Content deleted Content added
Deryck Chan (talk | contribs) m →See also: rm duplicated link |
There is no evindence on who and when discovered this. There are issues on this topic that where known in 1999. |
||
Line 1:
This is a common vulnerability due to the fact that format bugs were previously thought harmless and resulted in vulnerabilites in many common tools. [http://www.cve.mitre.org/cgi-bin/cvekey.cgi?keyword=format+string MITRE's CVE project]
Format string bugs most commonly appear when a programmer wishes to print a string containing user supplied data. The programmer may mistakenly write <code>printf(buffer)</code> instead of <code>printf("%s", buffer)</code>. The first version interprets <code>buffer</code> as a format string, and parses any formatting instructions it may contain. The second version simply prints a string to the screen, as the programmer intended.
Format bugs arise because C's argument passing conventions are [[Type safety|type-unsafe]]. In particular, the <code>varargs</code> mechanism allows [[Subprogram|functions]] to accept any number of arguments (e.g. <code>printf</code>) by "popping" as many [[
==See also==
*[[
*[[snprintf]]
*[[syslog]]
▲*[[scanf]]
==References==
*[[Tobias Klein]]: ''Buffer Overflows und Format-String-Schwachstellen'', Dpunkt Verlag, ISBN 3-89864-192-9.
==External links==
*[http://doc.bughunter.net/format-string/exploit-fs.html Excellent Paper on Exploiting Format String Bugs]▼
*[http://marc.theaimsgroup.com/?l=bugtraq&m=96179429114160&w=2 The first format string exploit]
*[http://teso.scene.at/articles/formatstring/ Exploiting Format String Vulnerabilities]
▲*[http://
*[http://www.securityfocus.com/data/library/format-bug-analysis.pdf Analysis of Format Strings Bugs]
*[http://www.hert.org/papers/format.html Hacker Emergency Response Team - Exploiting Format Strings]
[[Category:Security exploits]]
|