Security Holes – Part 2

In Part-1 of this post we spoke about security holes and 2 sources of vulnerabilities: Buffer Overflow and SQL Injection. We will cover next 3 sources in this post.

Integer Overflow
Integer overflow is the result of an attempt by a CPU to arithmetically generate a number larger than what can fit in the devoted memory storage space. The most common result in these cases is for the least significant representable bits of the result to be stored (the result is said to wrap).

Causes

  • Poor validation of arithmetic operations
  • Lack of awareness of casting order and implicit casts from operators
  • Failing to enforce the assumptions made

Redemption

  • Choose your datatypes carefully
  • Do not rely on implicit typecasts
  • Enforce your assumptions by using proper validations and appropriate variable datatypes

Error Handling
Error handling refers to the anticipation, finding, and resolve of programming errors. An example is the lack of sufficient memory to run an application or a memory conflict with another program.

Redemption

  • Never leave a return value of a function unexamined against its respective failure values
  • Use conditional compilation blocks for Debugging messages
  • When showing error messages to the user, make sure you convey the proper message without leaking out too much of information

Race Conditions
A race condition occurs when two threads access a shared variable at the same time. If an attacker can take advantage of the situation to insert malicious code, change a filename, or otherwise interfere with the normal operation of the program, the race condition is security vulnerability.

The result may be one or more of the following: a computer crash, an “illegal operation,” notification and shutdown of the program, errors reading the old data, or errors writing the new data.

Share your views with us on marketing@calsoftinc.com
Contributed by: Koushal Kawade | Calsoft Inc.

 
Share:

Related Posts

How IoT enables 5G massive Machine Type Communications (mMTC)

Explore how 5G’s Massive Machine Type Communications (mMTC) revolutionize IoT, enhancing smart cities, transportation, and healthcare with unmatched connectivity.

Share:
Virtual Machines or Containers Which is Better in NFV Infrastructure

Virtual Machines or Containers. Which is Better in NFV Infrastructure?

Discover whether Virtual Machines or Containers are better for NFV infrastructure. Explore their benefits, challenges, and impact on 5G networks.

Share:
Introduction to Virtualization Network in Cloud Computing

Introduction to Virtualization Network in Cloud Computing

Explore the blog to understand the significance of network virtualization in cloud computing, its benefits and key use cases.

Share:
Key Differences Between NSX-V and NSX-T You Need to Know Before Migration

Key Differences Between NSX-V and NSX-T You Need to Know Before Migration

Discover the key differences between VMware’s NSX-V and NSX-T and essential insights for a smooth migration to optimize your network infrastructure.

Share:
Top 9 Emerging Technology Trends in Networking & Telecom 2024

Top 9 Emerging Technology Trends in Networking & Telecom 2024

Stay updated with the latest telecom trends for 2024. Learn about AI, 5G, edge computing, cybersecurity, SD-WAN, and Open RAN.

Share:
Unlocking Network Agility Open RAN and the Future of Service Management & Orchestration (SMO)

Unlocking Network Agility: Open RAN and the Future of Service Management & Orchestration (SMO)

Recently, Open RAN turned out to be a transformative and innovative solution in the telecom industry. Service Management Orchestration (SMO) serves at the core of this transformative solution, revolutionizing the way mobile networks are deployed and managed. SMO in Open RAN framework foster openness, flexibility, interoperability supporting multi-vendor and cost-effective network deployments. SMO is paving the way for a new era of wireless connectivity, shaping the future of Open RAN deployments. Read the blog to explore the significance of SMO platform in Open RAN framework.

Share: