In recent years Linux distributions started treating security more seriously. Out of many security features two are directly affecting C programmers: -fstack-protector and -D_FORTIFY_SOURCE=2. These GCC options are now enabled by default on Ubuntu and Fedora.

What do these options do?

-fstack-protector

Consider the following C function:

void
fun()
{

char
*buf
=
alloca(0x100);

/* Don't allow gcc to optimise away the buf */

asm
volatile(""
::
"m"
(buf));

}

Compiled without the stack protector, with -fno-stack-protector option, GCC produces the following assembly:

<fun>:

push %ebp ; prologue

mov %esp,%ebp

 

sub $0x128,%esp ; reserve 0x128B on the stack

lea 0xf(%esp),%eax ; eax = esp +
0xf

and $0xfffffff0,%eax ; align eax

mov %eax,-0xc(%ebp)
; save eax in the stack frame

 

leave ; epilogue

ret

On the other hand with -fstack-protector option GCC adds protection code to your functions that use alloca or have buffers larger than 8 bytes. Additional code ensures the stack did not overflow. Here's the generated assembly:

<fun>:

push %ebp ; prologue

mov %esp,%ebp

 

sub $0x128,%esp ; reserve 0x128B on the stack

 

mov %gs:0x14,%eax ; load stack canary using gs

mov %eax,-0xc(%ebp)
; save it in the stack frame

xor %eax,%eax ; clear the register

 

lea 0xf(%esp),%eax ; eax = esp +
0xf

and $0xfffffff0,%eax ; align eax

mov %eax,-0x10(%ebp) ; save eax in the stack frame

 

mov -0xc(%ebp),%eax ; load canary

xor %gs:0x14,%eax ; compare against one in gs

<fun+0x2f>

<__stack_chk_fail@plt>

 

leave ; epilogue

ret

After a function prologue a canary is loaded and saved into the stack. Later, just before the epilogue the canary is verified against the original. If the values don't match the program exits with an appropriate message. This can protect against some buffer overflow attacks. It incurs some performance penalty but it seems to be worth the benefit.

When the stack is overwritten and __stack_chk_fail branch is taken the program crashes with a message like this:

***
stack
smashing
detected
***:
./protected
terminated

=======
Backtrace:
=========

/lib/i386-linux-gnu/libc.so.6(__fortify_fail+0x45)[0xf76da0e5]

/lib/i386-linux-gnu/libc.so.6(+0x10409a)[0xf76da09a]

./protected[0x80484de]

./protected[0x80483d7]

/lib/i386-linux-gnu/libc.so.6(__libc_start_main+0xf3)[0xf75ef4d3]

./protected[0x8048411]

=======
Memory
map:
========

08048000-08049000
r-xp

00:13

./protected

08049000-0804a000
r--p

00:13

./protected

0804a000-0804b000
rw-p

00:13

./protected

092e5000-09306000
rw-p

00:00

[heap]

f759e000-f75ba000
r-xp

08:01

/lib/i386-linux-gnu/libgcc_s.so.1

f75ba000-f75bb000
r--p
0001b000
08:01

/lib/i386-linux-gnu/libgcc_s.so.1

f75bb000-f75bc000
rw-p
0001c000
08:01

/lib/i386-linux-gnu/libgcc_s.so.1

f75d5000-f75d6000
rw-p

00:00

f75d6000-f7779000
r-xp

08:01

/lib/i386-linux-gnu/libc-2.15.so

f7779000-f777b000
r--p
001a3000
08:01

/lib/i386-linux-gnu/libc-2.15.so

f777b000-f777c000
rw-p
001a5000
08:01

/lib/i386-linux-gnu/libc-2.15.so

f777c000-f777f000
rw-p

00:00

f7796000-f779a000
rw-p

00:00

f779a000-f779b000
r-xp

00:00

[vdso]

f779b000-f77bb000
r-xp

08:01

/lib/i386-linux-gnu/ld-2.15.so

f77bb000-f77bc000
r--p
0001f000
08:01

/lib/i386-linux-gnu/ld-2.15.so

f77bc000-f77bd000
rw-p

08:01

/lib/i386-linux-gnu/ld-2.15.so

ffeb2000-ffed3000
rw-p

00:00

[stack]

Aborted

-D_FORTIFY_SOURCE=2

Sample C code:

void
fun(char
*s)
{

char
buf[0x100];

strcpy(buf,
s);

/* Don't allow gcc to optimise away the buf */

asm
volatile(""
::
"m"
(buf));

}

Compiled without the code fortified, with -U_FORTIFY_SOURCE option:

<fun>:

push %ebp ; prologue

mov %esp,%ebp

 

sub $0x118,%esp ; reserve 0x118B on the stack

mov 0x8(%ebp),%eax ; load parameter `s` to eax

mov %eax,0x4(%esp)
; save parameter for strcpy

lea -0x108(%ebp),%eax ; count `buf`
in eax

mov %eax,(%esp)
; save parameter for strcpy

<strcpy@plt>

 

leave ; epilogue

ret

With -D_FORTIFY_SOURCE=2:

<fun>:

push %ebp ; prologue

mov %esp,%ebp

 

sub $0x118,%esp ; reserve 0x118B on the stack

movl $0x100,0x8(%esp) ; save value 0x100 as parameter

mov 0x8(%ebp),%eax ; load parameter `s` to eax

mov %eax,0x4(%esp) ; save parameter for strcpy

lea -0x108(%ebp),%eax ; count `buf` in eax

mov %eax,(%esp)
; save parameter for strcpy

<__strcpy_chk@plt>

 

leave ; epilogue

ret

You can see GCC generated some additional code. This time instead of calling strcpy(dst, src) GCC automatically calls __strcpy_chk(dst, src, dstlen). With FORTIFY_SOURCE whenever possible GCC tries to uses buffer-length aware replacements for functions like strcpy, memcpy, memset, etc.

Again, this prevents some buffer overflow attacks. Of course you should avoidstrcpy and always use strncpy, but it's worth noting that FORTIFY_SOURCE can also help with strncpy when GCC knows the destination buffer size. For example:

void
fun(char
*s,
int
l)
{

char
buf[0x100];

strncpy(buf,
s,
l);

asm
volatile(""
::
"m"
(buf[0]));

}

Here GCC instead of calling strncpy(dst, src, l) will call__strncpy_chk(dst, src, l, 0x100) as GCC is aware of the size of the destination buffer.

When the buffer is overrun the program fails with a message very similar to the one seen previously. Instead of "stack smashing detected" you'll see "buffer overflow detected" headline:

***
buffer
overflow
detected
***:
./fortified
terminated

=======
Backtrace:
=========

/lib/i386-linux-gnu/libc.so.6(__fortify_fail+0x45)[0xf76d30e5]

/lib/i386-linux-gnu/libc.so.6(+0x102eba)[0xf76d1eba]

/lib/i386-linux-gnu/libc.so.6(+0x1021ed)[0xf76d11ed]

./fortified[0x8048488]

./fortified[0x80483a7]

/lib/i386-linux-gnu/libc.so.6(__libc_start_main+0xf3)[0xf75e84d3]

./fortified[0x80483e1]

=======
Memory
map:
========

08048000-08049000
r-xp

00:13

./fortified

08049000-0804a000
r--p

00:13

./fortified

0804a000-0804b000
rw-p

00:13

./fortified

08d6b000-08d8c000
rw-p

00:00

[heap]

f7597000-f75b3000
r-xp

08:01

/lib/i386-linux-gnu/libgcc_s.so.1

f75b3000-f75b4000
r--p
0001b000
08:01

/lib/i386-linux-gnu/libgcc_s.so.1

f75b4000-f75b5000
rw-p
0001c000
08:01

/lib/i386-linux-gnu/libgcc_s.so.1

f75ce000-f75cf000
rw-p

00:00

f75cf000-f7772000
r-xp

08:01

/lib/i386-linux-gnu/libc-2.15.so

f7772000-f7774000
r--p
001a3000
08:01

/lib/i386-linux-gnu/libc-2.15.so

f7774000-f7775000
rw-p
001a5000
08:01

/lib/i386-linux-gnu/libc-2.15.so

f7775000-f7778000
rw-p

00:00

f778f000-f7793000
rw-p

00:00

f7793000-f7794000
r-xp

00:00

[vdso]

f7794000-f77b4000
r-xp

08:01

/lib/i386-linux-gnu/ld-2.15.so

f77b4000-f77b5000
r--p
0001f000
08:01

/lib/i386-linux-gnu/ld-2.15.so

f77b5000-f77b6000
rw-p

08:01

/lib/i386-linux-gnu/ld-2.15.so

fff8d000-fffae000
rw-p

00:00

[stack]

Aborted

 

SRC=https://idea.popcount.org/2013-08-15-fortify_source/

FORTIFY_SOURCE的更多相关文章

  1. gcc和g++

    一.GCC GNU编译器套件(GNU Compiler Collection)包括C.C++.Objective-C.Fortran.Java.Ada和Go语言的前端,也包括了这些语言的库(如libs ...

  2. Android 1.5-7.0(持续更新)安全机制一览

    Android 1.5 ProPolice to prevent stack buffer overruns (-fstack-protector),在缓冲区buffer与返回地址之间加入Canary ...

  3. Pwn入坑指南

    栈溢出原理 参考我之前发的一篇 Windows栈溢出原理 还有 brant 师傅的<0day安全笔记> Pwn常用工具 gdb:Linux下程序调试 PEDA:针对gdb的python漏洞 ...

  4. Linux下pwn从入门到放弃

    Linux下pwn从入门到放弃 0x0 简介 pwn,在安全领域中指的是通过二进制/系统调用等方式获得目标主机的shell. 虽然web系统在互联网中占有比较大的分量,但是随着移动端,ioT的逐渐流行 ...

  5. OWASP固件安全性测试指南

    OWASP固件安全性测试指南 固件安全评估,英文名称 firmware security testing methodology 简称 FSTM.该指导方法主要是为了安全研究人员.软件开发人员.顾问. ...

  6. Linux保护机制和绕过方式

    Linux保护机制和绕过方式 CANNARY(栈保护) ​ 栈溢出保护是一种缓冲区溢出攻击缓解手段,当函数存在缓冲区溢出攻击漏洞时,攻击者可以覆盖栈上的返回地址来让shellcode能够得到执行.用C ...

  7. PWN二进制漏洞学习指南

    目录 PWN二进制漏洞学习指南 前言 前置技能 PWN概念 概述 发音 术语 PWN环境搭建 PWN知识学习途径 常见漏洞 安全机制 PWN技巧 PWN相关资源博客 Pwn菜鸡小分队 PWN二进制漏洞 ...

  8. 2020ACTF pwn writeup

    为了打2021的ACTF,想着把2020年的pwn题做一做吧,发现2020年的pwn题质量还挺高的.反倒是2021年的题目质量不太高,好像是没有专门的pwn师傅出题,可以理解,毕竟办校赛,说白了就是用 ...

  9. WHUCTF PWN题目

    花了大概两天时间来做WHUCTF的题目,第一次排名这么靠前.首先感谢武汉大学举办这次萌新赛,也感谢fmyy的师傅的耐心指导,让我第一次做出堆的题目来. pwnpwnpwn 这是一道栈题目,32位程序, ...

随机推荐

  1. 实例化flask的参数及对app的配置

    Flask 是一个非常灵活且短小精干的web框架 , 那么灵活性从什么地方体现呢? 有一个神奇的东西叫 Flask配置 , 这个东西怎么用呢? 它能给我们带来怎么样的方便呢? 首先展示一下: from ...

  2. 345 Reverse Vowels of a String 反转字符串中的元音字母

    编写一个函数,以字符串作为输入,反转该字符串中的元音字母.示例 1:给定 s = "hello", 返回 "holle".示例 2:给定 s = "l ...

  3. 通过UDP建立TCP连接

    解释 通过UDP广播查询服务器的IP地址,然后再建立TCP点对点连接. 应用场景 在服务器IP未知时,并且已知服务器与客户端明确在一个局域网或者允许组播的子网下. 通过UDP发现服务器地址然后再进行T ...

  4. C#入门经典 Chapter3 变量和表达式

    3.1 C#基本语法 分号结束语句 花括号字符不需要附带分号 缩进     注释:/*....*/,//,/// 区分大小写 3.2 C#控制台应用程序的基本结构 namespace Chapter3 ...

  5. 高级Java知识

    高级Java知识(JVM.字节码.内存模型) 内存=方法区+栈空间+堆+程序计数器 栈(stack)包括虚拟机栈(VM stack)和本地方法栈(native method stack). 方法区(m ...

  6. html5——渐变

    线性渐变 <style> div { width: 700px; height: 100px; /*方向:从右向左*/ /*起始颜色:黄色*/ /*终止颜色:绿色*/ background ...

  7. oracle sql*loader的使用

    用法: SQLLDR keyword=value [,keyword=value,...] 有效的关键字:     userid -- ORACLE 用户名/口令    control -- 控制文件 ...

  8. 查看APK包名签名等信息

    有些游戏第三方比如分享需要配置游戏包名和签名,不同渠道包名签名又不同,所以时常需要查看不同apk包等签名信息,之前是使用等微博开放平台的手机客户端查看apk签名,前提是知道包名,网上找了下查看签名和包 ...

  9. js >> 右移操作符

    十进制 十六进制 二进制 右移>> 十进制值 F 1F FF

  10. C# 获取表中最大值

    ; if (db.LPicture.Any()) { // LPicture Newmode = db.LPicture.Where(n => ).FirstOrDefault(); start ...