Difference between revisions of "Strings and Integers"

From OWASP
Jump to: navigation, search
(Off by One Error)
m (Added navigation to facilitate sequential reading online)
 
(6 intermediate revisions by one user not shown)
Line 1: Line 1:
[[OWASP Code Review Guide Table of Contents]]__TOC__
+
{{LinkBar
 +
  | useprev=PrevLink | prev=Leading PHP Security Practice | lblprev=
 +
  | usemain=MainLink | main=OWASP Code Review Guide Table of Contents | lblmain=Table of Contents
 +
  | usenext=NextLink | next=Reviewing MySQL Security | lblnext=
 +
}}
 +
__TOC__
 +
 
 
==Introduction:==
 
==Introduction:==
 
Strings are not a defined Type in C or C++, but simply a contiguous array of characters terminated by a null (\0) character. The length of the string is the amount of characters which precede the null character. C++ does contain template classes which address this feature of the programming language:  '''std::basic_string''' and '''std::string''' These classes address some security issues but not all.
 
Strings are not a defined Type in C or C++, but simply a contiguous array of characters terminated by a null (\0) character. The length of the string is the amount of characters which precede the null character. C++ does contain template classes which address this feature of the programming language:  '''std::basic_string''' and '''std::string''' These classes address some security issues but not all.
Line 9: Line 15:
  
 
Common issues include:
 
Common issues include:
#Input validation errors
+
# Input validation errors
#Unbounded Errors
+
# Unbounded errors
#Truncation issues
+
# Truncation issues
#Out-of-bounds writes
+
# Out-of-bounds writes
#String Termination Errors
+
# String Termination errors
#Off-by-one errors`
+
# Off-by-one errors
  
 
Some of the issues mentioned above have been covered in the [[Reviewing Code for Buffer Overruns and Overflows]] section in this guide.
 
Some of the issues mentioned above have been covered in the [[Reviewing Code for Buffer Overruns and Overflows]] section in this guide.
Line 21: Line 27:
 
====String Copies====
 
====String Copies====
  
Occur when data is copied from a unbounded source to a fixed length character array
+
Unbounded errors occur when data is copied from a unbounded source to a fixed length character array.
  
 
  void main(void) {
 
  void main(void) {
Line 31: Line 37:
  
 
====String Termination Errors====
 
====String Termination Errors====
Failure to properly terminate strings with a null can result in system failure
+
Failure to properly terminate strings with a null can result in system failure.
  
 
  int main(int argc, char* argv[]) {
 
  int main(int argc, char* argv[]) {
Line 41: Line 47:
 
   strncpy(c, a, sizeof(c));
 
   strncpy(c, a, sizeof(c));
 
  }
 
  }
 
  
 
Verify that the following are used:  
 
Verify that the following are used:  
Line 50: Line 55:
  
 
====Off by One Error====
 
====Off by One Error====
(Looping through arrays should be looped in a n-1 manner, as we must remember arrays and vectors start as 0. This is not specific to C/C++, but Java and C# also.)  
+
Looping through arrays should be looped in a n-1 manner, as we must remember arrays and vectors start as 0. This is not specific to C/C++, but Java and C# also.)
  
 
Off-by-one errors are common to looping functionality, wherein a looping functionality is performed on an object in order to manipulate the contents of an object such as copy or add information. The off-by-one error is a result of an error on the loop counting functionality.  
 
Off-by-one errors are common to looping functionality, wherein a looping functionality is performed on an object in order to manipulate the contents of an object such as copy or add information. The off-by-one error is a result of an error on the loop counting functionality.  
 
  
 
  for (i = 0; i < 5; i++) {
 
  for (i = 0; i < 5; i++) {
Line 66: Line 70:
 
===Issues with Integers===
 
===Issues with Integers===
 
====Integer Overflows====
 
====Integer Overflows====
When an integer is increased beyond its maximum range or decreased below its minimum value, overflows occur. Overflows can be signed or unsigned. Signed when the overflow carries over to the sign bit,unsigned when the value being intended to be represented is no longer represented correctly.  
+
When an integer is increased beyond its maximum range or decreased below its minimum value, overflows occur. Overflows can be signed or unsigned. Signed when the overflow carries over to the sign bit, unsigned when the value being intended to be represented is no longer represented correctly.  
  
 
  int x;
 
  int x;
Line 80: Line 84:
 
  ''Here y would have a value of 0 after the increment''
 
  ''Here y would have a value of 0 after the increment''
  
Also, here we can see the result of an unsigned int being incremented, which loops the integer back to the value 0. As before, this should also be examined to see if there are any compensating controls to prevent this from happening.  
+
Also, here we can see the result of an unsigned int being incremented, which loops the integer back to the value 0. As before, this should also be examined to see if there are any compensating controls to prevent this from happening.
  
====Integer conversion====
+
====Integer Conversion====
 
When converting from a signed to an unsigned integer, care must also be taken to prevent a representation error.  
 
When converting from a signed to an unsigned integer, care must also be taken to prevent a representation error.  
  
Line 88: Line 92:
 
  unsigned short y;
 
  unsigned short y;
 
  y = x;
 
  y = x;
''Here y would have the value of 65533 due to the loopback effect of the conversion from signed to unsigned.''
+
 
 +
''Here y would have the value of 65533 due to the loopback effect of the conversion from signed to unsigned.''
 +
 
 +
{{LinkBar
 +
  | useprev=PrevLink | prev=Leading PHP Security Practice | lblprev=
 +
  | usemain=MainLink | main=OWASP Code Review Guide Table of Contents | lblmain=Table of Contents
 +
  | usenext=NextLink | next=Reviewing MySQL Security | lblnext=
 +
}}
  
 
[[Category:OWASP Code Review Project]]
 
[[Category:OWASP Code Review Project]]

Latest revision as of 11:49, 9 September 2010

«««« Main
(Table of Contents)
»»»»

Contents


Introduction:

Strings are not a defined Type in C or C++, but simply a contiguous array of characters terminated by a null (\0) character. The length of the string is the amount of characters which precede the null character. C++ does contain template classes which address this feature of the programming language: std::basic_string and std::string These classes address some security issues but not all.

|W|E|L|C|O|M|E|\0|

Common String Errors

Common string errors can be related to mistakes in implementation, which may cause drastic security and availability issues. C/C++ do not have the comfort other programming languages provide, such as Java and C# .NET, relating to buffer overflows and such due to a String Type not being defined.

Common issues include:

  1. Input validation errors
  2. Unbounded errors
  3. Truncation issues
  4. Out-of-bounds writes
  5. String Termination errors
  6. Off-by-one errors

Some of the issues mentioned above have been covered in the Reviewing Code for Buffer Overruns and Overflows section in this guide.

Unbounded Errors

String Copies

Unbounded errors occur when data is copied from a unbounded source to a fixed length character array.

void main(void) {
 char Name[10];
 puts("Enter your name:");
 gets(Name); <-- Here the name input by the user can be of arbitrary length over running the Name array.
...
 }

String Termination Errors

Failure to properly terminate strings with a null can result in system failure.

int main(int argc, char* argv[]) {
 char a[16];
 char b[16];
 char c[32];
 strncpy(a, "0123456789abcdef", sizeof(a));
 strncpy(b, "0123456789abcdef", sizeof(b));
 strncpy(c, a, sizeof(c));
}

Verify that the following are used:

strncpy() instead of strcpy()
snprintf() instead of sprintf()
fgets() instead of gets()

Off by One Error

Looping through arrays should be looped in a n-1 manner, as we must remember arrays and vectors start as 0. This is not specific to C/C++, but Java and C# also.)

Off-by-one errors are common to looping functionality, wherein a looping functionality is performed on an object in order to manipulate the contents of an object such as copy or add information. The off-by-one error is a result of an error on the loop counting functionality.

for (i = 0; i < 5; i++) {
   /* Do Stuff */
}

Here i starts with a value of 0, it then increments to 1, then 2, 3 & 4. When i reaches 5 then the condition i<5 is false and the loop terminates.

If the condition was set such that i<=5 (less than or equal to 5), the loop won’t terminate until i reaches 6, which may not be what is intended.

Also, counting from 1 instead of 0 can cause similar issues, as there would be one less iteration. Both of these issues relate to an off-by-one error where the loop either under or over counts.

Issues with Integers

Integer Overflows

When an integer is increased beyond its maximum range or decreased below its minimum value, overflows occur. Overflows can be signed or unsigned. Signed when the overflow carries over to the sign bit, unsigned when the value being intended to be represented is no longer represented correctly.

int x;
x = INT_MAX; // 2,147,483,647
x++;
Here x would have the value of -2,147,483,648 after the increment

It is important when reviewing the code that some measure should be implemented such that the overflow does not occur. This is not the same as relying on the value "never going to reach this value (2,147,483,647)". This may be done by some supporting logic or a post increment check.

unsigned int y;
y = UINT_MAX; // 4,294,967,295;
y++;
Here y would have a value of 0 after the increment

Also, here we can see the result of an unsigned int being incremented, which loops the integer back to the value 0. As before, this should also be examined to see if there are any compensating controls to prevent this from happening.

Integer Conversion

When converting from a signed to an unsigned integer, care must also be taken to prevent a representation error.

int x = -3;
unsigned short y;
y = x;

Here y would have the value of 65533 due to the loopback effect of the conversion from signed to unsigned.


«««« Main
(Table of Contents)
»»»»