Abstract | ||
---|---|---|
Although Format String Attacks (FSAs) are known for many years there is still a number of applications that have been found to be vulnerable to such attacks in the recent years. According to the CVE database, the number of FSA vulnerabilities is stable over the last 5 years, even as FSA vulnerabilities are assumingly easy to detect. Thus we can assume, that this type of bugs will still be present in future. Current compiler-based or system-based protection mechanisms are helping to restrict the exploitation this kind of vulnerabilities, but are insufficient to circumvent an attack in all cases. Currently FSAs are mainly used to leak information such as pointer addresses to circumvent protection mechanisms like Address Space Layout Randomization (ASLR). So current attacks are also interested in the output of the format string. In this paper we present a novel method for attacking format string vulnerabilities in a blind manner. Our method does not require any memory leakage or output to the attacker. In addition, we show a way to exploit format string vulnerabilities on the heap, where we can not benefit from direct destination control, i.e. we can not place arbitrary addresses onto the stack, as is possible in stack-based format string. |
Year | DOI | Venue |
---|---|---|
2014 | 10.1007/978-3-319-23802-9_23 | Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering |
Keywords | Field | DocType |
Security,Format string attacks | Computer science,Computer security,Computer network,Compiler,scanf format string,restrict,Vulnerability | Conference |
Volume | ISSN | Citations |
153 | 1867-8211 | 1 |
PageRank | References | Authors |
0.38 | 7 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Fatih Kiliç | 1 | 1 | 0.71 |
Thomas Kittel | 2 | 32 | 3.02 |
Claudia Eckert | 3 | 76 | 13.13 |