Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 16 Dec 1996 12:18:05 -0600
From:      Richard Wackerbarth <rkw@dataplex.net>
To:        "Craig Shaver" <craig@ProGroup.COM>
Cc:        security@FreeBSD.org
Subject:   Re: crontab security hole exploit
Message-ID:  <l03010d00aedb3f1493b4@[204.69.236.50]>
In-Reply-To: <199612161654.IAA19864@seabass.progroup.com>
References:  <Pine.GSO.3.95.961216154913.7742B-100000@lich> from "Joakim Rastberg" at Dec 16, 96 03:55:59 pm

index | next in thread | previous in thread | raw e-mail

>Is there someplace or some book that someone who is writing new software can
>refer to for learning how to write secure code in the first place?  I
>certainly don't want to ask some whiny security cop for each and every
>little detail.... :)

Most of the exploits currently being discovered are a direct result of
programs which move user input into a fixed buffer without checking the
length of the string.

In each case, someone figures out what will get clobbered and creates a
"string" that is designed to overwrite whatever follows the buffer. When
those buffers are on the stack, it is very easy to clobber the return stack
with a piece of code that takes control.

The solution is to use "safe" string copy routines that honor the length of
the receiving buffer.

Since the methodology of a particular instance does not add to the sphere
of knowledge, the details of the exploit don't really give most of us any
useful information.




home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?l03010d00aedb3f1493b4>