07.11.2014 Views

Enterprise Library Test Guide - Willy .Net

Enterprise Library Test Guide - Willy .Net

Enterprise Library Test Guide - Willy .Net

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

134<br />

<strong>Enterprise</strong> <strong>Library</strong> <strong>Test</strong> <strong>Guide</strong><br />

Table 10 lists the DREAD rating for threat 2.<br />

Table 10: Threat 2 DREAD Rating<br />

D R E A D Total Rating<br />

3 3 2 3 3 14 High<br />

Table 11 lists details about threat 3.<br />

Table 11: Logging Application Block Threat 3<br />

Threat 3<br />

Name<br />

Entry points<br />

Threat description<br />

Countermeasures<br />

STRIDE<br />

classification<br />

Risk<br />

Mitigation<br />

Investigative<br />

notes<br />

Attackers can flood the event log with false error messages.<br />

Flooding the event log<br />

Public classes and static methods<br />

The Logging Application Block exposes interfaces that allow you to log<br />

messages to the event log. An attacker can use these interfaces to flood<br />

the event log with false messages. This can constitute a denial of service<br />

attack. In addition, the event log may contain sensitive information.<br />

Check the event log to see if it has reached its threshold limit, which controls<br />

how many messages can be in the log. If the event log has reached<br />

its limit, generate an exception. The application should appropriately handle<br />

this exception. Also, the application should include code that uses an<br />

instance of the EventLogPermission class. Finally, the administrator should<br />

assign the appropriate ACLs to the event log for read/ write operations.<br />

Tampering, Information Disclosure, Denial of Services, Elevation of<br />

Privileges<br />

High<br />

No<br />

None<br />

Table 12 lists the DREAD rating for threat 3.<br />

Table 12: Threat 3 DREAD Rating<br />

D R E A D Total Rating<br />

3 3 2 3 3 14 High<br />

Table 13 lists details about threat 4.<br />

Table 13: Logging Application Block Threat 4<br />

Threat 4<br />

Name<br />

Entry points<br />

Attackers can flood the database log with false messages.<br />

Flooding the database<br />

Public classes and static methods

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!