Deletion of Data Structure Sentinel

Incomplete Base
Structure: Simple
Description

This vulnerability occurs when a program accidentally removes or corrupts a special marker used to define the boundaries of a data structure, leading to logic errors and unexpected behavior.

Extended Description

Data structures often use hidden markers, called sentinels, to signal where they begin or end. Common examples include the null terminator ('\0') at the end of a string or a special node marking the tail of a linked list. If your code mistakenly deletes or overwrites this sentinel, the structure loses its defined boundary, causing functions that rely on it to fail or behave unpredictably. To prevent this, you should encapsulate the data structure and its sentinel within a controlled interface or API. This wrapper manages all access, ensuring that the critical sentinel value cannot be directly modified or deleted by other parts of the program. Treating the sentinel as protected internal state, rather than exposed data, is key to maintaining structural integrity and avoiding logic flaws.

Common Consequences 2
Scope: AvailabilityOther

Impact: Other

Generally this error will cause the data structure to not work properly.

Scope: AuthorizationOther

Impact: Other

If a control character, such as NULL is removed, one may cause resource access control problems.

Potential Mitigations 3
Phase: Architecture and Design
Use an abstraction library to abstract away risky APIs. Not a complete solution.
Phase: Build and Compilation

Strategy: Compilation or Build Hardening

Run or compile the software using features or extensions that automatically provide a protection mechanism that mitigates or eliminates buffer overflows. For example, certain compilers and extensions provide automatic buffer overflow detection mechanisms that are built into the compiled code. Examples include the Microsoft Visual Studio /GS flag, Fedora/Red Hat FORTIFY_SOURCE GCC flag, StackGuard, and ProPolice.

Effectiveness: Defense in Depth

Phase: Operation
Use OS-level preventative functionality. Not a complete solution.
Demonstrative Examples 1
This example creates a null terminated string and prints it contents.

Code Example:

Bad
C
c
The string foo has space for 9 characters and a null terminator, but 10 characters are written to it. As a result, the string foo is not null terminated and calling printf() on it will have unpredictable and possibly dangerous results.
References 2
The CLASP Application Security Process
Secure Software, Inc.
2005
ID: REF-18
The Art of Software Security Assessment
Mark Dowd, John McDonald, and Justin Schuh
Addison Wesley
2006
ID: REF-62
Applicable Platforms
Languages:
C : UndeterminedC++ : Undetermined
Modes of Introduction
Implementation
Taxonomy Mapping
  • CLASP