- Return-to-libc attack
A return-to-libc attack is a
computer security attack usually starting with abuffer overflow in which thereturn statement on thestack is replaced by the address of another instruction and an additional portion of the stack is overwritten to provide arguments to this function. This allows attackers to call preexisting functions without the need to inject malicious code into a program.The shared library called "
" provides the C runtime onlibc UNIX style systems. Although the attacker could make the code return anywhere,libc
is the most likely target, as it is always linked to the program, and it provides useful calls for an attacker (such as thesystem()
call to execute an arbitrary program, which needs only one argument). This is why the exploit is called "return-to-libc" even when the return address may point to a completely different location.Protection from return-to-libc attacks
A non-executable stack can prevent some buffer overflows but not a return-to-libc attack because in the return-to-libc attack only existing executable code is used. On the other hand these attacks can only call preexisting functions.
Stack-smashing protection can prevent or obstruct exploitation as it can detect the corruption of the stack and possibly flush out the compromised segment. Address Space Layout Randomization (ASLR) makes this type of attack extremely unlikely to succeed on 64-bit machines as the memory locations of functions are random; however Shacham et al show that on 32-bit machines ASLR provides little benefit.ee also
* Buffer Overflow
*Stack buffer overflow
*Stack-smashing protection
* No eXecute (NX) bit
* Address space layout randomizationReferences
*
External links
* [http://www.infosecwriters.com/text_resources/pdf/return-to-libc.pdf Bypassing non-executable-stack during exploitation using return-to-libc] by c0ntex at InfoSecWriters.com
Wikimedia Foundation. 2010.