CWE-463 对数据结构哨兵域的删除

Deletion of Data Structure Sentinel

结构: Simple

Abstraction: Base

状态: Incomplete

被利用可能性: unkown

基本描述

The accidental deletion of a data-structure sentinel can cause serious programming logic problems.

扩展描述

Often times data-structure sentinels are used to mark structure of the data structure. A common example of this is the null character at the end of strings. Another common example is linked lists which may contain a sentinel to mark the end of the list. It is dangerous to allow this type of control data to be easily accessible. Therefore, it is important to protect from the deletion or modification outside of some wrapper interface which provides safety.

相关缺陷

  • cwe_Nature: ChildOf cwe_CWE_ID: 707 cwe_View_ID: 1000 cwe_Ordinal: Primary

  • cwe_Nature: PeerOf cwe_CWE_ID: 464 cwe_View_ID: 1000

适用平台

Language: [{'cwe_Name': 'C', 'cwe_Prevalence': 'Undetermined'}, {'cwe_Name': 'C++', 'cwe_Prevalence': 'Undetermined'}]

常见的影响

范围 影响 注释
['Availability', 'Other'] Other Generally this error will cause the data structure to not work properly.
['Authorization', 'Other'] Other If a control character, such as NULL is removed, one may cause resource access control problems.

可能的缓解方案

Architecture and Design

策略:

Use an abstraction library to abstract away risky APIs. Not a complete solution.

MIT-10 Build and Compilation

策略: Compilation or Build Hardening

Run or compile the software using features or extensions that automatically provide a protection mechanism that mitigates or eliminates buffer overflows. For example, certain compilers and extensions provide automatic buffer overflow detection mechanisms that are built into the compiled code. Examples include the Microsoft Visual Studio /GS flag, Fedora/Red Hat FORTIFY_SOURCE GCC flag, StackGuard, and ProPolice.

Operation

策略:

Use OS-level preventative functionality. Not a complete solution.

示例代码

This example creates a null terminated string and prints it contents.

bad C

char foo;
int counter;
foo=calloc(sizeof(char)
10);

for (counter=0;counter!=10;counter++) {
foo[counter]='a';

printf("%s\n",foo);
}

The string foo has space for 9 characters and a null terminator, but 10 characters are written to it. As a result, the string foo is not null terminated and calling printf() on it will have unpredictable and possibly dangerous results.

分类映射

映射的分类名 ImNode ID Fit Mapped Node Name
CLASP Deletion of data-structure sentinel

引用