Prevent untrusted code from stealing control over my application via stack overflow?












0















I'm thinking of writing a JIT library that would compile and execute untrusted code on Windows, Mac, and Linux. The language that the untrusted code is written in is "safe", in the sense that: arrays are bound-checked, it is impossible to have pointers to inaccessible memory, and there is no way to make system calls. Furthermore, the stack space used by each function of the untrusted code is fixed during compilation (i.e. no alloca() or C-style variable length arrays).



However, this language can make recursive function calls, which means that a stack overflow can potentially occur.



Usually, stack overflows will cause a segmentation fault because the OS will add an inaccessible guard page at the end of the stack (at least, all three OSes that I care about will do this). Assuming I don't handle SIGSEGV or otherwise try to catch the segmentation fault, this will cause a crash, bringing down my JIT runtime and the rest of the application with it. That's good - the untrusted code didn't manage to wrest control over the application or access data from it.



But apparently, if a function allocates a large amount of stack memory (e.g. by declaring a large array on the stack), it is possible to "jump" over the guard page. So carefully-crafted code can be made to overflow the stack without causing a segmentation fault. That means that it would be possible to craft the untrusted code to allocate enough stack memory such that my JIT library would compile it to machine code that jumps the guard page. Such malicious code would be able to do bad things, such as: overwriting data from the rest of the application, so that when the JITted code returns to the application, the application would read the modified data and do things that it was not intended to do. This means that the malicious code has effectively gained control over the whole application (and would be able to do anything the application had the permission to do).



What is the proper way to detect a stack overflow (either crashing the whole program, or returning control to the JIT runtime so that I can handle it)?



I could conceivably think of two possible ways:




  • Query from the OS the remaining stack space, and check it at the prologue of every function. If there is not enough stack space that it can be made to call abort(). It can be queried for Linux like this answer, and there's a way for the other OSes as well.

  • Probe the required stack space at the prologue of every function. This will access the guard page if there is not enough stack space. This is the case for WAVM.










share|improve this question



























    0















    I'm thinking of writing a JIT library that would compile and execute untrusted code on Windows, Mac, and Linux. The language that the untrusted code is written in is "safe", in the sense that: arrays are bound-checked, it is impossible to have pointers to inaccessible memory, and there is no way to make system calls. Furthermore, the stack space used by each function of the untrusted code is fixed during compilation (i.e. no alloca() or C-style variable length arrays).



    However, this language can make recursive function calls, which means that a stack overflow can potentially occur.



    Usually, stack overflows will cause a segmentation fault because the OS will add an inaccessible guard page at the end of the stack (at least, all three OSes that I care about will do this). Assuming I don't handle SIGSEGV or otherwise try to catch the segmentation fault, this will cause a crash, bringing down my JIT runtime and the rest of the application with it. That's good - the untrusted code didn't manage to wrest control over the application or access data from it.



    But apparently, if a function allocates a large amount of stack memory (e.g. by declaring a large array on the stack), it is possible to "jump" over the guard page. So carefully-crafted code can be made to overflow the stack without causing a segmentation fault. That means that it would be possible to craft the untrusted code to allocate enough stack memory such that my JIT library would compile it to machine code that jumps the guard page. Such malicious code would be able to do bad things, such as: overwriting data from the rest of the application, so that when the JITted code returns to the application, the application would read the modified data and do things that it was not intended to do. This means that the malicious code has effectively gained control over the whole application (and would be able to do anything the application had the permission to do).



    What is the proper way to detect a stack overflow (either crashing the whole program, or returning control to the JIT runtime so that I can handle it)?



    I could conceivably think of two possible ways:




    • Query from the OS the remaining stack space, and check it at the prologue of every function. If there is not enough stack space that it can be made to call abort(). It can be queried for Linux like this answer, and there's a way for the other OSes as well.

    • Probe the required stack space at the prologue of every function. This will access the guard page if there is not enough stack space. This is the case for WAVM.










    share|improve this question

























      0












      0








      0








      I'm thinking of writing a JIT library that would compile and execute untrusted code on Windows, Mac, and Linux. The language that the untrusted code is written in is "safe", in the sense that: arrays are bound-checked, it is impossible to have pointers to inaccessible memory, and there is no way to make system calls. Furthermore, the stack space used by each function of the untrusted code is fixed during compilation (i.e. no alloca() or C-style variable length arrays).



      However, this language can make recursive function calls, which means that a stack overflow can potentially occur.



      Usually, stack overflows will cause a segmentation fault because the OS will add an inaccessible guard page at the end of the stack (at least, all three OSes that I care about will do this). Assuming I don't handle SIGSEGV or otherwise try to catch the segmentation fault, this will cause a crash, bringing down my JIT runtime and the rest of the application with it. That's good - the untrusted code didn't manage to wrest control over the application or access data from it.



      But apparently, if a function allocates a large amount of stack memory (e.g. by declaring a large array on the stack), it is possible to "jump" over the guard page. So carefully-crafted code can be made to overflow the stack without causing a segmentation fault. That means that it would be possible to craft the untrusted code to allocate enough stack memory such that my JIT library would compile it to machine code that jumps the guard page. Such malicious code would be able to do bad things, such as: overwriting data from the rest of the application, so that when the JITted code returns to the application, the application would read the modified data and do things that it was not intended to do. This means that the malicious code has effectively gained control over the whole application (and would be able to do anything the application had the permission to do).



      What is the proper way to detect a stack overflow (either crashing the whole program, or returning control to the JIT runtime so that I can handle it)?



      I could conceivably think of two possible ways:




      • Query from the OS the remaining stack space, and check it at the prologue of every function. If there is not enough stack space that it can be made to call abort(). It can be queried for Linux like this answer, and there's a way for the other OSes as well.

      • Probe the required stack space at the prologue of every function. This will access the guard page if there is not enough stack space. This is the case for WAVM.










      share|improve this question














      I'm thinking of writing a JIT library that would compile and execute untrusted code on Windows, Mac, and Linux. The language that the untrusted code is written in is "safe", in the sense that: arrays are bound-checked, it is impossible to have pointers to inaccessible memory, and there is no way to make system calls. Furthermore, the stack space used by each function of the untrusted code is fixed during compilation (i.e. no alloca() or C-style variable length arrays).



      However, this language can make recursive function calls, which means that a stack overflow can potentially occur.



      Usually, stack overflows will cause a segmentation fault because the OS will add an inaccessible guard page at the end of the stack (at least, all three OSes that I care about will do this). Assuming I don't handle SIGSEGV or otherwise try to catch the segmentation fault, this will cause a crash, bringing down my JIT runtime and the rest of the application with it. That's good - the untrusted code didn't manage to wrest control over the application or access data from it.



      But apparently, if a function allocates a large amount of stack memory (e.g. by declaring a large array on the stack), it is possible to "jump" over the guard page. So carefully-crafted code can be made to overflow the stack without causing a segmentation fault. That means that it would be possible to craft the untrusted code to allocate enough stack memory such that my JIT library would compile it to machine code that jumps the guard page. Such malicious code would be able to do bad things, such as: overwriting data from the rest of the application, so that when the JITted code returns to the application, the application would read the modified data and do things that it was not intended to do. This means that the malicious code has effectively gained control over the whole application (and would be able to do anything the application had the permission to do).



      What is the proper way to detect a stack overflow (either crashing the whole program, or returning control to the JIT runtime so that I can handle it)?



      I could conceivably think of two possible ways:




      • Query from the OS the remaining stack space, and check it at the prologue of every function. If there is not enough stack space that it can be made to call abort(). It can be queried for Linux like this answer, and there's a way for the other OSes as well.

      • Probe the required stack space at the prologue of every function. This will access the guard page if there is not enough stack space. This is the case for WAVM.







      stack-overflow sandbox jit






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked Nov 21 '18 at 7:49









      BernardBernard

      1,5771533




      1,5771533
























          0






          active

          oldest

          votes











          Your Answer






          StackExchange.ifUsing("editor", function () {
          StackExchange.using("externalEditor", function () {
          StackExchange.using("snippets", function () {
          StackExchange.snippets.init();
          });
          });
          }, "code-snippets");

          StackExchange.ready(function() {
          var channelOptions = {
          tags: "".split(" "),
          id: "1"
          };
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function() {
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled) {
          StackExchange.using("snippets", function() {
          createEditor();
          });
          }
          else {
          createEditor();
          }
          });

          function createEditor() {
          StackExchange.prepareEditor({
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: true,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: 10,
          bindNavPrevention: true,
          postfix: "",
          imageUploader: {
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          },
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          });


          }
          });














          draft saved

          draft discarded


















          StackExchange.ready(
          function () {
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53407395%2fprevent-untrusted-code-from-stealing-control-over-my-application-via-stack-overf%23new-answer', 'question_page');
          }
          );

          Post as a guest















          Required, but never shown

























          0






          active

          oldest

          votes








          0






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes
















          draft saved

          draft discarded




















































          Thanks for contributing an answer to Stack Overflow!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid



          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.


          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function () {
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53407395%2fprevent-untrusted-code-from-stealing-control-over-my-application-via-stack-overf%23new-answer', 'question_page');
          }
          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          鏡平學校

          ꓛꓣだゔៀៅຸ໢ທຮ໕໒ ,ໂ'໥໓າ໼ឨឲ៵៭ៈゎゔit''䖳𥁄卿' ☨₤₨こゎもょの;ꜹꟚꞖꞵꟅꞛေၦေɯ,ɨɡ𛃵𛁹ޝ޳ޠ޾,ޤޒޯ޾𫝒𫠁သ𛅤チョ'サノބޘދ𛁐ᶿᶇᶀᶋᶠ㨑㽹⻮ꧬ꧹؍۩وَؠ㇕㇃㇪ ㇦㇋㇋ṜẰᵡᴠ 軌ᵕ搜۳ٰޗޮ޷ސޯ𫖾𫅀ल, ꙭ꙰ꚅꙁꚊꞻꝔ꟠Ꝭㄤﺟޱސꧨꧼ꧴ꧯꧽ꧲ꧯ'⽹⽭⾁⿞⼳⽋២៩ញណើꩯꩤ꩸ꩮᶻᶺᶧᶂ𫳲𫪭𬸄𫵰𬖩𬫣𬊉ၲ𛅬㕦䬺𫝌𫝼,,𫟖𫞽ហៅ஫㆔ాఆఅꙒꚞꙍ,Ꙟ꙱エ ,ポテ,フࢰࢯ𫟠𫞶 𫝤𫟠ﺕﹱﻜﻣ𪵕𪭸𪻆𪾩𫔷ġ,ŧآꞪ꟥,ꞔꝻ♚☹⛵𛀌ꬷꭞȄƁƪƬșƦǙǗdžƝǯǧⱦⱰꓕꓢႋ神 ဴ၀க௭எ௫ឫោ ' េㇷㇴㇼ神ㇸㇲㇽㇴㇼㇻㇸ'ㇸㇿㇸㇹㇰㆣꓚꓤ₡₧ ㄨㄟ㄂ㄖㄎ໗ツڒذ₶।ऩछएोञयूटक़कयँृी,冬'𛅢𛅥ㇱㇵㇶ𥄥𦒽𠣧𠊓𧢖𥞘𩔋цѰㄠſtʯʭɿʆʗʍʩɷɛ,əʏダヵㄐㄘR{gỚṖḺờṠṫảḙḭᴮᵏᴘᵀᵷᵕᴜᴏᵾq﮲ﲿﴽﭙ軌ﰬﶚﶧ﫲Ҝжюїкӈㇴffצּ﬘﭅﬈軌'ffistfflſtffतभफɳɰʊɲʎ𛁱𛁖𛁮𛀉 𛂯𛀞నఋŀŲ 𫟲𫠖𫞺ຆຆ ໹້໕໗ๆทԊꧢꧠ꧰ꓱ⿝⼑ŎḬẃẖỐẅ ,ờỰỈỗﮊDžȩꭏꭎꬻ꭮ꬿꭖꭥꭅ㇭神 ⾈ꓵꓑ⺄㄄ㄪㄙㄅㄇstA۵䞽ॶ𫞑𫝄㇉㇇゜軌𩜛𩳠Jﻺ‚Üမ႕ႌႊၐၸဓၞၞၡ៸wyvtᶎᶪᶹစဎ꣡꣰꣢꣤ٗ؋لㇳㇾㇻㇱ㆐㆔,,㆟Ⱶヤマފ޼ޝަݿݞݠݷݐ',ݘ,ݪݙݵ𬝉𬜁𫝨𫞘くせぉて¼óû×ó£…𛅑הㄙくԗԀ5606神45,神796'𪤻𫞧ꓐ㄁ㄘɥɺꓵꓲ3''7034׉ⱦⱠˆ“𫝋ȍ,ꩲ軌꩷ꩶꩧꩫఞ۔فڱێظペサ神ナᴦᵑ47 9238їﻂ䐊䔉㠸﬎ffiﬣ,לּᴷᴦᵛᵽ,ᴨᵤ ᵸᵥᴗᵈꚏꚉꚟ⻆rtǟƴ𬎎

          Why https connections are so slow when debugging (stepping over) in Java?