Article Details

Scrape Timestamp (UTC): 2025-02-13 01:40:09.929

Source: https://www.theregister.com/2025/02/13/fbi_cisa_unforgivable_buffer_overflow/

Original Article Text

Click to Toggle View

The Feds want developers to stop coding 'unforgivable' buffer overflow vulns. FBI, CISA harrumph at Microsoft and VMware in call for coders to quit baking avoidable defects into stuff. US authorities have labelled buffer overflow vulnerabilities "unforgivable defects”, pointed to the presence of the holes in products from the likes of Microsoft and VMware, and urged all software developers to adopt secure-by-design practices to avoid creating more of them. Buffer overflow vulnerabilities occur when software unexpectedly writes more data to memory storage than has been allocated for that data. The extra information spills into other memory, altering it. Smart attackers can feed carefully crafted data into software with these bugs to hijack the flow of the program so that it can be made to do malicious things, or simply crash it. (You can learn how to exploit these sorts of holes, and then how not to make these bugs in the first place, by studying books and then playing through wargames.) In a Wednesday advisory the FBI and Uncle Sam's Cybersecurity and Infrastructure Security Agency (CISA) labelled such memory safety flaws “unforgivable” because they’re avoidable if developers stop using outdated and unsafe coding practices and languages. The agencies highlighted a half-dozen buffer overflow vulnerabilities, some of which attackers exploited before manufacturers issued patches: "CISA and FBI maintain that the use of unsafe software development practices that allow the persistence of buffer overflow vulnerabilities — especially the use of memory-unsafe programming languages — poses unacceptable risk to our national and economic security," the two government agencies wrote in their joint security alert. The Feds point out that developers can avoid creating such flaws using memory-safe coding languages such as Rust, Go, and Swift. Both agencies understand that rewriting entire codebases in memory-safe languages will require "significant effort," and as such recommend manufacturers implement a phased transition plan. While making this shift, "manufacturers should also consider leveraging technologies to limit memory safety vulnerabilities in their existing code bases," CISA and the FBI note. The Feds also fancy compiler flags that implement compile-time and runtime protections might help. Running unit tests with an instrumented toolchain – one with AddressSanitizer and MemorySanitizer enabled, basically – is also mentioned as a helpful tactic. Both tools can perform runtime checks for memory safety issues. The government also urged software developers to "conduct aggressive adversarial product testing, including static analysis, fuzzing, and manual reviews" throughout the entire development lifecycle. Undertaking root-cause analysis of past vulnerabilities was also recommended, so developers can learn from past mistakes.

Daily Brief Summary

MISCELLANEOUS // U.S. Agencies Urge Developers to Eliminate Buffer Overflow Vulnerabilities

U.S. authorities, including the FBI and CISA, have emphasized the importance of eliminating "unforgivable" buffer overflow vulnerabilities in software development.

These vulnerabilities happen when software writes more data to a memory area than what is allocated, allowing attackers to hijack or crash the program.

Criticism was directed at major companies like Microsoft and VMware for allowing these vulnerabilities in their products.

The agencies advocate the use of memory-safe programming languages like Rust, Go, and Swift to prevent such security flaws.

A phased transition plan is recommended for companies to shift their current codebases to memory-safe languages while utilizing technologies to reduce vulnerabilities in existing systems.

Enhanced protective measures suggested include using compiler flags, running unit tests with tools like AddressSanitizer, and conducting comprehensive adversarial product testing.

The agencies also recommend conducting a root-cause analysis of previous incidents to learn from past mistakes and improve security practices.