19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 4.8 Discovery of software vulnerabilities<br />

Software vulnerabilities includes unintentional program errors which are not<br />

known to the user or not yet known and constitute a security risk to the <strong>IT</strong><br />

system. Security loopholes are constantly being found in existing software,<br />

including in widely used or quite new software.<br />

Examples<br />

Some examples of known software vulnerabilities are as follows:<br />

- A sendmail bug under UNIX which enabled any user to execute programs<br />

and modify files by using the sendmail UID and GID.<br />

- <strong>The</strong> gets routine under UNIX. This was used by the fingerd program to<br />

read a line, without any check being made of the boundaries of variables.<br />

Thus, by means of an overflow it was possible to modify the stack in such<br />

a way that a new shell could be started.<br />

- cgi scripts which are supplied with www servers. Remote users were able<br />

to access sensitive information over the www server.<br />

- A bug in the DNS software allowed temporarily stored DNS data to be<br />

falsified.<br />

- Incorrect implementations of the TCP/IP stack. <strong>The</strong>se enabled entire<br />

networks to be paralysed due to oversize or otherwise manipulated packets.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!