8 CS4615 System Security - Buffer Overflows

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/14

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

15 Terms

1
New cards

What is the Stack in memory?

Function calls change the execution flow and the Stack is used to keep track of program flow and information needed to return.

2
New cards

Some more Stack information (Not a question, just some basics, example shown in L11 Buffer Overflow Slide 5)

ā€¢ Stack is continuous block of memory
ā€¢ Last object placed is first to be removed (LIFO)
ā€¢ Bottom of the stack is at a fixed address
ā€¢ Stack grows down towards lower memory
ā€¢ Stack Pointer (SP) points to the top of stack
ā€¢ Frame Pointer FP points to a fixed address in the current frame

3
New cards

What is a Buffer Overflow?

A buffer overflow occurs when a program tries to store more data in a buffer than it can hold, causing the excess data to overwrite adjacent memory locations.. Therefore, we need to modify data in spaces we normally cannot access.
Use modification to change program flow or execute malicious code for attacks.

4
New cards

How can you change the program flow with Buffer Overflow?

An attacker provides more data than the buffer can hold, causing the excess data to overwrite adjacent memory locations on the stack. One of the memory locations that can be overwritten is the return address, which is used by the program to determine where to return to after a function call is completed.
By overwriting the return address with a value that points to a malicious code (e.g., shellcode) in the stack, an attacker can trick the program into executing the malicious code after the function returns. This allows the attacker to take control of the program's flow and potentially compromise the system.
YES THIS WAS CHAT GPT BUT I UNDERSTAND IT BETTER THAN THE SLIDES

5
New cards

Explain how the flow of execution of a program can be changed by using a buffer overflow that targets the stack. Explain how this approach can be used to compromise a system.

Use ChatGPT to answer this, will even give you C code to illustrate.

6
New cards

What are the problems of countermeasures with buffer overflows?

ā€¢ Countermeasures require change Ć  not always possible
ā€¢ Countermeasures have a performance impact Ć  not desirable

7
New cards

What are methods to prevent Buffer Overflow in Linux? (5)

ā€¢ Address space layout randomization (Kernel)
ā€¢ Executable stack protection (Compiler)
ā€¢ Stack canary (Compiler)
ā€¢ Fortify source (Compiler)
ā€¢ Stack protector (Compiler)

8
New cards

What is Address Space Layout Randomization? (ASLR)

Data, stack and code use random start addresses selected at program start to prevent attackers from guessing where things are.

9
New cards

What is Executable Stack Protection?

To prevent attacks, the stack is marked as non-executable, this means code present on the stack cannot be executed.

10
New cards

What is a Stack Canary?

A stack canary is a small, random value that is placed on the stack just before the return address. Before a function returns, it checks whether the canary value has been modified. If the value has been modified, it indicates that a buffer overflow has occurred, and the program can take appropriate action.

11
New cards

Where is the Stack Canary located?

The canary is placed before the EBP and EIB on the stack, between the local variables and the return addresses.

12
New cards

What are some Stack Canary Types?

Random Canary, Random XOR Canary, Null Canary, Terminator Canary

13
New cards

What is the Terminator Canary

ā€¢ The canary value is set to a combination of Null, CR, LF, and 0xFF. These values act as string terminators in most string functions. (No, it is not an evil robot bird)

14
New cards

Give an example of a Terminator Canary.

ā€¢ line would be longer than 8 characters to overflow buffer and then RET
ā€¢ After the buffer sits the canary, so we need to keep the canary intact
ā€¢ After the first 8 characters we need to include the canary 0x000aff0d
ā€¢ However, strcpy() stops when it sees a 0x00 (Null)
ā€¢ So we cannot exploit this and spill data into RET

15
New cards

What is Fortify Source?

It is a compile flag for functions to include support for detecting Buffer Overflows.