Buffer
Overflow Causes. ©2002, Jedidiah R. Crandall, Susan L. Gerhart, Jan G.
Hogle.
http://sfsecurity.pr.erau.edu
Careless
use of buffers without bounds checking - Consequences.
•If
the buffer overflow is big enough the attacker can hijack the machine. For
example, in UNIX a buffer overflow of less than 50 bytes in a process that has root privileges can be used
to “spin a shell.” This means that the attacker obtains a command shell with
root privileges. Hijacking the machine can also be done by a worm as it spreads. But
never assume that small buffers, even if it’s a two byte buffer, are safe because attack code can be
placed in another buffer, beyond the
return pointer, or on the heap.
•Any
security sensitive data that follows the buffer can be overwritten, such as passwords or variables that designate privileges.
•
•The
software might crash. This can
cause a core dump giving the attacker access
to any security-sensitive data that was in the program’s memory at the time of the core dump.