On the surface, this looks fine, until you look at the ASM output, and
you see the call to memset has been removed by the optimizer because
szPwd is not read once the function completes. Hence, the secret data is
still floating in memory.
This optimization, common in most modern C/C++ compilers is often
referred to as "dead store removal."
A full write-up outlining the issue in more detail, as well as some
remedies is at
http://msdn.microsoft.com/library/en-us/dncode/html/secure10102002.asp.
Cheers, Michael Howard
Secure Windows Initiative
Microsoft Corp.
'interesting' anomaly with code to scrub passwords that looks like this:
bool DoSensitiveStuff() {
bool fOK = false;
const size_t cbPwd = 64;
char szPwd[cbPwd];
if (GetUserPassword(szPwd,cbPwd-1))
if (DoSomethingWithPassword(szPwd))
fOK = true;
memset(szPwd,0,cbPwd);
return fOK;
}
On the surface, this looks fine, until you look at the ASM output, and
you see the call to memset has been removed by the optimizer because
szPwd is not read once the function completes. Hence, the secret data is
still floating in memory.
This optimization, common in most modern C/C++ compilers is often
referred to as "dead store removal."
A full write-up outlining the issue in more detail, as well as some
remedies is at
http://msdn.microsoft.com/library/en-us/dncode/html/secure10102002.asp.
Cheers, Michael Howard
Secure Windows Initiative
Microsoft Corp.
Writing Secure Code
http://www.microsoft.com/mspress/books/5612.asp
[ reply ]