Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
C
cwe_checker
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
fact-depend
cwe_checker
Commits
af4219f4
Unverified
Commit
af4219f4
authored
Nov 05, 2020
by
Enkelmann
Committed by
GitHub
Nov 05, 2020
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
reimplement check for CWE467 in Rust (#100)
parent
af37d36e
Hide whitespace changes
Inline
Side-by-side
Showing
4 changed files
with
205 additions
and
0 deletions
+205
-0
checkers.rs
cwe_checker_rs/src/checkers.rs
+1
-0
cwe_467.rs
cwe_checker_rs/src/checkers/cwe_467.rs
+165
-0
lib.rs
cwe_checker_rs/src/lib.rs
+1
-0
lib.rs
test/src/lib.rs
+38
-0
No files found.
cwe_checker_rs/src/checkers.rs
View file @
af4219f4
pub
mod
cwe_467
;
pub
mod
cwe_560
;
pub
mod
cwe_560
;
pub
mod
cwe_676
;
pub
mod
cwe_676
;
pub
mod
cwe_782
;
pub
mod
cwe_782
;
cwe_checker_rs/src/checkers/cwe_467.rs
0 → 100644
View file @
af4219f4
//! This module implements a check for CWE-467: Use of sizeof() on a Pointer Type.
//!
//! Functions like malloc and memmove take a size parameter of some data size as
//! input. If accidentially the size of a pointer to the data instead of the size of
//! the data itself gets passed to the function, this can have severe consequences.
//!
//! See <https://cwe.mitre.org/data/definitions/467.html> for a detailed description.
//!
//! ## How the check works
//!
//! We check whether a parameter in a call to a function listed in the symbols for CWE467 (configurable in in config.json)
//! is an immediate value that equals the size of a pointer (e.g. 4 bytes on x86).
//!
//! ## False Positives
//!
//! - The size value might be correct and not a bug.
//!
//! ## False Negatives
//!
//! - If the incorrect size value is generated before the basic block that contains
//! the call, the check will not be able to find it.
use
crate
::
abstract_domain
::{
BitvectorDomain
,
DataDomain
};
use
crate
::
analysis
::
pointer_inference
::
State
;
use
crate
::
intermediate_representation
::
*
;
use
crate
::
prelude
::
*
;
use
crate
::
utils
::
log
::{
CweWarning
,
LogMessage
};
use
crate
::
CweModule
;
use
std
::
collections
::
HashMap
;
pub
static
CWE_MODULE
:
CweModule
=
CweModule
{
name
:
"CWE467"
,
version
:
"0.2"
,
run
:
check_cwe
,
};
/// Function symbols read from *config.json*.
/// All parameters of these functions will be checked on whether they are pointer sized.
#[derive(Serialize,
Deserialize,
Debug,
PartialEq,
Eq,
Hash,
Clone)]
pub
struct
Config
{
symbols
:
Vec
<
String
>
,
}
/// Get a map from TIDs to the corresponding extern symbol struct.
/// Only symbols contained in `symbols_to_check` are contained in the map.
fn
get_symbol_map
<
'a
>
(
project
:
&
'a
Project
,
symbols_to_check
:
&
[
String
],
)
->
HashMap
<
Tid
,
&
'a
ExternSymbol
>
{
let
mut
tid_map
=
HashMap
::
new
();
for
symbol_name
in
symbols_to_check
{
if
let
Some
((
tid
,
symbol
))
=
project
.program
.term
.extern_symbols
.iter
()
.find_map
(|
symbol
|
{
if
symbol
.name
==
*
symbol_name
{
Some
((
symbol
.tid
.clone
(),
symbol
))
}
else
{
None
}
})
{
tid_map
.insert
(
tid
,
symbol
);
}
}
tid_map
}
/// Compute the program state at the end of the given basic block
/// assuming nothing is known about the state at the start of the block.
fn
compute_block_end_state
(
project
:
&
Project
,
block
:
&
Term
<
Blk
>
)
->
State
{
let
stack_register
=
&
project
.stack_pointer_register
;
let
mut
state
=
State
::
new
(
stack_register
,
block
.tid
.clone
());
for
def
in
block
.term.defs
.iter
()
{
match
&
def
.term
{
Def
::
Store
{
address
,
value
}
=>
{
let
_
=
state
.handle_store
(
address
,
value
);
}
Def
::
Assign
{
var
,
value
}
=>
{
let
_
=
state
.handle_register_assign
(
var
,
value
);
}
Def
::
Load
{
var
,
address
}
=>
{
let
_
=
state
.handle_load
(
var
,
address
);
}
}
}
state
}
/// Check whether a parameter value of the call to `symbol` has value `sizeof(void*)`.
fn
check_for_pointer_sized_arg
(
project
:
&
Project
,
block
:
&
Term
<
Blk
>
,
symbol
:
&
ExternSymbol
,
)
->
bool
{
let
pointer_size
=
project
.stack_pointer_register.size
;
let
state
=
compute_block_end_state
(
project
,
block
);
for
parameter
in
symbol
.parameters
.iter
()
{
if
let
Ok
(
DataDomain
::
Value
(
BitvectorDomain
::
Value
(
param_value
)))
=
state
.eval_parameter_arg
(
parameter
,
&
project
.stack_pointer_register
)
{
if
Ok
(
u64
::
from
(
pointer_size
))
==
param_value
.try_to_u64
()
{
return
true
;
}
}
}
false
}
/// Generate the CWE warning for a detected instance of the CWE.
fn
generate_cwe_warning
(
jmp
:
&
Term
<
Jmp
>
,
extern_symbol
:
&
ExternSymbol
)
->
CweWarning
{
CweWarning
::
new
(
CWE_MODULE
.name
,
CWE_MODULE
.version
,
format!
(
"(Use of sizeof on a Pointer Type) sizeof on pointer at {} ({})."
,
jmp
.tid.address
,
extern_symbol
.name
),
)
.tids
(
vec!
[
format!
(
"{}"
,
jmp
.tid
)])
.addresses
(
vec!
[
jmp
.tid.address
.clone
()])
}
/// Check whether a symbol contained in `symbol_map` is called at the end of the given basic block.
fn
block_calls_symbol
<
'a
>
(
block
:
&
'a
Term
<
Blk
>
,
symbol_map
:
&
HashMap
<
Tid
,
&
'a
ExternSymbol
>
,
)
->
Option
<
(
&
'a
Term
<
Jmp
>
,
&
'a
ExternSymbol
)
>
{
for
jump
in
block
.term.jmps
.iter
()
{
if
let
Jmp
::
Call
{
target
,
..
}
=
&
jump
.term
{
if
let
Some
(
symbol
)
=
symbol_map
.get
(
target
)
{
return
Some
((
jump
,
symbol
));
}
}
}
None
}
/// Execute the CWE check.
///
/// For each call to an extern symbol from the symbol list configured in the configuration file
/// we check whether a parameter has value `sizeof(void*)`,
/// which may indicate an instance of CWE 467.
pub
fn
check_cwe
(
project
:
&
Project
,
cwe_params
:
&
serde_json
::
Value
,
)
->
(
Vec
<
LogMessage
>
,
Vec
<
CweWarning
>
)
{
let
config
:
Config
=
serde_json
::
from_value
(
cwe_params
.clone
())
.unwrap
();
let
mut
cwe_warnings
=
Vec
::
new
();
let
symbol_map
=
get_symbol_map
(
project
,
&
config
.symbols
);
for
sub
in
project
.program.term.subs
.iter
()
{
for
block
in
sub
.term.blocks
.iter
()
{
if
let
Some
((
jmp
,
symbol
))
=
block_calls_symbol
(
block
,
&
symbol_map
)
{
if
check_for_pointer_sized_arg
(
project
,
block
,
symbol
)
{
cwe_warnings
.push
(
generate_cwe_warning
(
jmp
,
symbol
))
}
}
}
}
(
Vec
::
new
(),
cwe_warnings
)
}
cwe_checker_rs/src/lib.rs
View file @
af4219f4
...
@@ -51,6 +51,7 @@ impl std::fmt::Display for CweModule {
...
@@ -51,6 +51,7 @@ impl std::fmt::Display for CweModule {
/// Get a list of all known analysis modules.
/// Get a list of all known analysis modules.
pub
fn
get_modules
()
->
Vec
<&
'static
CweModule
>
{
pub
fn
get_modules
()
->
Vec
<&
'static
CweModule
>
{
vec!
[
vec!
[
&
crate
::
checkers
::
cwe_467
::
CWE_MODULE
,
&
crate
::
checkers
::
cwe_560
::
CWE_MODULE
,
&
crate
::
checkers
::
cwe_560
::
CWE_MODULE
,
&
crate
::
checkers
::
cwe_782
::
CWE_MODULE
,
&
crate
::
checkers
::
cwe_782
::
CWE_MODULE
,
&
crate
::
checkers
::
cwe_676
::
CWE_MODULE
,
&
crate
::
checkers
::
cwe_676
::
CWE_MODULE
,
...
...
test/src/lib.rs
View file @
af4219f4
...
@@ -240,6 +240,44 @@ mod tests {
...
@@ -240,6 +240,44 @@ mod tests {
#[test]
#[test]
#[ignore]
#[ignore]
fn
cwe_467
()
{
let
mut
error_log
=
Vec
::
new
();
let
mut
tests
=
linux_test_cases
(
"cwe_467"
,
"CWE467"
);
// Only one instance is found.
// Other instance cannot be found, since the constant is not defined in the basic block of the call instruction.
mark_skipped
(
&
mut
tests
,
"arm"
,
"clang"
);
mark_skipped
(
&
mut
tests
,
"mips"
,
"clang"
);
mark_skipped
(
&
mut
tests
,
"mipsel"
,
"clang"
);
// Ghidra does not recognize all extern function calls in the disassembly step for MIPS.
// Needs own control flow graph analysis to be fixed.
mark_skipped
(
&
mut
tests
,
"mips64"
,
"clang"
);
mark_skipped
(
&
mut
tests
,
"mips64el"
,
"clang"
);
mark_skipped
(
&
mut
tests
,
"mips"
,
"gcc"
);
mark_skipped
(
&
mut
tests
,
"mipsel"
,
"gcc"
);
mark_architecture_skipped
(
&
mut
tests
,
"ppc64"
);
// Ghidra generates mangled function names here for some reason.
mark_architecture_skipped
(
&
mut
tests
,
"ppc64le"
);
// Ghidra generates mangled function names here for some reason.
// This is a bug in the handling of sub-registers.
// Register `ECX` is read, but the analysis doesn't know that `ECX` is a sub-register of `RCX`.
mark_skipped
(
&
mut
tests
,
"x64"
,
"clang"
);
for
test_case
in
tests
{
let
num_expected_occurences
=
2
;
if
let
Err
(
error
)
=
test_case
.run_test
(
"[CWE467]"
,
num_expected_occurences
)
{
error_log
.push
((
test_case
.get_filepath
(),
error
));
}
}
if
!
error_log
.is_empty
()
{
print_errors
(
error_log
);
panic!
();
}
}
#[test]
#[ignore]
fn
cwe_560
()
{
fn
cwe_560
()
{
let
mut
error_log
=
Vec
::
new
();
let
mut
error_log
=
Vec
::
new
();
let
mut
tests
=
linux_test_cases
(
"cwe_560"
,
"CWE560"
);
let
mut
tests
=
linux_test_cases
(
"cwe_560"
,
"CWE560"
);
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment