The formatted output functions (fprintf()
and related functions) convert, format, and print their arguments under control of a format string, defined as follows by the C Standard, 7.21.6.1, paragraph 3 [ISO/IEC 9899:2011]:
The format shall be a multibyte character sequence, beginning and ending in its initial shift state. The format is composed of zero or more directives: ordinary multibyte characters (not %), which are copied unchanged to the output stream; and conversion specifications, each of which results in fetching zero or more subsequent arguments, converting them, if applicable, according to the corresponding conversion specifier, and then writing the result to the output stream.
Each conversion specification is introduced by the %
character followed (in order) by
Common mistakes in creating format strings include
int
for width or precisionThe following table summarizes the compliance of various conversion specifications. The first column contains a conversion specifier character (or characters). The next four columns consider the combination of the specifier character(s) with the various flags (the apostrophe ['], -, +, the space character, and #). The next eight columns consider the combination of the specifier character(s) with the various length modifiers (h
, hh
, l
, ll
, j
, z
, t
, and L
). Here, valid combinations are marked with a type name; arguments matched with the conversion specification will be interpreted as that type. For example, an argument matched with the specifier %hd
will be interpreted as a short
, so short
appears in the cell where d
and h
intersect. The last column denotes the expected type of arguments matched with the original specifier character(s). Throughout the table, valid and meaningful combinations are marked by the symbol (save for the length modifier columns, as described above). Valid combinations that have no effect are labeled N/E. Using a combination marked by the
symbol, using a specification not represented in the table, or using an argument of an unexpected type may result in undefined behavior. See undefined behaviors 153, 155, 157, 158, 161, and 162 in Annex J of the C Standard.
Conversion |
|
|
|
|
|
|
|
|
|
|
|
|
| Argument |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
|
|
|
|
|
|
| Signed integer | |||||
|
|
|
|
|
|
|
|
| Unsigned integer | |||||
|
|
|
|
|
|
|
|
| Unsigned integer | |||||
|
|
|
|
|
|
|
|
| Unsigned integer | |||||
|
| N/E | N/E |
|
| |||||||||
|
| N/E | N/E |
|
| |||||||||
|
| N/E | N/E |
|
| |||||||||
|
| N/E | N/E |
|
| |||||||||
|
|
|
| |||||||||||
|
| NTWS | NTBS or NTWS | |||||||||||
|
|
| ||||||||||||
|
|
|
|
|
|
|
|
| Pointer to integer | |||||
|
|
| ||||||||||||
|
| NTWS | ||||||||||||
|
| None |
Legend:
" "
) characterchar*
argument pointing to a null-terminated byte stringwchar_t*
argument pointing to a null-terminated wide character stringThe format input functions (fscanf()
and related functions) use similarly-specified format strings and impose similar restrictions on their format strings and arguments.
Do not supply an unknown or invalid conversion specification or an invalid combination of flag character, precision, length modifier, conversion specifier; to a formatted IO function. Likewise, do not provide a number or type of arguments that do not match the conversion specifiers in the format string.
Format strings are usually string literals specified at the call site, but they need not be. They should, however, not contain unsanitized data; see FIO30-C. Exclude user input from format strings for more information.
Mismatches between arguments and conversion specifications may result in undefined behavior. Many compilers can diagnose type mismatches in formatted output function invocations. In the following noncompliant code example, the error_type
argument to printf()
is incorrectly matched with the %s
specifier, rather than with the %d specifier. Likewise, the
error_msg
argument is incorrectly matched with the %d
specifier instead of the %s
specifier. One possible result of this invocation is that printf()
will interpret the error_type
argument as a pointer, and try to read a string from the address that error_type
contains. This is likely to result in an access violation.
#include <stdio.h> void func(void) { const char *error_msg = "Resource not available to user."; int error_type = 3; /* ... */ printf("Error (type %s): %d\n", error_type, error_msg); /* ... */ } |
This compliant solution ensures that the format arguments match their respective format specifications:
#include <stdio.h> void func(void) { const char *error_msg = "Resource not available to user."; int error_type = 3; /* ... */ printf("Error (type %d): %s\n", error_type, error_msg); /* ... */ } |
In most cases, incorrectly specified format strings will result in abnormal program termination. However, in some cases they can be used to corrupt memory in manners controllable by an attacker.
Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
FIO47-C | High | Unlikely | Medium | P6 | L2 |
Tool | Version | Checker | Description |
---|---|---|---|
| Can detect violations of this recommendation when the | ||
SV.FMT_STR |
| ||
486 S | Fully implemented | ||
PRQA QA-C | 0179 (U) | Partially implemented |
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
CERT C++ Secure Coding Standard | FIO00-CPP. Take care when creating format strings |
ISO/IEC TS 17961:2013 | Using invalid format strings [invfmtstr] |
MITRE CWE | CWE-686, Function call with incorrect argument type |
[ISO/IEC 9899:2011] | Subclause 7.21.6.1, "The fprintf Function" |