The readlink()
function reads where a link points to. It makes no effort to NULLnull-terminate its second argument, buffer
. Instead, it just returns the number of characters it has written.
...
Noncompliant Code Example
If len
is equal to sizeof(buf)
, the NULL terminator will be written one null terminator is written 1 byte past the end of buf
.:
Code Block | ||||
---|---|---|---|---|
| ||||
char buf[1024];
ssize_t len = readlink("/usr/bin/perl", buf, sizeof(buf));
buf[len] = '\0';
|
An incorrect solution to this problem is to try to make buf
large enough that it can always hold the result:
Code Block | ||||
---|---|---|---|---|
| ||||
long symlink_max; size_t bufsize; char *buf; ssize_t len; errno = 0; if ((symlink_max = pathconf("/usr/bin/", _PC_SYMLINK_MAX)) ; if (symlink_max == -1 && ) { if (errno != 0) { /* handle error condition */ } if (symlink_max == -1)} bufsize = 10000; } else { bufsize = symlink_max+1; } if ((buf = (char *)malloc(bufsize)); if (buf == NULL) { /* handle error condition */ } len = readlink("/usr/bin/perl", buf, bufsize); buf[len] = '\0'; |
This modification incorrectly assumes that the symbolic link cannot be longer than the value of SYMLINK_MAX
returned by pathconf()
. However, the value returned by pathconf()
is out - of - date by the time readlink()
is called, and so the off-by-one buffer-overflow risk is still present because in , between the two calls, the location of /usr/bin/perl
could can change to a file system with a larger SYMLINK_MAX
value. Also, if SYMLINK_MAX
is indeterminate (that is, if pathconf()
returned -1
without setting errno
), the code uses an arbitrary large buffer size (1000010,000) that it hopes will be sufficient, but there is a small chance that readlink()
could can return exactly this size.
An additional issue is that readlink()
can return -1
if it fails, causing an off-by-one underflow.
Compliant Solution
This example compliant solution ensures there will be is no overflow by only reading in only sizeof(buf)-1
characters. It also properly checks to see if an error has occurred.:
Code Block | ||||
---|---|---|---|---|
| ||||
enum { BUFFERSIZE = 1024 }; char buf[BUFFERSIZE]; ssize_t len; if ((len = readlink("/usr/bin/perl", buf, sizeof(buf)-1)) ; if (len != -1) { buf[len] = '\0'; } else { /* handle error condition */ } |
Risk Assessment
Failing to properly null-terminate the result of readlink()
can result in abnormal program termination and buffer-overflow vulnerabilities.
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
POS30-C |
high | probable | medium |
P4
P12 | L1 |
Automated Detection
Tool | Version | Checker | Description | ||||||
---|---|---|---|---|---|---|---|---|---|
Astrée |
| Supported: Can be checked with appropriate analysis stubs. | |||||||
Axivion Bauhaus Suite |
| CertC-POS30 | |||||||
CodeSonar |
| LANG.MEM.BO | Buffer Overrun | ||||||
Compass/ROSE | |||||||||
Coverity |
| READLINK | Implemented | ||||||
Helix QAC |
| C5033 | |||||||
Klocwork |
| ABV.GENERAL | |||||||
Parasoft C/C++test |
| CERT_C-POS30-a | Avoid overflow due to reading a not zero terminated string | ||||||
| CERT C: Rule POS30-C | Checks for misuse of readlink() (rule partially covered) |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
References
Wiki Markup |
---|
\[[ilja 06|AA. C References#ilja 06]\]
\[[Open Group 97|AA. C References#Open Group 97]\]
\[[Open Group 04|AA. C References#Open Group 04]\] |
Related Guidelines
Key here (explains table format and definitions)
Taxonomy | Taxonomy item | Relationship |
---|---|---|
CWE 2.11 | CWE-170, Improper null termination | 2017-06-13: CERT: Rule subset of CWE |
CERT-CWE Mapping Notes
Key here for mapping notes
CWE-170 and POS30-C
CWE-170 = Union( POS30-C, list) where list =
- Non-null terminated strings fed to functions other than POSIX readlink()
Bibliography
...
POS02-A. Follow the principle of least privilege 50. POSIX (POS) POS31-C. Do not unlock or destroy another thread's mutex