ABV.UNKNOWN_SIZE
Buffer overflow-unknown-sized array index out of bounds
A buffer overflow, or overrun, is an anomaly in which a program writing data to a buffer overruns the buffer's boundaries and overwrites adjacent memory. Typically, this problem occurs when a program is copying strings of characters to a buffer.
C and C++ provide no built-in protection against accessing or overwriting data in any part of memory, and do not automatically check that data written to an array (the built-in buffer type for this language) is within the array's boundaries.
The ABV.UNKNOWN_SIZE checker looks for array bounds violations when the array is of an unknown size.
Vulnerability and risk
Buffer overflows can be triggered by inputs that are designed to execute code or alter the way the program operates. This may result in erratic program behavior, including memory access errors, incorrect results, a crash, or a breach of system security.
Consequences of buffer overflow include valid data being overwritten and execution of arbitrary and potentially malicious code. For example, buffer overflows can manipulate a program in several ways:
- By overwriting a local variable that is near the buffer in memory to change the behavior of the program to benefit the attacker
- By overwriting the return address in a stack frame so that execution resumes at the return address specified by the attacker (usually a user input-filled buffer)
- By overwriting a function pointer or exception handler, which is subsequently executed
Vulnerable code example
extern char buf[];
void foo(const char* pbuf)
{
int n = -1;
if (pbuf) {
n = strlen(pbuf);
// more code
}
buf[n] = '\0';
}
Klocwork reports this defect when it's able to conclude that buffer overflows occurs, without knowing the size of the buffer precisely: array 'buf' of unknown size may use index value(s) -1.
Related checkers
External guidance
- CERT ARR30-C: Do not form or use out-of-bounds pointers or array subscripts
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
- CWE-124: Buffer Underwrite ('Buffer Underflow')
- CWE-125: Out-of-bounds Read
- CWE-787: Out-of-bounds Write
- STIG-ID:APP3590.1 Application is vulnerable to buffer overflows
- STIG-ID:APP3590.3 Application is vulnerable to buffer overflows
Security training
Application security training materials provided by Secure Code Warrior.
Extension
This checker can be extended through the Klocwork knowledge base. See Tuning C/C++ analysis for more information.