161 lines
3.8 KiB
C
161 lines
3.8 KiB
C
|
/*
|
||
|
* Distributed under the terms of the GNU General Public License v2
|
||
|
* $Header: /var/cvsroot/gentoo-x86/sys-libs/glibc/files/2.3.2/ssp.c,v 1.1 2004/06/05 15:54:29 tseng Exp $
|
||
|
*
|
||
|
* This is a modified version of Hiroaki Etoh's stack smashing routines
|
||
|
* implemented for glibc.
|
||
|
*
|
||
|
* The following people have contributed input to this code.
|
||
|
* Ned Ludd - <solar[@]gentoo.org>
|
||
|
* Alexander Gabert - <pappy[@]gentoo.org>
|
||
|
* The PaX Team - <pageexec[@]freemail.hu>
|
||
|
* Peter S. Mazinger - <ps.m[@]gmx.net>
|
||
|
* Yoann Vandoorselaere - <yoann[@]prelude-ids.org>
|
||
|
* Robert Connolly - <robert[@]linuxfromscratch.org>
|
||
|
* Cory Visi <cory@visi.name>
|
||
|
*
|
||
|
*/
|
||
|
|
||
|
#ifdef HAVE_CONFIG_H
|
||
|
# include <config.h>
|
||
|
#endif
|
||
|
|
||
|
#include <stdio.h>
|
||
|
#include <string.h>
|
||
|
#include <fcntl.h>
|
||
|
#include <unistd.h>
|
||
|
#include <signal.h>
|
||
|
#include <sys/types.h>
|
||
|
#include <sys/socket.h>
|
||
|
#include <sys/un.h>
|
||
|
#include <sys/syslog.h>
|
||
|
#include <sys/time.h>
|
||
|
#include <sys/sysctl.h>
|
||
|
|
||
|
#ifndef _PATH_LOG
|
||
|
#define _PATH_LOG "/dev/log"
|
||
|
#endif
|
||
|
|
||
|
#ifdef __PROPOLICE_BLOCK_SEGV__
|
||
|
#define SSP_SIGTYPE SIGSEGV
|
||
|
#elif __PROPOLICE_BLOCK_KILL__
|
||
|
#define SSP_SIGTYPE SIGKILL
|
||
|
#else
|
||
|
#define SSP_SIGTYPE SIGABRT
|
||
|
#endif
|
||
|
|
||
|
unsigned long __guard = 0UL;
|
||
|
|
||
|
void
|
||
|
__guard_setup (void)
|
||
|
{
|
||
|
size_t size;
|
||
|
#ifdef HAVE_DEV_ERANDOM
|
||
|
int mib[3];
|
||
|
#endif
|
||
|
|
||
|
if (__guard != 0UL)
|
||
|
return;
|
||
|
|
||
|
#ifndef __SSP_QUICK_CANARY__
|
||
|
#ifdef HAVE_DEV_ERANDOM
|
||
|
/* Random is another depth in Linux, hence an array of 3. */
|
||
|
mib[0] = CTL_KERN;
|
||
|
mib[1] = KERN_RANDOM;
|
||
|
mib[2] = RANDOM_ERANDOM;
|
||
|
|
||
|
size = sizeof (unsigned long);
|
||
|
if (__sysctl (mib, 3, &__guard, &size, NULL, 0) != (-1))
|
||
|
if (__guard != 0UL)
|
||
|
return;
|
||
|
#endif
|
||
|
/*
|
||
|
* Attempt to open kernel pseudo random device if one exists before
|
||
|
* opening urandom to avoid system entropy depletion.
|
||
|
*/
|
||
|
{
|
||
|
int fd;
|
||
|
#ifdef HAVE_DEV_ERANDOM
|
||
|
if ((fd = open ("/dev/erandom", O_RDONLY)) == (-1))
|
||
|
#endif
|
||
|
fd = open ("/dev/urandom", O_RDONLY);
|
||
|
if (fd != (-1))
|
||
|
{
|
||
|
size = read (fd, (char *) &__guard, sizeof (__guard));
|
||
|
close (fd);
|
||
|
if (size == sizeof (__guard))
|
||
|
return;
|
||
|
}
|
||
|
}
|
||
|
#endif
|
||
|
|
||
|
/* If sysctl was unsuccessful, use the "terminator canary". */
|
||
|
__guard = 0xFF0A0D00UL;
|
||
|
|
||
|
{
|
||
|
/* Everything failed? Or we are using a weakened model of the
|
||
|
* terminator canary */
|
||
|
struct timeval tv;
|
||
|
|
||
|
gettimeofday (&tv, NULL);
|
||
|
__guard ^= tv.tv_usec ^ tv.tv_sec;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
void
|
||
|
__stack_smash_handler (char func[], int damaged)
|
||
|
{
|
||
|
struct sockaddr_un sock; /* AF_UNIX address of local logger */
|
||
|
struct sigaction sa;
|
||
|
const char message[] = ": stack smashing attack in function ";
|
||
|
int bufsz, len, log;
|
||
|
char buf[512];
|
||
|
extern char *__progname;
|
||
|
|
||
|
sigset_t mask;
|
||
|
sigfillset (&mask);
|
||
|
|
||
|
sigdelset (&mask, SSP_SIGTYPE); /* Block all signal handlers */
|
||
|
sigprocmask (SIG_BLOCK, &mask, NULL); /* except SIGABRT */
|
||
|
|
||
|
bufsz = sizeof (buf);
|
||
|
strcpy (buf, "<2>");
|
||
|
len = 3;
|
||
|
|
||
|
strncat (buf, __progname, sizeof (buf) - 4);
|
||
|
len = strlen (buf);
|
||
|
|
||
|
if (bufsz > len)
|
||
|
{
|
||
|
strncat (buf, message, bufsz - len - 1);
|
||
|
len = strlen (buf);
|
||
|
}
|
||
|
if (bufsz > len)
|
||
|
{
|
||
|
strncat (buf, func, bufsz - len - 1);
|
||
|
len = strlen (buf);
|
||
|
}
|
||
|
|
||
|
/* print error message */
|
||
|
write (STDERR_FILENO, buf + 3, len - 3);
|
||
|
write (STDERR_FILENO, "()\n", 3);
|
||
|
if ((log = socket (AF_UNIX, SOCK_DGRAM, 0)) != -1)
|
||
|
{
|
||
|
/* Send "found" message to the "/dev/log" path */
|
||
|
sock.sun_family = AF_UNIX;
|
||
|
(void) strncpy (sock.sun_path, _PATH_LOG, sizeof (sock.sun_path) - 1);
|
||
|
sock.sun_path[sizeof (sock.sun_path) - 1] = '\0';
|
||
|
sendto (log, buf, len, 0, (struct sockaddr *) &sock, sizeof (sock));
|
||
|
}
|
||
|
|
||
|
/* Make sure the default handler is associated with the our signal handler */
|
||
|
|
||
|
memset (&sa, 0, sizeof (struct sigaction));
|
||
|
sigfillset (&sa.sa_mask); /* Block all signals */
|
||
|
sa.sa_flags = 0;
|
||
|
sa.sa_handler = SIG_DFL;
|
||
|
sigaction (SSP_SIGTYPE, &sa, NULL);
|
||
|
(void) kill (getpid (), SSP_SIGTYPE);
|
||
|
_exit (127);
|
||
|
}
|