compliant Solution
To correct this the logic in problem, the error-handling code should be changed in verify_size()
is modified so that list
is not freedit no longer frees list
. This change assures ensures that list
is freed only freed once, at the same level of abstraction, in func1
the process_list()
function.
Code Block | ||||
---|---|---|---|---|
| ||||
enum { #define MIN_SIZE_ALLOWED 10= 32 }; voidint func2(intverify_size(const char *list, size_t list_size) { if (size < MIN_SIZE_ALLOWED) { /* Handle Errorerror Conditioncondition */ return return-1; } /* Process list */return 0; } int func1 void process_list(size_t number) { intchar *list = malloc (numberchar * sizeof(int))malloc(number); if (list == NULL) { /* Handle Allocationallocation Errorerror */ } func2 if (verify_size(list, number) == -1) { free(list); return; } /* ProcessContinue processing list */ free(list); } |
References
Seacord 05 Chapter 4 Dynamic Memory Management
Risk Assessment
The mismanagement of memory can lead to freeing memory multiple times or writing to already freed memory. Both of these coding errors can result in an attacker executing arbitrary code with the permissions of the vulnerable process. Memory management errors can also lead to resource depletion and denial-of-service attacks.
Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
MEM00-C | High | Probable | Medium | P12 | L1 |
Automated Detection
Tool | Version | Checker | Description | ||||||
---|---|---|---|---|---|---|---|---|---|
CodeSonar |
| ALLOC.DF | Double free | ||||||
Compass/ROSE | Could detect possible violations by reporting any function that has | ||||||||
Coverity | 6.5 | RESOURCE_LEAK | Fully implemented | ||||||
Klocwork |
| FREE.INCONSISTENT UFM.FFM.MIGHT UFM.FFM.MUST UFM.DEREF.MIGHT UFM.DEREF.MUST UFM.RETURN.MIGHT UFM.RETURN.MUST UFM.USE.MIGHT UFM.USE.MUST MLK.MIGHT MLK.MUST MLK.RET.MIGHT MLK.RET.MUST FNH.MIGHT FNH.MUST FUM.GEN.MIGHT FUM.GEN.MUST RH.LEAK | |||||||
LDRA tool suite |
| 50 D | Partially implemented | ||||||
Parasoft C/C++test |
| CERT_C-MEM00-a | Do not allocate memory and expect that someone else will deallocate it later | ||||||
Parasoft Insure++ | Runtime analysis | ||||||||
PC-lint Plus |
| 449, 2434 | Partially supported | ||||||
Polyspace Bug Finder |
| Checks for:
Rec. partially covered. |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Related Guidelines
SEI CERT C++ Coding Standard | VOID MEM11-CPP. Allocate and free memory in the same module, at the same level of abstraction |
ISO/IEC TR 24772:2013 | Memory Leak [XYL] |
MITRE CWE | CWE-415, Double free CWE-416, Use after free |
Bibliography
[MIT 2004] | |
[Plakosh 2005] | |
[Seacord 2013] | Chapter 4, "Dynamic Memory Management" |
...
MIT Kerberos 5 \[http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-002-dblfree.txt Wiki Markup