This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Strings and Integers"
m (Added navigation to facilitate sequential reading online) |
|||
(15 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
+ | {{LinkBar | ||
+ | | useprev=PrevLink | prev=Leading PHP Security Practice | lblprev= | ||
+ | | usemain=MainLink | main=OWASP Code Review Guide Table of Contents | lblmain=Table of Contents | ||
+ | | usenext=NextLink | next=Reviewing MySQL Security | lblnext= | ||
+ | }} | ||
+ | __TOC__ | ||
+ | |||
==Introduction:== | ==Introduction:== | ||
− | + | Strings are not a defined Type in C or C++, but simply a contiguous array of characters terminated by a null (\0) character. The length of the string is the amount of characters which precede the null character. C++ does contain template classes which address this feature of the programming language: '''std::basic_string''' and '''std::string''' These classes address some security issues but not all. | |
− | Strings are not a defined Type in C or C++ but simply a | ||
− | The length of the string is the amount of characters which | ||
− | C++ does contain template classes which address this feature of the programming language: '''std::basic_string''' and '''std::string''' These classes address some security issues but not all. | ||
'''|W|E|L|C|O|M|E|\0|''' | '''|W|E|L|C|O|M|E|\0|''' | ||
− | |||
==Common String Errors== | ==Common String Errors== | ||
− | Common string errors can be related to mistakes in implementation which may cause drastic security and availability issues. | + | Common string errors can be related to mistakes in implementation, which may cause drastic security and availability issues. C/C++ do not have the comfort other programming languages provide, such as Java and C# .NET, relating to buffer overflows and such due to a String Type not being defined. |
− | C/C++ do not have the comfort other programming languages provide such as Java and C# .NET relating to buffer overflows and such due to a String Type not being defined. | ||
Common issues include: | Common issues include: | ||
− | #Input validation errors | + | # Input validation errors |
− | #Unbounded | + | # Unbounded errors |
− | #Truncation issues | + | # Truncation issues |
− | #Out-of-bounds writes | + | # Out-of-bounds writes |
− | #String Termination | + | # String Termination errors |
− | #Off-by-one errors | + | # Off-by-one errors |
− | Some of the issues mentioned above have been covered in the | + | Some of the issues mentioned above have been covered in the [[Reviewing Code for Buffer Overruns and Overflows]] section in this guide. |
===Unbounded Errors=== | ===Unbounded Errors=== | ||
====String Copies==== | ====String Copies==== | ||
− | + | Unbounded errors occur when data is copied from a unbounded source to a fixed length character array. | |
void main(void) { | void main(void) { | ||
char Name[10]; | char Name[10]; | ||
puts("Enter your name:"); | puts("Enter your name:"); | ||
− | gets(Name); <-- Here the name input by the user can be of | + | gets(Name); <-- Here the name input by the user can be of arbitrary length over running the Name array. |
... | ... | ||
} | } | ||
====String Termination Errors==== | ====String Termination Errors==== | ||
− | Failure to properly terminate strings with a null can result in system failure | + | Failure to properly terminate strings with a null can result in system failure. |
int main(int argc, char* argv[]) { | int main(int argc, char* argv[]) { | ||
Line 46: | Line 48: | ||
} | } | ||
+ | Verify that the following are used: | ||
− | |||
strncpy() instead of strcpy() | strncpy() instead of strcpy() | ||
snprintf() instead of sprintf() | snprintf() instead of sprintf() | ||
fgets() instead of gets() | fgets() instead of gets() | ||
+ | ====Off by One Error==== | ||
+ | Looping through arrays should be looped in a n-1 manner, as we must remember arrays and vectors start as 0. This is not specific to C/C++, but Java and C# also.) | ||
− | + | Off-by-one errors are common to looping functionality, wherein a looping functionality is performed on an object in order to manipulate the contents of an object such as copy or add information. The off-by-one error is a result of an error on the loop counting functionality. | |
− | |||
− | |||
− | Off-by-one errors are common to looping | ||
− | The off-by-one error is a result of an error on the loop counting functionality. | ||
for (i = 0; i < 5; i++) { | for (i = 0; i < 5; i++) { | ||
/* Do Stuff */ | /* Do Stuff */ | ||
} | } | ||
− | Here i starts with a value of 0, it then increments to 1, then 2,3 & 4. When i reaches 5 then the condition i<5 is false and the loop terminates. | + | Here i starts with a value of 0, it then increments to 1, then 2, 3 & 4. When i reaches 5 then the condition i<5 is false and the loop terminates. |
+ | |||
+ | If the condition was set such that i<=5 (less than or equal to 5), the loop won’t terminate until i reaches 6, which may not be what is intended. | ||
+ | |||
+ | Also, counting from 1 instead of 0 can cause similar issues, as there would be one less iteration. Both of these issues relate to an off-by-one error where the loop either under or over counts. | ||
+ | |||
+ | ===Issues with Integers=== | ||
+ | ====Integer Overflows==== | ||
+ | When an integer is increased beyond its maximum range or decreased below its minimum value, overflows occur. Overflows can be signed or unsigned. Signed when the overflow carries over to the sign bit, unsigned when the value being intended to be represented is no longer represented correctly. | ||
+ | |||
+ | int x; | ||
+ | x = INT_MAX; // 2,147,483,647 | ||
+ | x++; | ||
+ | ''Here x would have the value of -2,147,483,648 after the increment'' | ||
+ | |||
+ | It is important when reviewing the code that some measure should be implemented such that the overflow does not occur. This is not the same as relying on the value "never going to reach this value (2,147,483,647)". This may be done by some supporting logic or a post increment check. | ||
+ | |||
+ | unsigned int y; | ||
+ | y = UINT_MAX; // 4,294,967,295; | ||
+ | y++; | ||
+ | ''Here y would have a value of 0 after the increment'' | ||
+ | |||
+ | Also, here we can see the result of an unsigned int being incremented, which loops the integer back to the value 0. As before, this should also be examined to see if there are any compensating controls to prevent this from happening. | ||
+ | |||
+ | ====Integer Conversion==== | ||
+ | When converting from a signed to an unsigned integer, care must also be taken to prevent a representation error. | ||
+ | |||
+ | int x = -3; | ||
+ | unsigned short y; | ||
+ | y = x; | ||
+ | |||
+ | ''Here y would have the value of 65533 due to the loopback effect of the conversion from signed to unsigned.'' | ||
− | + | {{LinkBar | |
+ | | useprev=PrevLink | prev=Leading PHP Security Practice | lblprev= | ||
+ | | usemain=MainLink | main=OWASP Code Review Guide Table of Contents | lblmain=Table of Contents | ||
+ | | usenext=NextLink | next=Reviewing MySQL Security | lblnext= | ||
+ | }} | ||
− | + | [[Category:OWASP Code Review Project]] |
Latest revision as of 16:49, 9 September 2010
Introduction:
Strings are not a defined Type in C or C++, but simply a contiguous array of characters terminated by a null (\0) character. The length of the string is the amount of characters which precede the null character. C++ does contain template classes which address this feature of the programming language: std::basic_string and std::string These classes address some security issues but not all.
|W|E|L|C|O|M|E|\0|
Common String Errors
Common string errors can be related to mistakes in implementation, which may cause drastic security and availability issues. C/C++ do not have the comfort other programming languages provide, such as Java and C# .NET, relating to buffer overflows and such due to a String Type not being defined.
Common issues include:
- Input validation errors
- Unbounded errors
- Truncation issues
- Out-of-bounds writes
- String Termination errors
- Off-by-one errors
Some of the issues mentioned above have been covered in the Reviewing Code for Buffer Overruns and Overflows section in this guide.
Unbounded Errors
String Copies
Unbounded errors occur when data is copied from a unbounded source to a fixed length character array.
void main(void) { char Name[10]; puts("Enter your name:"); gets(Name); <-- Here the name input by the user can be of arbitrary length over running the Name array. ... }
String Termination Errors
Failure to properly terminate strings with a null can result in system failure.
int main(int argc, char* argv[]) { char a[16]; char b[16]; char c[32]; strncpy(a, "0123456789abcdef", sizeof(a)); strncpy(b, "0123456789abcdef", sizeof(b)); strncpy(c, a, sizeof(c)); }
Verify that the following are used:
strncpy() instead of strcpy() snprintf() instead of sprintf() fgets() instead of gets()
Off by One Error
Looping through arrays should be looped in a n-1 manner, as we must remember arrays and vectors start as 0. This is not specific to C/C++, but Java and C# also.)
Off-by-one errors are common to looping functionality, wherein a looping functionality is performed on an object in order to manipulate the contents of an object such as copy or add information. The off-by-one error is a result of an error on the loop counting functionality.
for (i = 0; i < 5; i++) { /* Do Stuff */ }
Here i starts with a value of 0, it then increments to 1, then 2, 3 & 4. When i reaches 5 then the condition i<5 is false and the loop terminates.
If the condition was set such that i<=5 (less than or equal to 5), the loop won’t terminate until i reaches 6, which may not be what is intended.
Also, counting from 1 instead of 0 can cause similar issues, as there would be one less iteration. Both of these issues relate to an off-by-one error where the loop either under or over counts.
Issues with Integers
Integer Overflows
When an integer is increased beyond its maximum range or decreased below its minimum value, overflows occur. Overflows can be signed or unsigned. Signed when the overflow carries over to the sign bit, unsigned when the value being intended to be represented is no longer represented correctly.
int x; x = INT_MAX; // 2,147,483,647 x++; Here x would have the value of -2,147,483,648 after the increment
It is important when reviewing the code that some measure should be implemented such that the overflow does not occur. This is not the same as relying on the value "never going to reach this value (2,147,483,647)". This may be done by some supporting logic or a post increment check.
unsigned int y; y = UINT_MAX; // 4,294,967,295; y++; Here y would have a value of 0 after the increment
Also, here we can see the result of an unsigned int being incremented, which loops the integer back to the value 0. As before, this should also be examined to see if there are any compensating controls to prevent this from happening.
Integer Conversion
When converting from a signed to an unsigned integer, care must also be taken to prevent a representation error.
int x = -3; unsigned short y; y = x;
Here y would have the value of 65533 due to the loopback effect of the conversion from signed to unsigned.