[12177] in bugtraq
Re: ActiveX Buffer Overruns and BSTR's
daemon@ATHENA.MIT.EDU (Aviram Jenik)
Fri Oct 8 18:13:13 1999
Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Message-Id: <041401bf1032$5518a170$0201a8c0@jenik.com>
Date: Wed, 6 Oct 1999 21:38:08 +0200
Reply-To: Aviram Jenik <aviram@JENIK.COM>
From: Aviram Jenik <aviram@JENIK.COM>
X-To: "Scott, Richard" <Richard.Scott@BESTBUY.COM>,
BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
----- Original Message -----
From: "Scott, Richard" <Richard.Scott@BESTBUY.COM>
To: <BUGTRAQ@SECURITYFOCUS.COM>
Sent: Wednesday, October 06, 1999 5:10 PM
Subject: Re: ActiveX Buffer Overruns and BSTR's
> As my understanding goes, a BSTR is simply a 32bit pointer to a
> character array?
>
> ...
>
> It's just that COM wraps all the pointer stuff and just lets us get
> on with the more interesting stuff,
> I am sure that a buffer overflow could occur, whether it could be
> used for a breech of security is something that may need further research
in
> to.
>
Yes, but that would be an implementation flaw in COM. What we were
discussing here is whether or not it's possible to overflow buffers under
*normal* circumstances.
Although COM uses pointers in the underlying implementation, you only have
access to it before and after the wrapping is done. This means that if COM
wrapped the BSTR correctly (which is what we're assuming right now) the
overflow can only occur when you extract the BSTR into a smaller buffer. I
believe you have to be pretty stupid to do that (BSTR includes its own size,
for gods sake).
-------------------------
Aviram Jenik
"Addicted to Chaos"
-------------------------
Today's quote:
- Real programmers think structured programming is a communist
plot.