07.11.2014 Views

Enterprise Library Test Guide - Willy .Net

Enterprise Library Test Guide - Willy .Net

Enterprise Library Test Guide - Willy .Net

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Test</strong>ing for Security Best Practices 137<br />

Table 19 lists details about threat 7.<br />

Table 19: Logging Application Block Threat 7<br />

Threat 7<br />

Name<br />

Entry points<br />

Threat<br />

description<br />

Countermeasures<br />

STRIDE<br />

classification<br />

Risk<br />

Mitigation<br />

Investigative<br />

notes<br />

Attackers can use some of the application block interfaces to send unsolicited<br />

e-mail messages.<br />

Unsolicited e-mail<br />

Public classes and static methods<br />

The Logging Application Block exposes interfaces that allow you to e-mail log<br />

messages. An attacker can use these interfaces to send unsolicited e-mail<br />

messages.<br />

The administrator should assign the appropriate ACLs to the SMTP server.<br />

Information Disclosure, Denial of Services<br />

High<br />

No<br />

None<br />

Table 20 lists the DREAD rating for threat 7.<br />

Table 20: Threat 7 DREAD Rating<br />

D R E A D Total Rating<br />

3 3 2 3 3 14 High<br />

Table 21 lists details about threat 8.<br />

Table 21: Logging Application Block Threat 8<br />

Threat 8<br />

Name<br />

Entry points<br />

Threat<br />

description<br />

Countermeasures<br />

STRIDE<br />

classification<br />

Risk<br />

Mitigation<br />

Investigative<br />

notes<br />

Attackers can flood the message queues with false messages.<br />

Flooding of message queues and distributor service<br />

Public classes and static methods<br />

The Logging Application Block exposes interfaces that allow you to send<br />

messages to the message queues so that the log messages can be asynchronously<br />

processed. An attacker can use these interfaces to send false<br />

messages to the message queue. The distributor service then processes<br />

these messages. These false messages can constitute a denial of service<br />

attack.<br />

In addition, messages in a message queue may contain sensitive information.<br />

The application should perform authentication and authorization before<br />

granting a user access to the message queue.<br />

Tampering, Information Disclosure, Denial of Services, Elevation of<br />

Privileges<br />

High<br />

No<br />

None

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!