Naziv
|
Overflow Variables and Tags
|
Sažetak
|
This type of attack leverages the use of tags or variables from a formatted configuration data to cause buffer overflow. The attacker crafts a malicious HTML page or configuration file that includes oversized strings, thus causing an overflow.
|
Preduvjeti
|
The target program consumes user-controllable data in the form of tags or variables.|The target program does not perform sufficient boundary checking.
|
Rješenja
|
['Use a language or compiler that performs automatic bounds checking.', 'Use an abstraction library to abstract away risky APIs. Not a complete solution.', 'Compiler-based canary mechanisms such as StackGuard, ProPolice and the Microsoft Visual Studio /GS flag. Unless this provides automatic bounds checking, it is not a complete solution.', 'Use OS-level preventative functionality. Not a complete solution.', 'Do not trust input data from user. Validate all user input.']
|