• IntroductionUncontrolled format string
  • Details
  • History
  • Prevention in compilers
  • DetectionDetection in x86-compiled binaries
  • See also
  • References
  • Further reading
  • External links

Uncontrolled format string

Type of software vulnerability / From Wikipedia, the free encyclopedia

Dear Wikiwand AI, let's keep it short by simply answering these key questions:

Can you list the top facts and stats about Uncontrolled format string?

Summarize this article for a 10 year old

SHOW ALL QUESTIONS

Uncontrolled format string is a type of code injection vulnerability discovered around 1989 that can be used in security exploits.[1] Originally thought harmless, format string exploits can be used to crash a program or to execute harmful code. The problem stems from the use of unchecked user input as the format string parameter in certain C functions that perform formatting, such as printf(). A malicious user may use the %s and %x format tokens, among others, to print data from the call stack or possibly other locations in memory. One may also write arbitrary data to arbitrary locations using the %n format token, which commands printf() and similar functions to write the number of bytes formatted to an address stored on the stack.

HomeAbout usFAQPressSite mapTerms of servicePrivacy policy