Add check for overflow in MUL instructions, improve underflow detection

pull/127/head
Bernhard Mueller 7 years ago
parent d50a8e2479
commit 53a78aab97
  1. 38
      mythril/analysis/modules/integer.py

@ -15,6 +15,8 @@ For every SUB instruction, check if there's a possible state where op1 > op0.
For every ADD instruction, check if there's a possible state where op1 + op0 > 2^32 - 1
'''
MAX_UINT = 2 ** 32 - 1
def execute(statespace):
"""
@ -31,7 +33,7 @@ def execute(statespace):
for state in node.states:
logging.debug("Checking for integer underflow")
issues += _check_integer_underflow(state, node)
issues += _check_integer_underflow(statespace, state, node)
logging.debug("Checking for integer overflow")
issues += _check_integer_overflow(statespace, state, node)
@ -50,8 +52,7 @@ def _check_integer_overflow(statespace, state, node):
# Check the instruction
instruction = state.get_current_instruction()
if instruction['opcode'] != "ADD":
return []
if instruction['opcode'] in("ADD", "MUL"):
constraints = copy.deepcopy(node.constraints)
@ -59,25 +60,30 @@ def _check_integer_overflow(statespace, state, node):
stack = state.mstate.stack
op0, op1 = stack[-1], stack[-2]
# An integer overflow is possible if op0 + op1,
constraints.append(UGT(op0 + op1, (2 ** 32) - 1))
# An integer overflow is possible if op0 + op1 or op0 * op1 > MAX_UINT
if instruction['opcode'] == "ADD":
expr = op0 + op1
else:
expr = op0 * op1
constraints.append(UGT(expr, MAX_UINT))
try:
model = solver.get_model(constraints)
# If we get to this point then there has been an integer overflow
# Find out if the overflowed value is actually used
interesting_usages = _search_children(statespace, node, (op0 + op1), index=node.states.index(state))
interesting_usages = _search_children(statespace, node, expr, index=node.states.index(state))
# Stop if it isn't
if len(interesting_usages) == 0:
return issues
issue = Issue(node.contract_name, node.function_name, instruction['address'], "Integer Overflow ",
"Warning")
issue = Issue(node.contract_name, node.function_name, instruction['address'], "Integer Overflow ", "Warning")
issue.description = "A possible integer overflow exists in the function `{}`.\n" \
"The addition may result in a value higher than the maximum representable integer.".format(node.function_name)
"The addition or multiplication may result in a value higher than the maximum representable integer.".format(node.function_name)
issue.debug = solver.pretty_print_model(model)
issues.append(issue)
@ -87,7 +93,7 @@ def _check_integer_overflow(statespace, state, node):
return issues
def _check_integer_underflow(state, node):
def _check_integer_underflow(statespace, state, node):
"""
Checks for integer underflow
:param state: state from node to examine
@ -106,7 +112,7 @@ def _check_integer_underflow(state, node):
constraints = copy.deepcopy(node.constraints)
# Filter for patterns that contain bening nteger underflows.
# Filter for patterns that indicate benign underflows
# Pattern 1: (96 + calldatasize_MAIN) - (96), where (96 + calldatasize_MAIN) would underflow if calldatasize is very large.
# Pattern 2: (256*If(1 & storage_0 == 0, 1, 0)) - 1, this would underlow if storage_0 = 0
@ -131,6 +137,15 @@ def _check_integer_underflow(state, node):
model = solver.get_model(constraints)
# If we get to this point then there has been an integer overflow
# Find out if the overflowed value is actually used
interesting_usages = _search_children(statespace, node, (op0 - op1), index=node.states.index(state))
logging.info(interesting_usages)
# Stop if it isn't
if len(interesting_usages) == 0:
return issues
issue = Issue(node.contract_name, node.function_name, instruction['address'], "Integer Underflow",
"Warning")
@ -204,4 +219,3 @@ def _search_children(statespace, node, expression, index=0, depth=0, max_depth=6
results += _search_children(statespace, child, expression, depth=depth+1, max_depth=max_depth)
return results

Loading…
Cancel
Save