Format string vulnerabilities
Last updated
Last updated
There are specified format strings in C which if not used correctly in code, can even allow an attacker to read random memory which may contain sensitive information.
Format strings:
Example of an attack:
Vulnerable code:
Here, in printf command, no format string is specified, so it will take in format of string provided in fgets and print it.
Giving %d and %x as input.
Explanation: %d: It reads whatever integer value is stored in the current execution stack. Not necessarily have to be value of an integer in the defined program, but just random value in memory that is a result of some other program that has executed before.
%x: reads hexadecimal value in stack.
This also means now we can read the STACK CANARY
Also, in some cases, passwords (by using %s for string):
A while ago, When you kept your Wi-Fi name as %n%n%n%n, it crashed iPhones as they read Wi-Fi names on the page.
Normal working: