KHB: Failure-oblivious computing
Posted Jul 4, 2006 9:02 UTC (Tue) by evgeny
In reply to: KHB: Failure-oblivious computing
Parent article: KHB: Failure-oblivious computing
> it not hard to think about otherwise perfectly safe programs that get exploitable if you just clip a buffer somewhere.
Might be; then do think a bit harder to come with a reasonable example proving it; the ones you suggested are absolutely irrelevant. Let's take the first one: say, a buffer is defined as char buf and the attacker manages to pass to it "Hello, world!" causing an overrun. Now, the failure-oblivious runtime notices this and clips the string to just "Hell" (plus the terminating zero). You say when "Hell" propogates further, it might cause a compromise. It could be of course, but my point is that the attacker could send this "Hell" in the first place, and get a successful exploit anyway, whether the buffer overruns are clipped or not. Such things are called a failure to sanitize user input. Do you follow?
to post comments)