Brodley, Hilmi Ozdoganoglu, T.N. Vijaykumar, and Ankit Jalote
DETECTION AND PREVENTION
OF STACK BUFFER OVERFLOW
ATTACKS How to mitigate remote attacks that exploit
buffer overflow vulnerabilities on the stack and enable attackers to take control of the program.
The July 2005 announcement by computer security researcher Michael Lynn at
the Black Hat security conference of a software flaw in Cisco Systems routers grabbed media attention worldwide. The flaw was an instance of a buffer over- flow, a security vulnerability that has been discussed for 40 years yet remains one of the most frequently reported types of remote attack against computer systems. In 2004, the national cyber-security vulnerability database (nvd.nist.gov) reported 323 buffer overflow vulnerabilities, an average of more than 27 new instances per month. For the first six months of 2005, it reported 331 buffer over- flow vulnerabilities. Meanwhile, security researchers have sought to develop tech- niques to prevent or detect the exploitation of these vulnerabilities. Here, we discuss what buffer overflow attacks are and survey the various tools and techniques that can be used to mitigate their threat to computer systems. ILLUSTRATION BY LISA HANEY
COMMUNICATIONS OF THE ACM November 2005/Vol. 48, No. 11 51
A buffer overflow occurs during program execu- stack. The data used to overflow is often a single tion when a fixed-size buffer has had too much data string constructed by the attacker, with the executable copied into it. This causes the data to overwrite into code first, followed by enough repetitions of the tar- adjacent memory locations, and, depending on what get address that the RA is overwritten. This attack is stored there, the behavior of the program itself strategy requires the attacker to know exactly where might be affected. Buffer overflow attacks can take the executable code is stored; otherwise, the attack place in processes that use a stack during program will fail. Attackers get around this requirement by execution. (Another type of overflow attack can occur prepending a sequence of unneeded instructions in the heap, but here we stick to stacks.) The left- (such as NOP) to their string. Prepending a sequence hand side of the figure on the next page outlines the creates a “ramp” or “sled” leading to the executable three logical areas of memory—text (instructions), code. In such cases, the modified RA needs to point data, and stack—used by a process. During program only somewhere in the ramp to enable a successful execution, when a function is called, a “stack frame” attack. While it still takes some effort to find the is allocated function arguments, return address, previ- proper range, an attacker needs to make only a close ous frame pointer, and local variables. Each function guess to be able to hit the target. prologue pushes a stack frame onto the top of the Successfully modifying the return address allows stack, and each function epilogue pops, or deallo- the attacker to execute instructions with the same cates, the stack frame currently on top of the stack. privileges as that of the attacked program. If the com- The return address in the frame points to the next promised program is running as root, the attacker instruction to execute after the current function might use the injected code to spawn a super-user returns. This storage and retrieval of the address of the shell and take control of the machine. In the case of next instruction on the stack introduces a vulnerabil- worms, a copy of the worm program is installed, and ity that allows an attacker to cause a program to exe- the system begins looking for more machines to cute arbitrary code. infect. To illustrate how this might happen, consider the following C function: REDIRECTING PROGRAM EXECUTION As prevention methods have been developed and int foo(int a, int b) { attacks have become more sophisticated over the char homedir[100]; past 20 years, many variants of the basic buffer over- ... flow attack have been developed by both attackers strcpy(homedir,getenv(“HOME”)); and researchers to bypass protection methods. In ... addition to the buffer overflow attack, a format return(1); string attack in C can be used to overwrite the return } address. Format string attacks are relatively new and thought to have gained widespread notice through If an overflow occurs when strcpy() copies the postings to the BUGTRAQ computer security mail- result from getenv() into the local variable home- ing list [9]. dir, the copied data continues to be written toward An attacker might use two general methods— the high end of memory (higher up in the figure), direct and indirect—to change the stored return eventually overwriting other data on the stack, address in the stack. We earlier described a direct including the stored return address (RA) value. attack in which a local buffer is overwritten, continu- Overwriting causes function foo() to return execu- ing until an RA value is changed. In an indirect tion to whatever address happens to lie in the RA attack, a pointer to the stored return address is used to storage location. In most cases, this type of corrup- cause the modification of only the stored value, not tion results in a program crash (such as a “segmenta- the surrounding data. Indirect attacks involve far tion fault” or “bus error” message). However, more dependencies but were specially developed to attackers can select the value to place in the return avoid methods used to prevent direct attacks. By address in order to redirect execution to the location making the assignment via a pointer, attackers are of their choosing. If it contains machine code, the able to jump over any protection or boundary that attacker causes the program to execute any arbitrary might exist between the buffer and the stored return set of instructions—essentially taking control of the address. process. Program control is sometimes directed through A buffer overflow usually contains both executable function pointers (such as continuations and error code and the address where that code is stored on the handlers). Attackers modifying the pointer value as
52 November 2005/Vol. 48, No. 11 COMMUNICATIONS OF THE ACM
part of an overflow attack ers to audit the source can redirect program exe- high end of memory code of a free, BSD-based cution without modifying operating system. This an RA. Function pointers ... analysis requires much are vulnerable to both arg n time, and its effectiveness direct and indirect attacks depends on the expertise as well. PC program code ... of the auditors. However, The final characteristic literal pool arg 1 the payoff can be notice- of an attack is based on return address able, as reflected in the static data where in memory the exe- fact that OpenBSD has cution is redirected. The stack FP previous FP one of the best reputa- best-known approach is local var 1 tions for security and his- to write shellcode in one torically lowest rates of ... of three ways: into the remote vulnerabilities, as buffer being overflowed, local var n calculated by the statistics above the RA on the SP SP of reported vulnerabilities stack, or in the heap. A heap (via postings to the second approach is the BUGTRAQ mailing return-to-libc attack, low end of memory list, ww.securitymap.net/ which was invented to sdm/docs/general/Bugraq- deliberately bypass pro- stat/stats.html). tection methods prevent- Memory layout of a Tools designed for automatic source code analysis stack frame after a function ing user data from being has been called. complement manual audits by identifying potential treated as program code. security violations, including functions that perform This attack strategy Brodley fig unbounded 1 (11/05) string copying. Some of the best-known bypasses some protection methods by redirecting exe- tools are ITS4 (www.cigital.com/its4/), RATS cution to the system() library function in libc (www.securesw.com/rats/), and LCLint [7]. An with the argument “/bin/sh” (placed on the stack by extensive list of auditing tools is provided by the Sar- the attacker). For more on how buffer overflows are donix portal at sardonix.org/Auditing_Resources.html. written, see [1, 10]. Most buffer overflow vulnerabilities are due to the presence of unbounded copying functions or VULNERABILITY unchecked buffer lengths in programming languages PREVENTION TECHNIQUES like C. One way to prevent programs from having Fortunately for security-minded application develop- such vulnerabilities is to write them using a language ers, as well as for end users, extensive research has (such as Java or Pascal) that performs bound check- focused on tools and techniques for preventing (and ing. However, such languages often lack the low- detecting) buffer overflow vulnerabilities. Techniques level data manipulation needed by some are categorized into four basic groups—static analy- applications. Therefore, researchers have produced sis, compiler modifications, operating system modifi- “more secure” versions of C that are mostly compat- cations, and hardware modifications—that can often ible with existing programs but add additional secu- be combined to provide a layered approach to the rity features. Cyclone [5] is one such C-language problem. variant. Unfortunately, the performance cost of One of the best ways to prevent the exploitation of bounds checking (reported in [5]) involves up to an buffer overflow vulnerabilities is to detect and elimi- additional 100% overhead. nate them from the source code before the software is These solutions assume the analyst has access to put to use, usually by performing some sort of static and can modify a program’s source code. However, analysis on either the source code or on the compiled this assumption does not hold in all circumstances binaries. (such as in legacy applications and commercial soft- A proven technique for uncovering flaws in soft- ware). A technique described in [11] makes it possi- ware is source code review, also known as source code ble to rewrite an existing binary to keep track of auditing. Among the various efforts along these lines, return addresses and verify they have not been the best known is the OpenBSD project changed without needing the source code. The worst (www.openbsd.org). Since 1996, the OpenBSD reported overhead of this technique was 3.44% in group has assigned as many as 12 volunteer develop- [11] for instrumenting Microsoft PowerPoint.
COMMUNICATIONS OF THE ACM November 2005/Vol. 48, No. 11 53
assumption made by the compiler (or designer of the modified compiler)) is that a buffer overflow attack is detectable, because in order to reach the stored address, it had to first overwrite the canary. Stack- Guard uses a special fixed value (called a terminating canary) composed of the four bytes—NULL, CR, LF, and EOF—most commonly used to terminate some sort of string copy. It would be difficult, if not impos- sible, for attackers to insert this value as part of their exploit string; such attacks are thus easily detected. The ProPolice compiler (also known as the stack- ONE OF THE BEST smashing protector, or SSP, www.research. WAYS TO PREVENT ibm.com/trl/projects/security/ssp/) protects against direct attacks with a mechanism similar to Stack- THE EXPLOITATION Guard. In addition, ProPolice reorders the memory OF BUFFER OVERFLOW locations of variables, so pointers are below arrays and pointers from arguments are before local variables. VULNERABILITIES is to Having pointers below arrays helps prevent indirect attacks; having pointers from arguments before local detect and eliminate them variables makes it more likely that a buffer overflow from the source code before the will be detected. StackShield is a Linux security add-on (an assem- software is put to use, usually by bler file preprocessor) that works with the gcc com- performing some sort of static piler to add protection from both direct and indirect buffer overflow attacks (www.angelfire.com/sk/stack- analysis on either the source code shield/). It operates by adding instructions during compilation that cause programs to maintain a sepa- or on the compiled binaries. rate stack of return addresses in a different data seg- ment. It would be difficult or impossible for an attacker to modify both the return address in the stack segment and the copy in the data segment through a single unbounded string copy. During a function return, the two values are compared by the inserted function epilogue; an alert is raised if they do not match. StackShield also provides a secondary protection mechanism: implementing a range check on both function call and function return addresses. If a pro- gram attempts to make a function call outside a pre- defined range or if a function returns to a location COMPILER MODIFICATIONS outside that range, then the software presumes an If the source code is available, a developer can add attack has taken place and terminates the process. buffer overflow detection automatically to a pro- This termination trigger mechanism also allows soft- gram by using a modified compiler; four such com- ware to protect against function pointer attacks. pilers are StackGuard, ProPolice, StackShield, and RAD [3] is a patch to gcc that automatically adds Return Address Defender (RAD). One technique for protection code to the prologues and epilogues of preventing buffer overflow attacks is a modified C- function calls. It stores a second copy of return language compiler that automatically inserts detec- addresses in a repository (similar to StackShield), then tion code into a program when compiled. uses operating system-memory-protection functions StackGuard [4] detects direct attacks against the to detect attacks against this repository. RAD either stored RA by inserting a marker (called a canary) makes the entire repository read-only (causing signif- between the frame pointer and the return address on icant performance degradation) or marks neighboring the stack. Before a function returns, the canary is read pages as read-only (minor overhead but avoidable by off the stack and tested for modification. The an indirect attack).
54 November 2005/Vol. 48, No. 11 COMMUNICATIONS OF THE ACM
OPERATING SYSTEM MODIFICATIONS checks in system programs (msdn.microsoft.com/ Several protection mechanisms operate by modify- security/productinfo/xpsp2/). ing some aspect of the operating system. Because Other security-related programming techniques are many buffer overflow attacks take place by loading based on restricting a program’s control flow. executable code onto the stack and redirecting exe- Although they are not designed to detect buffer over- cution there, one of the simpler approaches to flow attacks, they mitigate their effects by restricting defending against them is to modify the stack seg- what can be executed after an attack takes place. ment so it is nonexecutable. This prevents attackers Proof-carrying code is one such technique [8]; binary from directing control to code they have uploaded programs are bundled with a machine-verifiable into the stack. However, an attacker can still direct “proof” of what the program is going to do. As the execution to either code uploaded in the heap or to program executes, that behavior is observed by a secu- an existing function (such as system() in libc). rity monitor and compared against the proof by a new Most Unix-like operating systems have an optional addition to the operating system kernel. Any devia- patch or configuration switch that removes execute tions are noticed by the monitor (which might be in permissions from the program stack. the kernel), and the program can be killed. Another A library modification called Libsafe [2] intercepts technique is “program shepherding” [6], which all calls to functions known to be vulnerable and exe- requires the verification of every branch instruction cutes a “safe version” of the calls. The safe versions and verifies they match a given security policy. It is estimate an upper limit for the size of the target buffer. done by restricting where executable code can be Since it is highly unlikely that a program would delib- located in memory, restricting where control transfers erately overwrite a frame boundary, copies into buffers (such as jump, call, and return) can take place, along are bounded by the top of the frame in which they with their destinations, and adding “sandboxing,” or reside. Libsafe doesn’t require the recompilation of access restrictions, on other operations. Shepherding programs. Unfortunately, library modifications add is for the MIT-run Runtime Introspection and Opti- protection for only a subset of functions and only in mization operating system on IA-32 platforms dynamically linked programs. Many security-critical (www.cag.lcs.mit.edu/rio/). Its reported worst-case applications are compiled statically, making it possible performance on SPEC2000 benchmarks was over in some instances for a determined attacker to bypass 70% on Linux and 660% on Windows NT. the modified libraries. Perhaps the most comprehensive set of changes to HARDWARE MODIFICATION an operating system for detecting and preventing Any technique that performs buffer overflow detec- buffer overflows was introduced in May 2003 in the tion will exact a performance cost from the system release of OpenBSD 3.3 (www.openbsd.org/ employing it. Depending on the technique, it can 33.html). The developer first modifies binaries to vary from 4% to over 1,000%, as reported by vari- make it more difficult for an attacker to be able to ous researchers. One way to reduce execution time is exploit a buffer overflow in any system program. The to move operations from software to hardware able changes combine stack-gap randomization with the to execute the same operations possibly tens or hun- ProPolice compiler to make it more difficult for dreds of times faster. scripted attacks to succeed; detection capabilities were The SmashGuard proposal [10] uses a modifica- also added. Second, a developer modifies the memory tion of the microcoded instructions for the CALL and segments allocated by the operating system to remove RET opcodes in a CPU to enable transparent protec- execute permissions from as many places as possible tion against buffer overflow attacks. (We are members and ensure that no segment is both writable and exe- of the SmashGuard project.) SmashGuard takes cutable when in user mode. These memory-segment advantage of the fact that a modern CPU has sub- changes made it much more difficult for attackers to stantial memory space on the chip and creates a sec- find code to run that is already present and impossi- ondary stack that holds return addresses similar to the ble for attackers to upload their own. return address repository employed by StackShield. Microsoft has been pushing its in-house developers Unlike StackShield, the SmashGuard modifications to to perform source-code auditing and use automated the CPU microcode make it possible to add protec- bounds-checking tools. It announced that beginning tion without having to modify the software. with Service Pack 2 for Windows XP (August 2004), The CALL instruction is modified such that it a number of security protections would be built into transparently stores a copy of the return address on a the operating system, including making memory data stack within the processor itself. The RET nonexecutable on newer processors and buffer length instruction compares the top of the hardware stack
COMMUNICATIONS OF THE ACM November 2005/Vol. 48, No. 11 55